EP2758922A2 - Securing transactions against cyberattacks - Google Patents

Securing transactions against cyberattacks

Info

Publication number
EP2758922A2
EP2758922A2 EP20120832873 EP12832873A EP2758922A2 EP 2758922 A2 EP2758922 A2 EP 2758922A2 EP 20120832873 EP20120832873 EP 20120832873 EP 12832873 A EP12832873 A EP 12832873A EP 2758922 A2 EP2758922 A2 EP 2758922A2
Authority
EP
European Patent Office
Prior art keywords
passcode
transaction
user
transaction information
service provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP20120832873
Other languages
German (de)
French (fr)
Other versions
EP2758922A4 (en
Inventor
Michael Stephen Fiske
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Biogy Inc
Original Assignee
Biogy Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/541,733 external-priority patent/US9858401B2/en
Application filed by Biogy Inc filed Critical Biogy Inc
Publication of EP2758922A2 publication Critical patent/EP2758922A2/en
Publication of EP2758922A4 publication Critical patent/EP2758922A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Definitions

  • Some examples of the user's computer are a Mac Book Pro, a Dell desktop computer, an IPhone, a Blackberry or an Android phone.
  • cryptography keys are stored on the user's computer or a chip executing the operating system, which is not secure. For example, when Bob's computer communicates with Mary's computer, even when using well-implemented Public Key Infrastructure (PKI), Bob's computer can only be sure that it is communicating with Mary's computer. Bob can not be sure that he is communicating with Mary and vice versa. Similarly, even Bob cannot be certain that the communications he sends Mary the same as the communications that Mary receives as coming from him.
  • PKI Public Key Infrastructure
  • each computer cannot be assured of who controls the other computer.
  • an intruder e.g., a hacker
  • the Trusted Platform Module has the fundamental cyber security weakness of not knowing who controls the other computer with which a user may be in communication with or who controls the computer which contains the Trusted Platform Module.
  • Not knowing the other computer with which a current computer is in communication with may be a weakness that is significant when the operating system can directly access the TPM. If the user's computer is compromised, then the attacker can access the TPM.
  • Another limitation and weakness of the TPM is that there is no mechanism for binding the identity of the user to the user's cryptography keys and other confidential information that should be bound to the user's true identity.
  • Another shortcoming of cyber security is that a secure link is missing between the authentication of a valid user, and the authorization of an action.
  • the authorization of an action could be the execution of a financial transaction from a user's bank account, a stock trade in a user's brokerage account, the execution of an important functionality on the electrical grid, or access to important data on a private network such as SIPRnet (e.g.
  • the authorization of an action typically occurs through the web browser since the web browser presents a convenient interface for a person. However, the web browser is where the important connection between authentication of a user and authorization of an action may be broken.
  • Existing systems have the user authenticating the user's computer, and then the same user's computer also authorizes (and may also execute) the action. Since the user's computer can be hacked, the lack of a secure and direct link between authenticating the user's computer and authorizing the action may render the act of user verification irrelevant.
  • biometrics can be advantageous for security, because biometrics offers a reliable method for verifying who (the person) is that is actually initiating a transaction.
  • biometrics if the handling of the biometric information, the storage of the biometric data, or the control of actions based on a biometric verification is done on an unsecured user's computer, the value of the biometrics may be greatly reduced or nullified.
  • a Trojan attack is an attack in which the attacker pretends to be the user and/or the other system to which the user is communicating with. In other words, a valid, authorized user cannot verify that the action he or she is trying to execute is what is actually being executed, because a third party may be masquerading as the other system.
  • a third fundamental shortcoming of current cybersecurity solutions is the fact that static authentication factors, such as passwords, PINs and biometrics, are entered directly into the user's computer or stored on computers that can be accessed in the network domain.
  • static authentication factors such as passwords, PINs and biometrics
  • the host domain and network are untrusted environments. This weakness makes static authentication factors vulnerable to phishing attacks in the host domain or security breaches in the network domain.
  • biometric factors are immutable, and if an immutable biometric factor is compromised, then the reuse of the compromised biometric factor reduces the security of the system.
  • FIG. 1 A shows a block diagram of an embodiment of a system for secure transactions against cyberattacks
  • FIG. IB shows a memory system that is a component of the system shown in
  • FIG. 2 A shows a block diagram of an embodiment of a service provider system
  • FIG. 2B shows memory system that is a component of the system in FIG. 2A.
  • FIG. 3 A shows a flow diagram of an embodiment of a user- side method of setting up a system before starting a secure transaction
  • FIG. 3B shows a flow diagram of an embodiment of a service provider-side method of setting up a system before starting a secure transaction
  • FIG. 3C shows a flow diagram of an embodiment of a user-side method of initiating a secure transaction
  • FIG. 4 shows a flow diagram of an embodiment of a service provider-side method of authenticating the user and requesting authentication
  • FIG. 5 shows a flow diagram of an embodiment of a user system- side method of authenticating the service provider and requesting completion of the transaction
  • FIG. 6 shows a flow diagram of an embodiment of a service provider system- side method of completing the transaction
  • FIG. 7 shows a diagram of an embodiment of a browser with the recipient information being entered into the web browser;
  • FIG. 8 shows an embodiment of a display screen that may use an LCD;
  • FIG. 9 shows a screenshot of an embodiment of user interface for entering the registration code of a user
  • Fig. 10 shows an example of a user interface for performing a secure transaction.
  • Security solutions are provided for secure transactions against untrusted browser attacks and other cyberattacks.
  • the solution(s) described in the specification secure payment transactions.
  • the solution(s) may secure access and use of private networks such as Secret Internet Protocol Router Network (SIPRnet) or resources on a public infrastructure such as the electrical grid.
  • SIPRnet Secret Internet Protocol Router Network
  • FIG. 1A shows an embodiment of a system 100 for providing secure transactions.
  • system 100 may include user system 101, and user system 101 may include secure area 102, secure memory system 104, secure processor system 106, output system 108, input system 110, sensor 111, communication system 112, memory system 114, processor system 116, input/output system 118, operating system 120, and network interface 122.
  • System 100 may also include network 124 and service provider system 126.
  • system 100 may not have all of the elements or features listed and/or may have other elements or features instead of, or in addition to, those listed.
  • System 100 is a system within which a secure transaction takes place (FIGs.
  • User system 101 is one that has a secure area that is dedicated for performing secure transactions over a network.
  • User system 101 may be a single device or a combination of multiple devices.
  • User system 101 may be a portable device, personal computer, laptop, tablet computer, handheld computer, mobile phone, or other network system, for example (in this specification a network system is any device or system that is capable of sending and/or receiving communications via a network).
  • a secure area 102 may be provided for performing secure transactions.
  • authentication information references to any form of information used for authenticating a user.
  • authentication information such as a biometric authentication and/or another form of authentication is bound to the authorization of an action.
  • the authentication information is in some way combined with the information for performing the action, such as by being concatenated together and then applying a hash function to the result of the concatenation.
  • the words “action” and “transaction” may be switched one with another to obtain different embodiments.
  • the information may be concatenated, added together (e.g., in a binary addition of the binary values of information), be different inputs to the same function, and/or combined in another manner.
  • a hash function is a function that accepts as its input argument an arbitrarily long string of bits (or bytes) and produces a fixed-size output.
  • a hash function maps a variable length message m to a fixed- sized output, ⁇ (m).
  • Typical output sizes range from 160 bits, 256 bits, 512 bits, or can also be substantially larger.
  • the hash functions that are used are one-way.
  • a one-way function ⁇ is a function that can be easily computed, but that its inverse ⁇ "1 is extremely difficult to compute.
  • Other types of one way functions may be used in place of a hash function.
  • a hash function could be one of the SHA-3 candidates.
  • a candidate example of a hash function is BLAKE.
  • Another example of a hash function is Gr0stl.
  • Another example of a hash function is JH.
  • Another example of a hash function is Keccak.
  • Another example of a hash function is Skein.
  • secure area 102 may have its own secure processor system and secure memory system, which are not accessible by the rest of user system 101. Secure area 102 may be capable of taking over and/or blocking access to other parts of user system 101.
  • Secure memory system 104 may be a dedicated memory for securing transactions. In an embodiment, secure memory system 104 may not be accessed by the other processor systems of user system 101.
  • Memory system 104 may include, for example, any one of, some of, any combination of, or all of a long-term storage system, such as a hard drive; a short-term storage system, such as random access memory; a removable storage system, such as a floppy drive or a removable drive; and/or flash memory.
  • Memory system 104 may include one or more machine-readable mediums that may store a variety of different types of information.
  • Secure memory system 104 may store methods and information needed to perform the secure transaction, such as a method for generating a passcode generator, user information, a method of generating a registration code generator, and encryption/decryption code.
  • Secure memory system 104 may include one or more memory units that each write and/or read to one or more machine readable media.
  • the term machine-readable medium is used to refer to any non-transient medium capable carrying information that is readable by a machine.
  • One example of a machine-readable medium is a computer-readable medium.
  • FIG. IB Another example of a machine-readable medium is paper having holes that are detected that trigger different mechanical, electrical, and/or logic responses.
  • the content of secure memory 104 is discussed further in FIG. IB, below.
  • Output system 108 may include any one of, some of, any combination of, or all of a monitor system, a handheld display system, a printer system, a speaker system, a connection or interface system to a sound system, an interface system to peripheral devices and/or a connection and/or interface system to a computer system, intranet, and/or internet, for example.
  • secure processor system 106 may be capable of taking over and using any portion of and/or all of output system 108.
  • a portion of the output system may be a dedicated display system that may be accessed only by secure area 102.
  • secure processor 106 may be capable of receiving input from input system 110 and/or blocking access to output system 108 by the main processor system and/or other devices.
  • Input system 110 may include any one of, some of, any combination of, or all of a biometric sensor 111, a keyboard system, a touch sensitive screen, a tablet pen, a stylus, a mouse system, a track ball system, a track pad system, buttons on a handheld system, character entry such as letters and numbers a scanner system, a microphone system, a connection to a sound system, and/or a connection and/or interface system to a computer system, intranet, and/or internet (e.g. IrDA, USB).
  • character entry may be performed on a touch sensitive screen such as an IPhone, IPad or Android phone.
  • biometric sensor 111 may be a finger print scanner or a retinal scanner.
  • Memory system 114 may include, for example, any one of, some of, any combination of, or all of a long-term storage system, such as a hard drive; a short-term storage system, such as random access memory; a removable storage system, such as a floppy drive or a removable drive; and/or flash memory.
  • Memory system 114 may include one or more machine-readable mediums that may store a variety of different types of information. Memory system 114 and memory system 104 may use the same type memory units and/or machine readable media.
  • Memory system 114 may also store the operating system of user system 101 and/or a web browser (which may also be referred to as an HTTP client).
  • memory system 114 may also store instructions for input system 110 to read in biometric data and send the biometric data to secure area 102.
  • Processor system 116 may include one or more processors. Processor system
  • processor 116 only communicates to secure area 102 when secure area 102 authorizes processor 116 to communicate with secure area 102.
  • Secure area 102 may prevent processor 116 from communicating to secure 102 during the secure area's execution of critical operations such as setup, generation of keys, registration code, biometric authentication or decryption of transaction information.
  • Input/output system 118 may include devices that have the dual function as input and output devices.
  • input/output system 118 may include one or more touch sensitive screens, which display an image and therefore are an output device and accept input when the screens are pressed by a finger or stylus, for example.
  • the touch sensitive screen may be sensitive to heat and/or pressure.
  • One or more of the input/output devices may be sensitive to a voltage or current produced by a stylus, for example.
  • Input/output system 118 is optional, and may be used in addition to or in place of output system 108 and/or input device 110. In an embodiment, a portion of the input/output system 118 may be dedicated to secure transactions providing access only to secure area 102.
  • secure processor 106 may be capable of receiving/sending input/output from/via input system 110 and/or blocking access to input system 110 by the main processor system and/or other devices. Restricting access to a portion of and/or all of the input/output system 118 denies access to third party systems trying to hijack the secure transaction.
  • Operating system 120 may be a set of machine instructions, stored in memory system 110, to manage output system 108, input system 110, memory system 114, input/output system 118 and processor system 116. Operating system 120 may not have access to secure area 102.
  • Network interface 122 may be an interface that connects user system 101 with the network. Network interface 122 may be part of input/output system 118.
  • Network 124 may be any network and/or combination of networks of devices that communicate with one another (e.g., and combination of the Internet, telephone networks, and/or mobile phone networks).
  • Service provider system 126 (which will be discussed further in conjunction with FIG. 2A) may receive the transactions. The recipient may be the final recipient or an intermediary recipient of transactions.
  • Service provider system 126 may be a financial institution or a recipient of a secure transaction.
  • User system 101 may interact with any of a variety of service provider systems, such as service provider system 126, via a network 124, using a network interface 122.
  • Service provider system 126 may be a system of one or more computers or another electronic device, and may be operated by a person that grants a particular user access to its resources or enables a particular event (e.g., a financial transaction, a stock trade, or landing a plane at an airport, and so on).
  • a financial transaction may be an instance or embodiment of a transaction.
  • a stock trade is one embodiment of a financial transaction;
  • a bank wire transfer is an embodiment of a financial transaction and
  • an online credit card payment is an embodiment of a financial transaction. Any operation(s) that runs in a trusted transaction.
  • every secure transaction may include one or more atomic operations and the use of the word transaction is generic to both financial transactions and operations including atomic operations unless stated otherwise.
  • the word transactions is also generic to an individual or indivisible set of operations that must succeed or fail atomically (i.e., as a complete unit that cannot remain in an intermediate state).
  • Operations that require security may include operations that make use of, or rely on, the confidentiality, integrity, authenticity, authority, and/or accountability of a system should be executed in a trusted environment (e.g., in a secure area, such as secure area 102). Types of operations that require security may be treated as secure transactions.
  • a successful transaction other than logging information alters a system (e.g., of service provider 126) from one known, good state to another, while a failed transaction does not.
  • a system e.g., of service provider 1266
  • rollforwards, and deadlock handling mechanisms may be employed to assure atomicity and system state integrity, so that if there is an error in the transaction, the transaction does not take effect or does not cause an unacceptable state to occur.
  • a secure transaction assures the following properties:
  • Integrity Ensuring that transactional information is protected from unauthorized modification.
  • a unique passcode is bound to, and depends upon, the transaction information.
  • each step of the transaction uses a different transaction passcode that is dependent on the transaction information and user verification information.
  • the passcode includes the transaction information.
  • the unique passcode sent following the alteration will be invalid (an example, of a manner in which the transaction being altered is the dollar amount and account number of the recipient could be altered in an untrusted browser). Since the alteration of the transaction alters the passcode, the execution of the transaction would fail due to the incorrect unique passcode during that transaction step.
  • the secure transaction solution can be executed on a standalone portable device - e.g., a secure flash drive, portable token, or in a secure chip or a secure part of a chip, and the use of a standalone portable device makes it difficult for an attacker to gain access.
  • the secure chip or secure part of the chip may reside in a mobile phone. Some examples of a mobile phone are an Android phone, the iPhone and the Blackberry.
  • the secure chip or secure part of the chip may reside in a personal computer.
  • the secure chip may be temporarily or permanently disconnected from the rest of the system so that the operating system 120 does not have access to critical information entered into and received (e.g., read or heard) from the secure area's user interface.
  • critical information entered into and received (e.g., read or heard) from the secure area's user interface.
  • this critical information may be authentication information, biometric information, passwords, passcodes, passcode generators, PINS, other kinds of authentication factors, transaction information, and/or other user credentials.
  • user system 101 is a portable device
  • the portable device may have a user interface with one or more buttons or a navigation button, which may offer the user five choices (e.g., up, down, left, right, select).
  • the buttons or navigation button may be used to enter a PIN into the secure area.
  • the buttons or navigation buttons may be used to select one or more images stored in the secure area.
  • character entry of letters, numbers and other symbols may be performed on a touch sensitive screen: some devices that have touch sensitive screens are IPhones, IPads and Android smartphones.
  • the user interface may enable the user to enter transaction information directly to the secure area or secure part of the chip.
  • Portable embodiments of user system 101 enable users to execute secure transactions in remote places such as inside a jet, on a golf course, inside a moving automobile, from a hotel room, in a satellite, at a military gate, and/or other isolated places.
  • biometric prints occurs any of the above listed different specific types of biometrics may be substituted to get specific embodiments.
  • the authentication items may be PINs, passwords, sequences, collections of images that are easy to remember, and/or even psychometrics.
  • the item used to verify the person may be any item that is unique.
  • the item(s) used to verify the person may be one or more items that as a combination are difficult to fabricate, guess, find by trial and error, and/or compute. In an embodiment, the item(s) used to verify the person are uniquely associated with this person. In an embodiment, the item used to verify the person has an unpredictable element. For example, in one instance, a transaction may require a fingerprint and the person selecting an apple image as user verification where the secure area indicates, via the user interface, to the user to choose their favorite food. In another instance at a later time, a transaction may require a fingerprint and the person selecting a correct image or collection of images from a display screen.
  • secure area 102 may be a specialized part of the chip (e.g., a microprocessor), where the operating system 120 and web browser software do not have access to this specialized part of the chip.
  • a specialized part of the chip may be able to turn off the operating system 120's access to presses of the buttons or finger presses of the screen of a mobile phone (or other computing device), preventing malware and key or screen logging software from intercepting a PIN, character entry of letters, numbers or other symbols or the selection of one or more images.
  • a specialized part of the chip may be able to temporarily disconnect the rest of the chip's access to the screen (e.g., by preventing the execution of the operating system 120 and web browser).
  • part of the display screen may be permanently disconnected from the part of the chip (e.g., from the microprocessor of the chip) that executes the operating system 120 and web browser.
  • a part of the chip may only have access to the biometric sensor, while the rest of the chip - executing the operating system 120 and web browser - is permanently disconnected from the biometric sensor.
  • At least one embodiment uses a secure device that produces unique passcodes from biometric prints that can be used as one-time passwords. For each acquired biometric print, the derived passcodes created from the biometric print and the transaction information for that particular transaction is unique.
  • Another embodiment includes a secure area, such as secure area 102, that executes the biometric acquisition and storage of a registration code, passcode generator, seed, cryptography key(s) and other user credentials, which may be created from the biometric prints or created from unpredictable physical processes in secure area 102, or created from a combination of the biometric prints and unpredictable processes
  • a secure area such as secure area 102
  • a registration code such as passcode generator, seed, cryptography key(s) and other user credentials
  • photons may be produced by the hardware as a part of the unpredictable process.
  • the unpredictable process may be produced by a specialized circuit in the secure area.
  • biometric prints and/or unpredictable information from unpredictable physical processs are used to generate a registration code in the secure area 102.
  • the secure area 102 may include embedded software.
  • the embedded software is on a chip with a physical barrier around the chip to hinder reverse engineering of the chip, and/or hinder access to passcode generators, keys, transaction information, and/or possibly other user credentials.
  • the use of biometric prints to create one-time passcodes within a secure area may eliminate the use of static passwords that need to be memorized and need to be stored on the host computer or need to be stored on an insecure part of the chip executing the operating system 120 and web browser.
  • the use of other biometric information entered into the secure area may eliminate a person entering a static password into an insecure part of the system.
  • the fingerprints are less susceptible to theft, the biometric prints are not transmitted to the insecure part of the system, nor is there any need to have encrypted templates of the biometric prints transmitted to an insecure device.
  • Each of the above embodiments may be used separately from one another in combination with any of the other embodiments. All of the embodiments of this specification may be used together or separately.
  • the secure area 102 may be part of user system 101 or a special part of the chip that is able to acquire biometric prints, store authentication information, and/or authenticate the newly acquired items.
  • the authentication information may include templates of biometric prints, images, pins, and/or passwords.
  • the secure area may also be a part of the device where critical transaction information may be entered or verified on a display that the secure area only has access to.
  • the host computer (domain) and the network have no access to the transaction information, no access to the keys, no access to biometrics, no access to passcode generators, and/or no access to other critical user credentials (the transaction information, the keys, the biometrics, passcode generators, and/or other critical user credentials may be the contained and processed by the secure area).
  • one item of transaction information may be the name of the person or entity sending the money. Another item of transaction information may be the name of the person or entity receiving the money. Another item of transaction information, may be the date or time of day. Another item of transaction information may be the sending person's (or entity's) account number. Another item of transaction information may be the receiving person's (or entity's) bank account number (the sending person or entity is the person or entity that sends a message that is part of the transaction and the receiving person or entity is the person or entity that receives the message that is part of the transaction. Another item of transaction information may be the sending person's (or entity's) routing number. Another item of transaction information may be the receiving person's (or entity's) routing number. Another item of transaction information may be the amount of money that may be expressed in dollars, Euros, yen, francs, deutschmark, yuan or another currency.
  • one or more biometric prints may be acquired, and one or more unique registration codes and in at least one embodiment encryption keys may be generated from the one or more of the biometric prints (items) or generated from an unpredictable physical process or both.
  • the unpredictable physical process may come from a hardware chip or hardware circuit that uses photons as a part of the
  • the software that secure area 102 executes may be embedded in secure memory 104. In an embodiment, there is no operating system on the device or on secure area 102 of user system 101. In an alternative embodiment, there is an operating system.
  • the secure biometric print device has a number of components, which are described later.
  • the security of the secure area 102 may be enhanced by any one of, any combination or of, or all of (1) the use of embedded software, (2) the lack of an operating system, and (3) the secure area being at least part of a self-contained device not connected to a computer or the internet.
  • the unit that includes the secure area may contain its own processor. In an embodiment, the secure area may not have any of these security enhancing features.
  • the biometric sensor enables user system 101 to read biometric prints.
  • the biometric sensor may include a fingerprint area sensor or a fingerprint sweep sensor, for example.
  • the biometric sensor may contain an optical sensor that may acquire one or more types of biometrics.
  • the biometric sensor may be a microphone or other kind of sensor that receives acoustic information, such as a person's voice.
  • the sensor may be a device that acquires DNA or RNA.
  • secure processor system 106 may execute the software instructions, such as acquiring a biometric print from the sensor, matching an acquired biometric print against a stored biometric print, sending communication and control commands to a display, and/or encrypting the registration code and transmitting the registration code to the administrator when the user and administrator are not in the same physical location.
  • the security is enhanced, because the external processor is given fewer chances to inspect contents of secure area 102.
  • secure area 102 may store software instructions that are run by secure processor system 106.
  • Processor system 106 performs the biometric print acquisition, the encryption, and/or generation of the passcode.
  • a specialized logic circuit is built that carries out the functions that the software causes the processors to perform, such as driving sensor 111 (which may be an acquisition unit, such as a biometric sensor).
  • Secure memory system 104 may contain non- volatile memory in addition to volatile memory. Non-volatile memory enables the device to permanently store information for generating passcodes, encryption keys, and passcode generators.
  • secure memory system 104 may include memory on secure processor system 106.
  • the sensor or input system 110 and secure processor system 106 may be integrated into a single chip. Alternatively, in another embodiment, the sensor in input system 110 and secure processor system 106 may be two separate chips.
  • FIG. IB shows an embodiment of a block diagram of the contents of memory system 104 of FIG. 1A
  • Memory system 104 may include instructions 152, which in turn may include a setup routine 154, an authentication of user routine 156, a secure transaction routine 158, having an initial request routine 160, a service provider authentication routine 162, and a completion of transaction routine 164.
  • Instructions 154 (of memory 104) may also include registration code generator 166, drivers 168, controller 169, generate encryption key 170, generate passcode generator 172, perturb encryption key 174, perturb passcode generator 175, generate passcode 176, hash functions 178, perturbing functions 180, and user interface 181.
  • Memory system 104 may also store data 182, which may include biometric template T 184, registration key R 186, current encryption key K 188, current passcode generator G 190, and transaction information S 192. In other embodiments, memory system 104 may not have all of the elements or features listed and/or may have other elements or features instead of, or in addition to, those listed.
  • Instructions 152 may include machine instructions implemented by processor
  • Setup routine 154 is a routine that handles the setting up of the user system 101, so that user system 101 may be used for performing secure transactions.
  • Setup routine 104 may collect a new user's biometric print, and apply a hash function to the biometric print (and/or to other user information) to generate a registration key R.
  • there may be specialized hardware in the secure area to help create unpredictableness used for the generation of key(s), seed(s), and/or registration code(s).
  • the registration code, seed, or key may be generated by applying the hash function to the raw biometric print data, for example.
  • setup routine 154 may apply a hash function to authentication information, such as a biometric print, to hardware noise produced by a phototransistor, and/or other user information or a combination of these to generate an initial encryption key.
  • the setup routine 154 may also send the registration code and/or the encryption key to the service provider system 126.
  • the registration code R and/or the initial encryption key may be received from service provider 126.
  • Authentication of user routine 156 may authenticate the user each time the user attempts to use user system 101.
  • user system 101 may include a biometric sensor (e.g., as sensor 111) that scans the user's biometric print, reduces the biometric print to a template, and matches the newly derived biometric template to a stored template (which was obtain by setup routine 154). Then, if the stored template and the newly derived template match, the user is allowed to use user system 101.
  • a biometric sensor e.g., as sensor 111 that scans the user's biometric print, reduces the biometric print to a template, and matches the newly derived biometric template to a stored template (which was obtain by setup routine 154). Then, if the stored template and the newly derived template match, the user is allowed to use user system 101.
  • a biometric print acquired may be directly matched with a stored template.
  • authentication of user routine 156 may require the user to enter a password. If the password received and the password stored match, the user is allowed to use user system 101.
  • Secure transaction routine 158 is a routine that implements the secure transaction.
  • the initial request routine 160 is a first phase of secure transaction routine 158.
  • One purpose of initial request routine 160 is to generate a passcode from a combination of the current passcode generator and transaction information.
  • the transaction information is encrypted with the encryption key.
  • the encrypted transaction information and the passcode are sent to the service provider.
  • the passcode generator is perturbed and the encryption key is perturbed to obtain a new passcode generator and a new encryption key, respectively.
  • the encryption key is not changed each time.
  • each passcode is generated form a different passcode generator.
  • the passcode is generated from the passcode generator after generating the prior passcode, which may be generated any time after generating the prior passcode and before generating the current passcode, such as just after generating the prior passcode or just before generating the current passcode.
  • secure transaction routine 158 waits for a reply, which will include a passcode that is dependent on the passcode generator and transaction information.
  • Service provider authentication routine 162 authenticates the information provided by the service provider.
  • the transaction passcode sent by the service provider 126 to system 101 in reply to initial request 160 may be authenticated by service provider authentication routine 162 (throughout this specification, the word passcode and the phrase transaction may be substituted one for another to obtain different embodiments). If the service provider that sent the passcode is the wrong service provider, it is unlikely that the service provider will have the correct transaction information and the correct passcode generator, and consequently the passcode returned will be incorrect.
  • Completion of transaction routine 164 completes the portion of the transaction performed by system 101. If the service provider is authenticated, completion of transaction routine 164 generates yet another passcode from the passcode generator and transaction information and sends the passcode to the service provider.
  • Registration code generator 166 may be an algorithm for generating a registration code from biometric data, unpredictableness generated by an unpredictable process in the hardware in the secure area of the chip, and/or other information.
  • Instructions 154 may also include registration code generator 166.
  • Drivers 168 may include drivers for controlling input and output devices, such as the keyboard, a monitor, a pointing device (e.g., a mouse and/or a touch pad), a biometric print sensor (for collecting biometric prints).
  • Controller 169 may include one or more machine instructions for taking control of the keypad, monitor and/or network interface, so the transaction may be performed securely, without fear of the processor system 116 compromising security as a result of being taken over by malware sent from another machine.
  • Perturb passcode generator 175 perturbs the current passcode generator to thereby generate the next passcode generator.
  • the perturbing function could apply a one-way function to the passcode generator and other information.
  • Generate passcode 176 generates a new passcode.
  • Generate passcode 176 may generate the passcode by applying a hash function to a combination of (e.g., a concatenation of) the passcode generator and transaction information.
  • Hash functions 178 may use one or more one-way functions, which may be used by generate registration code 166 for generating a registration from a biometric print and/or other user information. Alternatively or additionally, hash functions 178 may use a one-way function, which may be used by generate passcode 176 for generating a new passcode from the combination of a passcode generator and transaction information.
  • hash functions 178 may include a different function for generate registration code 166 and generate passcode 176. Those hash function(s) of hash functions 178 that are used by initial request 160, authentication of service provider routine 162, and completion of transaction routine 164 may be the same as one another or different from one another.
  • Perturbing functions 180 may include one or more perturbing functions, which may be used by perturb encryption key 174 and perturb passcode generator 175 generate passcode generator 176. The perturbing functions in perturbing functions 180 used by perturb encryption key 174 and perturb passcode generator 176 may be the same or different from one another. Different perturbing functions of perturbing functions 180 may be used during each initial request 160, authentication of service provider routine 162, and/or completion of transaction routine 164.
  • perturbing functions 180 and hash functions 178 are indicated as separate storage areas in perturb encryption key 174 and perturb passcode generator 175, the perturbing functions may just be stored as part of the code for perturb encryption key 174 and perturb passcode generator 175.
  • any other function may be substituted (e.g., any perturbing function may be replaced with a hash function and any hash function may be replaced with a perturbing function) to obtain another embodiment.
  • any perturbing function and/or hash function mentioned in this specification may be a one way function.
  • User interface 181 provides a page, or another method of displaying and entering information so that the user interface may provide the following functionalities, labeled with the letters A-F.
  • Data 182 may include any data that is needed for implementing any of the routines stored in memory 104.
  • Current encryption key K 188 is the current encryption key, which may be stored long enough for the next encryption key to be generated from the current encryption key.
  • current passcode generator G 190 may stored long enough for generating the current passcode and the next passcode generator.
  • the passcode generator is a value (e.g., a combination of various symbols and characters) that is combined with the transaction information, and a function may be applied to the combination to generate a passcode.
  • Transaction information S 192 may include information about a transaction that the user would like to perform.
  • Transaction information 190 may combined with the current passcode generator and to generate the current transaction passcode.
  • FIG. 2 A shows a block diagram of an embodiment of a service provider system 200 in a system for securing transactions against cyber attacks.
  • service provider system 200 may include output system 202, input system 204, memory system 206, processor system 208, communication system 212, and input/output system 214.
  • the service provider system 200 may not have all the components and/or may have other embodiments in addition to or instead of the components listed above.
  • Service provider system 200 may be a financial institution or any other system such as a power plant, a power grid, or a nuclear plant or any other system requiring secure access.
  • service provider system 200 may be an embodiment of service provider system 126. Any place in this specification where service provider 126 is mentioned service provider 200 may be substituted. Any place in this specification where service provider 200 is mentioned service provider 126 may be substituted.
  • Service provider system 200 may include one or more webservers, applications servers, and/or databases, which may be part of a financial institution, for example.
  • Output system 202 may include any one of, some of, any combination of, or all of a monitor system, a handheld display system, a printer system, a speaker system, a connection or interface system to a sound system, an interface system to peripheral devices and/or a connection and/or interface system to a computer system, intranet, and/or internet, for example.
  • Input system 204 may include any one of, some of, any combination of, or all of a keyboard system, a touch sensitive screen, a tablet pen, a stylus, a mouse system, a track ball system, a track pad system, buttons on a handheld system, character entry of letters, numbers or other symbols on a touch sensitive screen, a scanner system, a microphone system, a connection to a sound system, and/or a connection and/or interface system to a computer system, intranet, and/or internet (e.g. IrDA, USB).
  • Memory system 206 may include may include, for example, any one of, some of, any combination of, or all of a long term storage system, such as a hard drive; a short term storage system, such as random access memory; a removable storage system, such as a floppy drive or a removable drive; and/or flash memory.
  • Memory system 206 may include one or more machine-readable mediums that may store a variety of different types of information.
  • the term machine-readable medium is used to refer to any medium capable carrying information that is readable by a machine.
  • One example of a machine -readable medium is a computer-readable medium.
  • Another example of a machine-readable medium is paper having holes that are detected that trigger different mechanical, electrical, and/or logic responses.
  • Memory 206 may include encryption/decryption code, generate passcode generator, and algorithms for authenticating transaction information, for example (memory 206 is discussed further in conjunction with FIG. 2B).
  • Processor system 208 executes the secure transactions on system 200.
  • Processor system 208 may include any one of, some of, any combination of, or all of multiple parallel processors, a single processor, a system of processors having one or more central processors and/or one or more specialized processors dedicated to specific tasks.
  • processor system 208 may include a network interface to connect system 200 to user system 101 via network 124.
  • processor 208 may execute encryption and decryption algorithms, which may generate the passcode with which the transaction information was encrypted.
  • processor 208 may decrypt secure messages from user system 101 and/or encrypt messages sent to user system 101.
  • Input/output system 214 may include devices that have the dual function as input and output devices.
  • input/output system 214 may include one or more touch sensitive screens, which display an image and therefore are an output device and accept input when the screens are pressed by a finger or stylus, for example.
  • the touch sensitive screen may be sensitive to heat and/or pressure.
  • One or more of the input/output devices may be sensitive to a voltage or current produced by a stylus, for example.
  • Input/output system 118 is optional, and may be used in addition to or in place of output system 202 and/or input device 204.
  • FIG. 2B shows an embodiment of a block diagram of the contents of memory system 206 of FIG. 2A
  • Memory system 206 may include instructions 220, which in turn may include a setup routine 222, an authentication of user routine 224, a request for authentication routine 226, completion of transaction routine 228, generate registration code 230, generate encryption key 232, generate passcode generator 234, perturb encryption key 236, perturb passcode generator 238, generate passcode 240, hash functions 242, and perturbing functions 244.
  • Memory system 206 may also store data 245, which may include registration code R 246, current encryption key K 248, current passcode generator G 250 , and transaction information S 252.
  • memory system 206 may not have all of the elements or features listed and/or may have other elements or features instead of, or in addition to, those listed.
  • the user may visit the location of service provider, where the service provider may collect the biometric print or the user, which is used by service provider system 200 for creating the template of the biometric print, the registration code, and/or the initial encryption key.
  • the user system 101 may obtain the biometric template, initial encryption key, and/or the registration code from service provider system 200 instead of the user system 101 collecting the biometric print, creating the biometric template, initial encryption key, and/or creating the registration code.
  • Authentication of user routine 224 may optionally receive and may process the initial request from initial request routine 160 of user system 101 to perform the transaction, which includes a passcode. Authentication of user routine 224 may decrypt the encrypted transaction information with the encryption key and generate the passcode from a
  • the passcode generator is perturbed (stored at service provider system 200) and the encryption key (stored at service provider system 200) is perturbed to obtain a new passcode generator and a new encryption key, respectively, so that the passcode generator and encryption key used by service provide system 200 is the same as (or sted differently is synchronized with) the passcode generator and encryption key used by user system 101.
  • each passcode is generated from a different passcode generator.
  • the passcode is generated from the passcode generator generated after generating the prior passcode, which may be generated any time after generating the prior passcode and before generating the current passcode, such as just after generating the prior passcode or just before generating the current passcode, so long as the passcode generator and encryption key of the service provider system 200 is the same as used by user system 101 for creating the passcode being authenticated.
  • service provider system 200 After authentication of user routine 224 authenticates the passcode sent from user system 101, service provider system 200 needs to be authenticated by user system 101 (e.g., so that the user knows that the service provider is not an imposter and thereby protect against man-in-the-middle attacks). Authentication of service provider routine 226 creates a new passcode, which is sent to the user system 101 for authentication. As part of authentication of user routine 224, service provider 200 perturbs the passcode generator, and applies a function (e.g., a one-way hash function) the combination of the passcode generator and the transaction information (which generates the new passcode).
  • a function e.g., a one-way hash function
  • both service provider system 200 and user system 101 In order for service provider system 200 to be authenticated, both service provider system 200 and user system 101 generate the new passcode from the same passcode generator and transaction information, and since the passcode generator is indirectly derived from the biometric print and in some embodiments indirectly derived from an unpredictable physical process. Since the transaction information is likely to vary with every transaction, the passcode is likely to be hard to duplicate by someone posing as the user or service provider. [1096] After sending the passcode for authenticating the service provider, service provider system 200 waits for a reply, including a new passcode and transaction information, to complete the transaction.
  • user authentication routine 224 Upon receipt of the passcode and an encrypted message, user authentication routine 224 again authenticates user system 101 by decrypting the encrypted message to obtain the new transaction information, perturbing the generating of the new passcode by applying a one way function to the combination of the passcode generator and the transaction information, and comparing the new passcode generated and the new passcode received. If the passcode is determined to be authentic, completion of transaction routine 228 completes the transaction using the transaction information sent from user system 101 by initial request routine 160 and/or completion of transaction routine 164. The transaction information sent by initial request routine 160 and completion of transaction routine 164 may be the same or different. In an embodiment, the transaction information sent from user system 101 to service provider system 200 are not known in advance.
  • the transaction information used and/or sent during initial request routine 160 may be information that is already known by service provider system 200, while the transaction information sent during transaction routine 164 (which is after user system 101 and service provider system 200 authenticated one another) may include some transaction information that was previously unknown to the service provider 200.
  • Initial request routine 160 may send a perturbation of a hash of an initial passcode and encrypted transaction information, to service provider system 200, and secure transaction routine 158 may wait for a reply, which will include a passcode that is dependent on the passcode generator and transaction information.
  • Generate registration code 230 is optional and may be the same as generate registration code 166. In an embodiment, both generate registration code 166 and 230 are present, and both user system 101 and service provider system 200 generate the registration code separately. Only one of generate registration code 230 and 166 is necessary, the registration code may be generated in one of user system 101 and service provider system 200, and sent to the other of user system 101 and service provider system 166, and in an embodiment of user system 101 and service provider system 166 does not generate the registration code.
  • Generate encryption key 232 are machine instructions that generate a new encryption key from (e.g., by applying a function, such as a perturbing function to) a prior encryption key.
  • Generate encryption key 232 may be the same routine as generate encryption key 170 except that generate encryption key 232 is implemented at service provider 200 and generate encryption key 170 is implemented at user system 101.
  • Generate passcode generator 234, which may be the same as generate passcode generator 172, are machine instructions that generate a new passcode generator from a prior passcode generator. In other words, generate passcode generator 234 may be an algorithm for generating a passcode generator from previous passcode generator.
  • Generate passcode generator 234 may combine (e.g., concatenate) the prior passcode generator with current transaction information and apply a one-way function (e.g., a one-way hash function) to the combination or may perturb the prior passcode generator.
  • Perturb encryption key 236 may be the same as perturb encryption key 174, and perturb encryption key 236 perturbs the current encryption key to thereby generate the next encryption key.
  • Perturb passcode generator 238 may be the same as perturb encryption key 175, and perturb passcode generator 238 perturbs the current passcode generator to thereby generate the next passcode generator.
  • Generate passcode 240 may be the same as generate passcode 176, and generate passcode 240 may generate a new passcode.
  • Generate passcode 240 may generate the passcode by applying a hash function to a combination of (e.g., a concatenation of) the passcode generator and transaction information.
  • Hash functions 242 may be the same as hash functions 178.
  • Hash functions 242 may be one a way functions, which may be used by generate registration code 230.
  • Hash functions 242 may be used to generate passcode 240.
  • Hash functions 242 may be used for generating a registration code from a biometric print and/or information from an unpredictable physical process and/or other user information.
  • Hash functions 242 may be used for generating a new passcode from the combination of a prior passcode and transaction.
  • hash functions 242 may include a different function for generate registration code 230 and generate passcode 240.
  • hash function(s) of hash functions 242 that are used by authentication of user routine 224, request for authentication routine 226, and completion of transaction routine 228 may be the same as one another or different from one another.
  • perturbing functions 244 may be used during each of authentication of user routine 224, request for authentication routine 226, and completion of transaction routine 228.
  • perturbing functions 244 and hash functions 242 are indicated as separate storage areas in from perturb encryption key 236 and perturb passcode generator 238, the perturbing functions may just be stored as part of the code for perturb encryption key 236 and perturb passcode generator 238.
  • Data 245 may include any data that is needed for implementing any of the routines stored in memory 206.
  • Registration key R 246 may be the same as registration code 186 and may be generated by applying a hash function to biometric print(s) and/or information from an unpredictable physical process, and may be used for generating passcode generators by perturbing the registration code or applying a hash code to the registration code.
  • FIGs. 3 A, 3B, 3C and 4-6 show methods for different parts of a secure transaction. The methods of FIGs. 3A-3C and 4-6 may be implemented on system 100.
  • FIG. 3 A shows a flowchart of an embodiment of method 300A of setting up user system 101 for securing transactions against cyber attacks.
  • User system method 300 A may be the setup performed by user system 101 before starting a secure transaction.
  • the biometric print information may be obtained from the user from a biometric sensor 111 in input system 110.
  • Method 300 A may also collect other setup information, such as a Personal Identification Number (PIN), a password, and/or a sequence or collection of images that are easy to remember.
  • PIN Personal Identification Number
  • the setup data that was collected may be denoted as a T.
  • a hash function ⁇ or any other one way method is applied on the biometric print information and other collected data T.
  • a hash function ⁇ is applied to T, one or more times denoted as ⁇ k (T), to create the registration code R which may be stored in secure area 102.
  • R ⁇ k (T).
  • the registration code is a sequence of symbols.
  • An example of a registration code with 16 symbols is "lAe58GnZbk3T4pcQ".
  • a registration code in hex format may be used:
  • a registration code with punctuation and other symbols may also be used.
  • transaction passcode generator G is computed.
  • transaction passcode generator G may be generated by applying a hash function ⁇ to registration code R.
  • G O(R).
  • transaction passcode generator G may be stored in secure memory system 104.
  • passcode generator and transaction passcode generator may be used interchangeably.
  • the transaction passcode generator G may be stored in secure memory system 104 and is a value (e.g., a number or sequence of symbols, such as alphanumeric characters) from which user system 101 may generate a one-time transaction passcode.
  • a one-way function may be applied to a combination of the transaction passcode generator G and transaction information to generate the one-time passcode.
  • Each transaction code generator may be generated from a prior transaction passcode generator, by applying a function to the prior passcode generator.
  • both the user system 101 and service provider system 126 separately generate each transaction passcode generator G and each one-way passcode.
  • the application of hash function ⁇ in step 306 may be skipped and the registration code is stored as an initial passcode generator.
  • a cryptographic key K may be generated.
  • the biometric print information T is divided into two parts U,W. U may be used to generate the registration code R and W is used to help generate an encryption key K that the user's secure area and the administrator only have access to.
  • the registration R code may be generated from the biometric print
  • the initial transaction passcode generator may be generated from the registration code
  • each subsequent passcode generator may be generated from the prior transaction passcode generator.
  • the transaction passcode generator may be used as the encryption key or may be generated by applying yet another one way function to the transaction passcode generator.
  • the registration code R generated in step 306 and the cryptographic key K generated in step 308 may be securely transferred to service provider system 126.
  • the secure distribution of R and K may be performed by a Diffie-Hellman key exchange.
  • a Diffie-Hellman key exchange is a key exchange method where two parties
  • Each element a in G has a unique inverse denoted as a '1 .
  • the integers ⁇ . . ., -2, -1, 0, 1, 2, . . . ⁇ with respect to the binary operation + are an example of an infinite group.
  • 0 is the identity element.
  • the inverse of 5 is -5 and the inverse of -107 is 107.
  • the set of permutations on n elements ⁇ 1, 2, n ⁇ , denoted as S n is an example of a finite group with n ⁇ elements where the binary operation is function composition.
  • Each element of 5 * n is a function p: ⁇ , 2, n ⁇ ⁇ 1, 2, n) that is 1 to 1 and onto.
  • p is called a permutation
  • H is a non-empty subset of a group G and H is a group with respect to the binary group operation * of G, then H is called a subgroup of G.
  • H is a proper subgroup of G if H is not equal to G (i.e., H is a proper subset of G).
  • G is a cyclic group if G has no proper subgroups.
  • This multiplicative notation (i.e. using superscripts) is used in the description of the Diffie-Hillman key exchange protocol described below.
  • Steps 1 , 2, 3, 4, and 5 describe the Diffie-Hellman key exchange.
  • Alice can encrypt a message m, as mg ab , and sends mg ab to Bob.
  • a result from group theory implies that the order of every element of a group divides the number of elements in the group, denoted as
  • . This means x 1 1 1 for all x in G where 1 is the identity element in G.
  • Bob calculates (g°)
  • ⁇ b (g
  • the user and the service provider 126 agree upon a common key for the registration key.
  • the user then encrypts one of the common keys with the registration key.
  • the service provider 126 encrypts the common key with other information, which may be information specific to the user or a random number, for example.
  • the user sends the encrypted common key (that was encrypted by the user with the registration) to the service provider 126, and the service provider 126 sends the encrypted common key that the service provider 126 encrypted to the user.
  • the user encrypts the encrypted common keys that was received from the service provider 126 with the registration key
  • the service provider 126 encrypts the encrypted common key received from the user (which was encrypted with the registration key) with the same information that was used to encrypt the original copy of the common key of the service provider 126.
  • both the user and the service provider 126 will now have the common encrypted key derived from the registration key supplied by the user and the information supplied by the service provider 126.
  • the resulting encrypted common key may be used as the registration key (instead of the original registration key).
  • the user system 101 and the service provider 126 may also agree upon a common key for the encryption key.
  • the common key of the encryption key and registration key may be the same as one another or different.
  • the user system 101 then encrypts one of the common keys and the encryption key.
  • the server encrypts the common key with other information, which may be information specific to the user or a random number for example (as was done for the registration key).
  • the user system 101 sends the encrypted common key (that was encrypted by the user with the encryption key) to the service provider 126, and the service provider 126 sends the encrypted common keys (which was encrypted service provider 126) to the user.
  • the user encrypts the encrypted common key that were received from the service provider 126 with the encryption key
  • the service provider 126 encrypts the encrypted common keys received from the user (which was already encrypted with the encryption key by the user) with the same information that was used to encrypt the original copy of the common keys of the service provider 126.
  • both the user and the service provider 126 will now have the common key encrypted by the encryption key supplied by the user and the information supplied by the service provider 126.
  • the resulting encrypted common key may be used as the encryption key (instead of the original encryption key).
  • the encryption key may be derived from the registration key by both the service provider 126 and user.
  • the secure transmission may use elliptic curve cryptography which is similar to the Diffie-Hellman exchange described previously.
  • the secure transmission R and K may use a camera that reads a proprietary pattern that the portable device is able to display after setup is complete.
  • the registration code R may be given to the administrator in the same physical place, such as at a bank, or the registration code may be mailed or electronically transmitted to the administrator if setup is accomplished remotely. In some applications, the registration code may be encrypted first and then electronically transmitted or sent by mail.
  • the number k in the operator ⁇ k () is the number of times that the operator ⁇ () is applied to R.
  • a new passcode generator is generated from which the new passcode is generated by applying ⁇ () to the prior value of the passcode generator and transaction information S k .
  • each of the steps of method 300A may be a distinct step. In other embodiments, method 300A may not have all of the above steps and/or may have other steps in addition to or instead of those listed above. The steps of method 300 A may be performed in another order. Subsets of the steps listed above as part of method 300A may be used to form their own method. In an embodiment, there could be multiple instances of method 300 A, each performed in response to performing another transaction or another part of the same transaction. The multiple instances of method 300A may be performed sequentially (e.g., each sequential instance performing the next part of a sequence of transactions or of a sequence of operations making up a single transaction) or in parallel.
  • FIG. 3B shows a flowchart of an embodiment of method 300B of setting up service provider system 126 for secure transactions against cyber attacks.
  • Service provider setup method 300B may be the setup performed by service provider 126 before starting a secure transaction procedure.
  • service provider 126 may receive registration code R, cryptographic key K along with user information such as name and account number.
  • service provider 126 generates the passcode and/or encryption key in parallel with user system 101 or instead of service provider 126.
  • each of the steps of method 300B may be a distinct step. In other embodiments, method 300B may not have all of the above steps and/or may have other steps in addition to or instead of those listed above. The steps of method 300B may be performed in another order. Subsets of the steps listed above as part of method 300B may be used to form their own method. In an embodiment, there could be multiple instances of method 300B.
  • FIG. 3C shows a flowchart of an embodiment of method 300C in system 100 for secure transactions against cyberattacks.
  • User system method 300C may be performed by user system 101 after the setup described in method 300A.
  • Method 300C may be an embodiment of initial request routine 160 (FIG. IB).
  • user system 101 may receive a request from a user (via an interface on the user system 101) to start a secure transaction with service provider system 126.
  • User system 101 may also receive biometric print information or other information from the user to authenticate the user.
  • Processor system 1 16 may send a request to secure processor system 106 to authenticate the user with the information stored during setup.
  • the terms authenticate, verify, and validate (and their conjugations) may be interchanged with one another to obtain different embodiments.
  • step 354 user system 101 receives transaction information from the user.
  • the transaction information SD may be stored either in secure memory system 104. In an embodiment, the transaction information is only stored in encrypted form in secure memory system 104, and nowhere else. In another embodiment, the transaction information may be stored unencrypted in the secure area 102 and/or elsewhere.
  • transaction information refers to one or more items of information that describe the transaction. For a payment transaction, one item may be the name of the person or entity sending the money. Another item may be the name of the person or entity receiving the money. Another item may be the date. Another item may be the sender's (entity's) account number. Another item may the receiving person's (entity's) bank account number. Another item may be the sender's (entity's) routing number. Another item may be the receiving person's (entity's) routing number. Another item may the amount of money which may be expressed in dollars, Euros, Yen, Francs, Deutschmark or another currency.
  • the transaction may be a stock trade.
  • the stock account number may be part of the transaction information.
  • the ticker symbol of the stock - for example, GOOG— being bought or sold may be part of the transaction information (or the name of a commodity or other item being purchased).
  • the number of shares may be part of the transaction information.
  • the price per share (or unit price) at which the person wishes to buy or sell the shares may be an item of the transaction information. If the stock purchase (or sale) is a limit order, then an indication that the stock purchase is a limit order may be an item of the transaction information.
  • an indication that the purchase is a market order may be an item of the transaction information.
  • the name of the stock account (e.g. Ameritrade, Charles Schwab, etc.) or broker may also be an item of the transaction information.
  • step 356 the transaction information S D may be encrypted with a key K, as
  • step 358 secure processor system 106 applies a hash function ⁇ to the first passcode generator G D stored in secure memory 104 (step 306) and the transaction information received S D in step 354 to generate a first one-time transaction-passcode P D .
  • P D 0(G D ,S D ).
  • the first transaction-passcode may be used once for the transaction S D , and the transaction passcode may be unique to every transaction and every use.
  • the one-time transaction passcode P D may be a sequence of symbols. In this specification passcode, transaction passcode, and onetime transaction passcode may be substituted one for another to obtain different
  • the one-time transaction passcode P D may dependent on the transaction information S D -
  • An example of a numeric passcode is "925438710".
  • An example of a transaction passcode may be a sequence of hexadecimal numbers "3 A 21 5B DE OF 99”.
  • An example of an alphanumeric passcode with 8 symbols may be "4zc8vNXA” and an example with 16 symbols including punctuation and other symbols is "&xL#WBq61 !j$uS_m”.
  • each time a user submits a valid biometric print to the passcode generator a new one-time transaction passcode is created from the current passcode generator G.
  • the service provider checks that the passcode is derived from one of the passcode generator in the database and the particular transaction information.
  • a new passcode is generated more frequently than every time a user submits a valid user authentication.
  • a new passcode may be generated every other time or on a random schedule that the user is unaware.
  • step 360 the current passcode generator G D is altered to generate a new passcode generator, the next passcode generator, for creating the next transaction passcode in the next use of the transaction system.
  • new G D ' f(Go), where there are an infinite number of functions that f could be.
  • the new value of G D (the second passcode generator) can be updated to f(G D , S D ) where the new passcode generator (the second passcode generator) is dependent on the transaction information S D -
  • the function f will be referred to as the perturbing function.
  • One possible perturbing function f could update the new transaction passcode generator to 0(G D , S D ).
  • An alternative perturbing function f could add 0(G D , S D ) to G D .
  • Another possible perturbing function f could xor G D and 0(G D , S D ).
  • Another possible perturbing function f could add 1 to G and permute the order of the symbols in G D using some randomly chosen permutation. Even another possible perturbing function f could add 1 to G D , and then permute the bits in G D .
  • G D could be used as a seed for a deterministic "pseudo-random" number generator, which is used as f to generate a new G D .
  • the one-time transaction passcode P D and encrypted transaction information E(S D , K) may be transmitted to a display or submitted directly to service provider 126.
  • the one-time transaction passcode P D may be encrypted before transmitting to the service provider 126 for additional security.
  • the one-time transaction-passcode P D (e.g., the first one time passcode) and encrypted transaction information M D may be displayed to service provider system 126, when the user is in the same physical location as service provider system 126.
  • the user may transmit the one-time transaction-passcode P D over a telephone.
  • the user may submit the one-time transaction- passcode P D and encrypted transaction information M D to the web browser and use the Internet for transmission to service provider system 126.
  • the user may submit the one-time transaction-passcode P D and encrypted transaction information M D by some other electronic means such as a fax machine or an ATM machine.
  • each of the steps of method 300C may be a distinct step.
  • method 300C may not have all of the above steps and/or may have other steps in addition to or instead of those listed above.
  • the steps of method 300C may be performed in another order. Subsets of the steps listed above as part of method 300C may be used to form their own method. In an embodiment, there could be multiple instances of method 300C.
  • FIG. 4 shows a flowchart of an embodiment of method 400 in a system 100 for securing transactions against cyber attacks, authenticating the user, and requesting authentication of the user to authenticate the service provider 126.
  • Method 400 may be performed by service provider 126 upon a request to perform a secure transaction.
  • Service provider 126 stores registration code R and encrypted key K during setup performed by method 300 A.
  • Method 400 may be an embodiment of a combination of authentication of user 224 and request for authentication routine 226 (FIG. 2B).
  • service provider system 126 receives one-time transaction passcode P D and encrypted transaction information M D , (sent in step 362).
  • step 406 compares the received one-time passcode P D and computes one-time passcode Ps. If the received one-time passcode and computed one-time passcode do not match, then method 400 proceeds to step 408.
  • step 408 service provider system 126 aborts the transaction.
  • method 400 may not have all of the above steps and/or may have other steps in addition to or instead of those listed above.
  • the steps of method 400 may be performed in another order. Subsets of the steps listed above as part of method 400 may be used to form their own method. In an embodiment, there could be multiple instances of method 400.
  • FIG. 5 shows a flowchart of an embodiment of method 500 in a system for authenticating the service provider and requesting completion of the transaction, for securing transactions against cyber attacks.
  • Method 500 may be performed by user system 101 after receiving transaction passcode Ps' and encrypted transaction information Ms from service provider system 126 after method 300C.
  • Method 500 may be an embodiment of
  • transaction information may initially be sent as part of method 300C, the transaction is not committed as a result of method 300C, but instead is committed on the basis of the transaction information sent in method 500.
  • Method 500 is an embodiment of authentication of service provider 162.
  • step 504 the decrypted transaction information S D ' is compared with the stored transaction information S D (stored in step 354) to further verify whether the service provider system 126 received the correct transaction information. If the received (and optionally decrypted) transaction information does not match the stored (and optionally decrypted) transaction information, method 500 proceeds to step 518. If the received and generated second transaction passcode match and/or the received and stored transation information match, method 500 proceeds to step 506.
  • the next transaction passcode (the second transaction passcode) is only generated just before the next transaction passcode is needed (e.g., milliseconds before the next transaction passcode is needed) and then deleted immediately after use so that the transaction passcode never exists for more than a few millisecond or for more than a few seconds.
  • step 508 the received transaction passcode Ps' (computed in step 412 and sent from service provider system 126) is compared with the computed (or generated) transaction passcode P D ' to verify that user system 101 is communicating with service provider 126. If the passcodes do not match, then method 500 proceeds to step 518.
  • step 516 the encrypted transaction information M D ' (now encrypted with the third encryption key) and the transaction passcode P D " (the third transaction passcode) are transmitted to service provider system 126.
  • step 508 if the decrypted transaction information does not match the stored transaction information, method 500 proceeds to step 518.
  • step 518 method 500 aborts the transaction which may be due to a mismatch in transaction passcode or a mismatch of transaction information.
  • each of the steps of method 500 may be a distinct step.
  • method 500 may not have all of the above steps and/or may have other steps in addition to or instead of those listed above.
  • the steps of method 500 may be performed in another order. Subsets of the steps listed above as part of method 500 may be used to form their own method. In an embodiment, there could be multiple instances of method 500.
  • FIG. 6 shows a flowchart of an embodiment of method 600 in a system for completing secure transactions against cyber attacks.
  • Method 600 may be performed by service provider system 126 after receiving one-time transaction passcode P D " and encrypted transaction information M D ' (after step 516).
  • Method 600 may be an embodiment of completion of transaction routine 228.
  • step 601 method 600 receives the transaction passcode and encrypted transaction information for the second time (which were sent in step 516 of method 500, FIG. 5).
  • step 608 the received transaction passcode P D " (sent from user system 101 in step 516) is compared with the computed transaction passcode Ps" to verify that service provider 126 is communicating with the correct user system 101. If the passcodes do not match, method 600 proceeds to step 614 where the method 600 terminates.
  • step 610 method 600 compares the decrypted transaction information Ss' with the stored transaction information Ss (stored in step 354) to further verify whether the service provider system 126 received the correct transaction information. If the decrypted transaction information does not match the stored transaction information, method 600 proceeds to step 614 where the method terminates.
  • step 612 service provider 126 completes the transaction requested by user system 101. Method 600 transfers control to step 614 from either step 608 or step 610. In step 614, method 600 aborts the transaction which may be due to an invalid transaction passcode or a mismatch in transaction information.
  • each of the steps of method 600 may be a distinct step.
  • method 600 may not have all of the above steps and/or may have other steps in addition to or instead of those listed above.
  • the steps of method 600 may be performed in another order. Subsets of the steps listed above as part of method 600 may be used to form their own method. In an embodiment, there could be multiple instances of method 600.
  • Methods 300B, 400, 500 and 600 may be repeated every time the user would like perform a transaction, and the passcode, passcode generator, and optionally the encryption key are further updated to new values as a result of the repetition.
  • FIG. 7 shows a diagram of a browser showing the recipient information being entered into the web browser.
  • transaction information T to be entered into the web browser and part of the transaction information S will come from the secure area.
  • transaction information T for the recipient may be entered directly into the web browser.
  • Transaction information may contain the recipient's name on the account; the name of the bank or financial institution; the recipient's account number and other important items such as the routing number.
  • the user's transaction information S may be entered into the secure area of the device during setup (enrollment). This may occur when the bank or financial account is opened. The user's transaction information S may be entered after the account is opened at the financial institution or remotely on the device.
  • the unpredictable noise may come from a physical process using one or more photo-transistors.
  • the unpredictable noise and/or biometric data is used by the user system 101 to generate a seed ⁇ and in at least one embodiment a cryptographic key K. Then seed ⁇ and key K are securely transmitted to the administrator.
  • the secure distribution of seed ⁇ and cryptographic key K may be performed by a
  • service provider system 126 may generate ⁇ and key K from biometric data and/or unpredictable noise (e.g., while the user visits the offices of the service provider), and the seed and key are sent from service provider 126 to user system 101.
  • the distribution and transmission of seed ⁇ and cryptographic key K may use elliptic curve cryptography for creating the cryptographical key K and/or for the encryption used in the Diffie-Hellman key exchange.
  • the secure transmission of seed ⁇ and encryption key K may use a camera that reads a proprietary pattern that the portable device is able to display after setup is complete.
  • the seed ⁇ may be given to the administrator in the same physical place, such as at a bank, or the seed may be mailed or electronically transmitted to the administrator if setup is accomplished remotely.
  • the seed may be encrypted first and then electronically transmitted or sent by mail.
  • administrator and service provider 126 may be interchanged to obtain different embodiments and terms of use.
  • user system 101 and user may be substituted one for another to obtain different embodiments except in discussion of the user interacting with user system 101.
  • the user presents user information, which may include his / her biometric attributes one or more times to a sensor.
  • Setup may also request the user to present information that he or she knows.
  • the information that the user knows may be a PIN, password, or a sequence or collection of images that are easy to remember.
  • the following steps are executed:
  • Step 1 Biometric print information, unpredictable noise from hardware in the secure area and other items (e.g., images, PIN, etc.) obtained from the setup, denoted as user information T, are used to create a seed ⁇ .
  • a hash function ⁇ is applied to user information T, one or more times denoted as O k (T), to create the seed ⁇ .
  • O k (T) O k (T)
  • D k (T).
  • user information T is divided into two parts U, W as described in the previous section and U is used to generate the seed and W is used to generate an encryption key K, which the user's secure area and the administrator only have access to.
  • the hash function may be used so for example, SHA-1 may be applied to one part of the user information U one or more times and Keccak may be applied to the other part of the user information W one or more times.
  • Step 2. The seed ⁇ and the cryptography key K are transmitted to a passcode display or possibly encrypted and wirelessly transmitted to the administrator.
  • Step 3 The seed ⁇ is securely displayed to the administrator in the same physical place or possibly decrypted by the administrator if received from a remote location and stored in a secure area maintained by the administrator.
  • Steps A, B, and C help prevent an un-trusted browser attack or other cyberattack from compromising the transaction.
  • TRANSACTION STEP A The person (user) securely enters transaction information into the secure area 102 of his device (e.g., user sytem 101) and the transaction information is securely transmitted to the backend administrator (user's bank account that verifies the person and executes the transaction) (e.g., at service provider 126).
  • the backend administrator user's bank account that verifies the person and executes the transaction
  • A.1 The person selects and enters transaction information I into the secure area 102 of user system 101.
  • A.2 Transaction information I is encrypted in secure area 102 with key K denoted as E(I, K).
  • K denoted as E(I, K).
  • the transaction seed ⁇ is retrieved or reconstructed from a secure area 102.
  • the current time i is read.
  • a hash function ⁇ is applied to transaction seed ⁇ and transaction information I, denoted as ⁇ ( ⁇ , I , Ti), to create the one-time transaction passcode P.
  • P ⁇ ( ⁇ , I , Xi).
  • the one-time transaction passcode P and encrypted transaction information E(I, K) may transmitted from user system 101 to a display or submitted directly to the administrator at service provider system 126. During transmission, in some embodiments P may be encrypted for additional security.
  • the user may submit the passcode and encrypted transaction information by some other electronic means, such as a fax machine or an ATM machine.
  • the current time Xi is determined and rounded to the nearest minute, for example.
  • the sender and receiver may compute the difference in time between the clock of the sender and the clock of the receiver prior to sending a message in case the two clocks are not sufficiently synchronized.
  • the time may be rounded to the nearest 5 minutes, the nearest, 10 minute, or the nearest hour, for example.
  • the reference time is GMT time. For example, if the exact time is 19:05 and 45 seconds, then i is set to is 19:06 pm.
  • the current time Xi is determined and rounded to the nearest 90 second. In other embodiments, the current time % ⁇ is determined and rounded to the nearest 5 minutes. In these embodiments, if the exact time is 6:07 and 57 seconds, then Xi is set to 6: 10.
  • the administrator e.g., via service provider system 126) verifies the transaction passcode and verifies the encrypted transaction information and then executes this transaction if the transaction passcode is valid based on the decrypted transaction information, the same seed and the current time. In this specification the words "valid" and "authenticated” and their conjugations may be substituted one for another to obtain different embodiments. If the transaction passcode is determined to not be correct, or the decrypted transaction information is unreadable, then the transaction is aborted. In other embodiments, the administrator continues with transaction steps B and C before the transaction is executed.
  • TRANSACTION STEP B The administrator (bank) receives at service provider system 126 the encrypted transaction information and one-time transaction passcode.
  • the administrator decrypts the transaction information and checks that the onetime transaction passcode is correct (e.g., the decrypted transaction information, the seed, and the time at which the passcode was generated are encrypted with a one-way hash function thereby computing the passcode, and the computed passcode is compared to a newly sent passcode to determine if there is a match.). If the one-time transaction passcode received from the user is not correct (e.g., if the sent passcode does not match the computed passcode), the transaction is aborted, and no transaction occurs.
  • the function is not applied to the seed ⁇
  • f is a function that both the user and administrator both know.
  • the encryption key K may be updated, denoted as ⁇ ( ⁇ ), using similar methods to the update of the transaction passcode generator. Then the encrypted transaction information E(I, ⁇ ( ⁇ )) or E(I, K) is sent from the administrator (bank) back to the user. (Updating the encryption key K helps address sniffing and replay attacks.)
  • TRANSACTION STEP C The user, via user system 101 , verifies that he or she is communicating to the correct administrator (bank) at service provider system 126 by checking the next passcode ⁇ ( f(a), I , x 2 ) based on the user's current time and the user's seed. The user, via user system 101, further verifies that the transaction information has not changed by decrypting E(I, ⁇ ( ⁇ ) ) or decrypting E(I, K) and checks that the administrator knows that the transaction information is still I. In some embodiments, the user may check the transaction information and associated transaction passcode by reading them from a display screen that can only be accessed by the secure area. If the verification or check are invalid, then the transaction is aborted.
  • the user submits a new transaction passcode ⁇ ( f(f(a)), I , x 3 )) and also E(I, ⁇ ( ⁇ ( ⁇ )) ) back to the administrator. If these values received by the administrator, at service provider system 126, are valid, the transaction is successfully executed by service provider system 126. Otherwise, the administrator (bank), via service provider system 126, aborts the transaction.
  • the administrator can speed up the search process, by replacing previous steps by the following: [1159]
  • the administrator uses an index U or other identifier associated with transaction passcode P, and uses index U to find the corresponding passcode generator Gu- Alternatively a user identifier may be sent as a separate data item to the administrator.
  • the passcode generator for each user can be indexed by the user number or index U in a database.
  • the administrator applies a hash function ⁇ to Gu, S denoted as 0(Gu, S), and compares it to P.
  • user system 101 and service provider system 126 may be out of synchronization.
  • user system 101 may be configures so as to revert back to the prior passcode and passcode generator is the transaction does not complete, another error may occur causing the passcode and passcode generator at user system 101 to be out of synchronization with the passcode and passcode generator at service provider system 126.
  • user system 101 and/or service provider system 126 may be capable of specifying a particular passcode generator according to the number of times (k) that ⁇ or f is applied. In an embodiment the k that is specified should be large enough to ensure that the same passcode is never used twice.
  • the administrator may request the 1 19 th passcode (or yet another number passcode, N2) and the user will send the 119 th passcode (or the N2 passcode).
  • the passcode requested may be encrypted.
  • the user may communicate to the administrator, please request a passcode greater than 124 th passcode (N3).
  • the administrator may request the 1001 st passcode from the user (or another number passcode N4, where Nl ⁇ N2 ⁇ N3 ⁇ N4).
  • computer program E there is computer program E that performs an important functionality.
  • computer program is executable code that has been compiled from source code such as C or C++ or FORTRAN.
  • computer program may refer to virtual machine code.
  • a computer program written in the source code language JAVA compiles to java virtual machine code, which is then executed on the JAVA virtual machine. It is important that the functionality of computer program E is not be disabled by malware.
  • E may unlock the brakes.
  • some computer program E may turn off an engine.
  • computer program E may start the turbines in a dam.
  • computer program E may carry out a financial transaction between two financial institutions.
  • computer program E may execute inside a router and help transmit data packets over the internet.
  • computer program E may regulate the water flow in a nuclear power plant.
  • computer program E may run the infrastructure in an oil refinery plant.
  • malware there are methods used to prevent malware from changing or corrupting the functionality of some computer program E, which may be in the form of executable code.
  • the methods that protect against malware may be combined in various ways in different embodiments.
  • One method is to authenticate the computer code. This means that the method assures that the purpose or functionality of the computer code is not altered. This method is helpful in cyber security as some kinds of malware change or sabotage the purpose of the computer program.
  • malware may lock the brakes in an automobile when the driver did not press on the brake pedal. Sometimes, the malware may reach the network of the automobile via wireless access.
  • One method is for the authentication to occur by creating a signature S for correct computer program E and making all other programs that call or request the functionality from computer program E to communicate to computer program E that they know this signature.
  • D(V, S) may be transmitted to computer program E along with a request to execute computer program E.
  • Computer program E validates the signature by decrypting with public key P and then checking that S is a valid signature for computer program E.
  • the signature S may be created at the time of programming the chip that contains computer program E.
  • signature S may be created later after the vehicle is registered with one or more owners. This might occur after the automobile has been purchased by an owner.
  • computer program E may have functionality that executes a financial transaction for a financial institution such as a bank or investment fund or even a government institution such as the post office, the IRS or Freddie Mac.
  • the user interface may be connected to the secure area of the device may have a display screen and navigation buttons or character entry of letters, numbers or symbols using a touch sensitive screen.
  • the device may have a USB connection.
  • the device containing the secure area 102 may contain a wireless chip and a battery.
  • the device may be a mobile phone.
  • FIG 8 shows a display screen.
  • the display screen may be an OLED. In other embodiments, the display screen may use an LCD.
  • some or all of the financial institution members of SWIFT may be stored into the secure area of the chip inside the device when the user registers with the bank or opens an account.
  • the user may use the navigation buttons, and/or character entry of letters, numbers or symbols using a touch sensitive screen and a display screen to scroll and select one of the banks to make a transaction with.
  • the user may use navigations buttons or a touch sensitive screen and display screen to scroll and select other transaction information stored in the secure area of the chip.
  • the user may use the navigation buttons and display screen to scroll and select letters or words that help enter transaction information.
  • the user may be an employee of the bank.
  • the device may be used to securely execute wire transfers between two banks.
  • the device containing the secure area may contain a microphone.
  • the secure area of the chip may contain speech recognition code to receive transaction instructions or information from the user.
  • the device may have one or more biometric sensors.
  • the display screen may act as a keyboard for entering passwords and transaction information.
  • the display screen may enable the user to verify that the transaction information is correct or has not been tampered with by malware before executing the transaction.
  • each passcode generator is not stored in a database but stored in a separate chip which is indexed by the user's name and/or user id.
  • the function call trxl _passcode(user_name, routing jmmber, trx_amouni) is passed in the user's name, userjiame, the user's routing number, routing jiumber, and the transaction amount, trx_amount, and trxl _passcode returns a transaction passcode that the bank expects to be the correct passcode.
  • the returned transaction passcode is compared to the transaction code received from the user's device. This embodiment protects the passcode generator, because the passcode generator never leaves the separate chip.
  • each pass code ⁇ generator is stored in an embedded database.
  • the passcode generator the passcode generator
  • the passcode generator, passcode _generator is a sequence of bytes of the form:
  • the passcode generator, passcode ⁇ generator may be substantially longer.
  • passcode ⁇ generator may have a length of 2048 bytes or 65,536 bytes.
  • Alex Barangan An example of a user iame is Alex Barangan.
  • An example of a routing iumber is string "124000379”.
  • An example of trx_amount is "$5000".
  • Cryptor is the name of function that encrypts or decrypts transaction data.
  • the function the decrypts and encrypts transactions may execute a symmetric cryptography algorithm such as AES-256.
  • function that encrypts or decrypts transaction data, cryptor may execute an asymmetric cryptography algorithm such as RSA or ECC (Elliptic curve cryptography).
  • ciperjext is an encypted string of the form "A1092BFF . . . 55.”
  • keyjbytes is the variable storing the key that is used by cryptor to decrypt ciperjext.
  • keyjbytes is a string of the form "7BCAF22D . . . 0E38".
  • keyjbytes may have length of 32 bytes.
  • keyjbytes may have length of 2048 bytes.
  • the decrypted ciphertext may be returned in the string ciperjext.
  • plain Jext is a string of the form "User: Alex Barangan. Account Number: 121456789-3456789956. Bank: Wells Fargo. Amount: $5000.
  • keyjbytes is a string of the form "7BCAF22D . . . 0E38". In an alternative embodiment, keyjbytes may have the string "123 202 242 45 . . . 14 156". In an embodiment, keyjbytes may have length of 32 bytes. In another embodiment, keyjbytes may have length of 2048 bytes. In an embodiment, the encrypted ciphertext may be returned in the string plain Jext.
  • TRANSACTION DEMO STEPS [1179] Some of the details of these steps are for pedagogical purposes in order to teach or demonstrate to a potential licensee how the underlying security works.
  • Step 1. Enter transaction information into the secure area.
  • the transaction information may be
  • Step 2 The secure area displays in encrypted form the transaction information on the display screen (e.g., an organic light emitting diode OLED).
  • the encrypted transaction information is not displayed, but is wirelessly sent to the web browser or backend.
  • Step 3 A user with privileged access to the secure area manually enters this encrypted information read off the display along with a one-time passcode into that browser at a webpage, such as www.biogy.com/TRX. Similarly, in at least some production version the encrypted transaction information with the one-time passcode is sent automatically to the system that would from the secure area of the user system to the service provider system.
  • the format of the information may be
  • trx _passcode is the variable for storing the passcode
  • encjiame is the variable for storing the name
  • enc _r outing _number is the variable for storing the routing number
  • enc_trx_amount is the variable for storing the transaction amount.
  • Step 4 A web browser checks trx _passcode and makes the following executable calls:
  • routing _number is returned
  • next jgenerator catches returned value of authenticate jpasscode x . . .
  • Routing Number enc2_routing_number
  • Step 5 The encrypted fields are read by the person off the browser, entered back into the secure area. In at least some production versions the encrypted information is automatically transmitted from the service provider system back into the secure area. The personal vault or secure area checks to see that new encrypted information matches the transaction information sent in step 1. If there is a match, the match confirms that the backend actually has the correct transaction information.
  • Step 6 If there is a match, the vault sends a new passcode passcode _authorize and new encrypted transaction info back (resulting from a thirrd encryption) to web browser to authorize the transaction.
  • the information sent may include Passcode: passcode _authorize
  • An interface retrieves the passcode generator, passcode generator, from a database.
  • trx_passcode (name, routing number, trx amount, passcode generator), in which the transaction passcode (trx_passcode) is computed based on the name on the account (name), the routing number (routing number), the transaction amount trx_passcode (trx amount), and passcode generator (passcode generator).
  • authenticate_passcode x name routing number trx amount passcode generator where: name is plaintext string of the form "Alex”.
  • routing number is plaintext string of the form "124000379".
  • trx_amount is plaintext string of the form "123456789”.
  • passcode ⁇ generator is a string of the form "123 202 242 209 45 135 94 15 35 47 254 219 125 35 14 19'
  • cryptor xd ciper ext key_bytes
  • ciperjext is encypted of the form "127 134 147 189 209 . . . 234"
  • key_bytes is a string of the form "123 202 242 209 45 135 94 15 35 47 254 219 125 35 14 19".
  • the trx _passcode function returns a decrypted string of the form "97 84 57 92 201 . . . 207" embodiment, cryptor xd uses an internal static _key cryptor xe plain Jext key_bytes
  • plainjext is string of the form "127 134 147 189 209 . . . 234"
  • key_bytes is string of the form
  • cryptor xe uses an internal static_key
  • FIG. 9 shows a screenshot of an embodiment of user interface 900, which is for entering the registration of a user.
  • Figure 9 has user name field 902, registration code field 904, register button 906 and authentication link 908.
  • user interface 900 may not have all of the elements listed and/or may have other elements instead of or in addition to those listed.
  • User name field 902 may be an input box to enter the user name as entering during the setup.
  • Registration code field 904 may be the registration code received during setup that a user enters to perform a transaction.
  • Selecting register button 906 enables a user to register for being able to execute transactions.
  • Selection of authentication link 908, displays an authentication screen.
  • FIG. 10 shows an embodiment of a screenshot of a user interface 1000, which is an embodiment of a user interface for authenticating a passcode.
  • User interface 1000 has username field 1002, passcode field 1004, transaction name field 1006, transaction routing field 1008, transaction amount field 1010, enter button 1012 and registration code link 1014. In other embodiments, user interface 1000 may not have all of the elements listed and/or may have other elements instead of or in addition to those listed.
  • User name field 1002 is an input box to enter the name of the user as registered during setup.
  • Passcode field 1004 is the passcode obtained during setup, transaction name 1006.
  • Transaction routing field 1008 maybe the routing number of the service provider.
  • Transaction amount field 1010 is the transaction amount. Enter button 1012 when selected authenticates the passcode.
  • Registration code link 1014 when selected displays a screenshot similar to user interface 900.
  • Step 1 The user enters transaction information into the secure area 102. Name: Alex Barangan
  • Step 2 The secure area 102 displays in encrypted form the transaction information on the display (e.g., Organic Light Eitting Diode (OLED) or other display screen).
  • OLED Organic Light Eitting Diode
  • Step 3 The users with privileged access to the secure area 102 may manually enter this encrypted information to read off the display along with a one time passcode into a browser or this may be transmitted automatically. In at least some production versions, the encrypted information is transmitted automatically without being read off the display and manually entered.
  • An example user interface 1000 is shown in FIG. 10. In the remainder of the example, the variables and functions that are used to represent the encrypted information is as follows.
  • trx _passcode is output passcode, which results from a function that produces the passcode, using enc iame, enc_routing_number, and enc_trx_amount as the inut variables, (The above encrypted information depends on entering this information directly into the device in step 1.)
  • the correct passcode depends on the name, routing number, transaction amount and the passcode generator.
  • the function trx_passcode may return the correct passcode.
  • Step 4 The web browser checks the passcode, trx _passcode.
  • the interface code may make the following executable calls for encrypting the transaction information.
  • cryptor xd is an encryption function with two input variable that are encrypted together to return an encrypted output.
  • the following instruction authenticates the passcode, name, transaction amount, and routing number authenticate _passcode x name routing iumber trx_amount passcode generator trx jpasscode
  • next jgenerator catches returned value of authenticate jpasscode x . . .
  • Step 6 If the information matches, the demo device sends a new passcode passcode _authorize and new encrypted transaction information back (resulting from a third encryption) to the web browser to authorize the transaction.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Software Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Methods and systems are provided for performing a secure transaction. Users register biometric and/or other identifying information. A registration code and an encryption key are generated from the biometric information and/or information obtained from a unpredictable physical process and are stored in a secure area of a device and also transmitted to a service provider. A transaction passcode generator may be computed based on the stored registration code. In at least one embodiment, a unique transaction passcode depends upon the transaction information, so that on the next step of that transaction, only that unique transaction passcode will be valid. In an embodiment, the passcode includes the transaction information. In at least one embodiment, if the transaction information has been altered relative to the transaction information stored in the device's secure area, then the transaction passcode sent during this step will be invalid and transaction may be aborted.

Description

SECURING TRANSACTIONS AGAINST CYBERATTACKS
CROSS-REFERENCE TO RELATED APPLICATIONS
[1001] This application claims the benefit of U.S. Provisional Patent Application
61/626,485 entitled, SECURING FINANCIAL TRANSACTIONS AGAINST
CYBERATTACKS, by Michael Stephen Fiske, filed September 25, 2011, the entire contents of which are incorporated herein by reference; this application claims the benefit of U.S. Provisional Patent Application 61/659,376 entitled, SECURING TRANSACTIONS
AGAINST CYBERATTACKS, by Michael Stephen Fiske, filed June 13, 2012, the entire contents of which are incorporated herein by reference; this application claims the benefit of U.S. Patent Application 13/541,733 entitled, SECURING FINANCIAL TRANSACTIONS AGAINST CYBERATTACKS, by Michael Stephen Fiske, filed July 04, 2012, the entire contents of which are incorporated herein by reference.
FIELD OF THE INVENTION
[1002] This specification relates to computer security.
BACKGROUND
[1003] The subject matter discussed in the background section should not be assumed to be prior art merely as a result of its mention in the background section. Similarly, a problem mentioned in the background section or associated with the subject matter of the background section should not be assumed to have been previously recognized in the prior art. The subject matter in the background section merely represents different approaches, which in and of themselves may also be inventions. A shortcoming in the prior art, recognized by this specification, is that there is a lack of a secure integration of the identity of the user to the protection of the user's data and the control of the user's computer. A critical part of the computer instructions for an action or a transaction are usually executed on the host domain machine (e.g., the user's computer). Some examples of the user's computer are a Mac Book Pro, a Dell desktop computer, an IPhone, a Blackberry or an Android phone. Currently cryptography keys are stored on the user's computer or a chip executing the operating system, which is not secure. For example, when Bob's computer communicates with Mary's computer, even when using well-implemented Public Key Infrastructure (PKI), Bob's computer can only be sure that it is communicating with Mary's computer. Bob can not be sure that he is communicating with Mary and vice versa. Similarly, even Bob cannot be certain that the communications he sends Mary the same as the communications that Mary receives as coming from him.
[1004] Sending a secure communication using Public Key Infrastructure (PKI) from one user machine to another user machine ensures communication between the user machines, but may not ensure secure communication between the users of the machines. Continuing, with the above example, as a result of the use of a Public Key Infrastructure, although Mary may be reasonably sure that Mary's machine is communicating with Bob's machine, Boris may be operating one or more computers in Russia and may have remotely broken into Bob's computer and may be using Bob's machine and pretending to be Bob.
[1005] In the prior art, each computer cannot be assured of who controls the other computer. For example, even when a user is present, an intruder (e.g., a hacker) may be physically located thousands of miles away, but is remotely logged onto the user's machine and hijacking the user's intended action(s). Even the Trusted Platform Module (TPM) has the fundamental cyber security weakness of not knowing who controls the other computer with which a user may be in communication with or who controls the computer which contains the Trusted Platform Module. Not knowing the other computer with which a current computer is in communication with may be a weakness that is significant when the operating system can directly access the TPM. If the user's computer is compromised, then the attacker can access the TPM. Another limitation and weakness of the TPM is that there is no mechanism for binding the identity of the user to the user's cryptography keys and other confidential information that should be bound to the user's true identity.
[1006] Another shortcoming of cyber security is that a secure link is missing between the authentication of a valid user, and the authorization of an action. The authorization of an action could be the execution of a financial transaction from a user's bank account, a stock trade in a user's brokerage account, the execution of an important functionality on the electrical grid, or access to important data on a private network such as SIPRnet (e.g.
WikiLeaks).
[1007] The authorization of an action typically occurs through the web browser since the web browser presents a convenient interface for a person. However, the web browser is where the important connection between authentication of a user and authorization of an action may be broken. Existing systems have the user authenticating the user's computer, and then the same user's computer also authorizes (and may also execute) the action. Since the user's computer can be hacked, the lack of a secure and direct link between authenticating the user's computer and authorizing the action may render the act of user verification irrelevant.
[1008] Part of the disconnect (vulnerability) between authenticating the user and authorizing the user's action occurs, because authentication (e.g., biometric authentication) is typically and naively represented as an on/off switch. That is, after the user has been authenticated and the initial transaction approved, the remainder of the session is assumed to be secure and all actions after authentication are assumed to be legitimate, without performing any further checks. In the same way, if this on/off implementation occurs in an untrusted computing environment, then outstanding biometric algorithms and sensor(s) become irrelevant because the biometric authentication can be circumvented between the user authentication and the authorization or confidentiality part of the security system.
[1009] The use of biometrics can be advantageous for security, because biometrics offers a reliable method for verifying who (the person) is that is actually initiating a transaction. However, even with the use of biometrics, if the handling of the biometric information, the storage of the biometric data, or the control of actions based on a biometric verification is done on an unsecured user's computer, the value of the biometrics may be greatly reduced or nullified.
[1010] An additional aspect of the weakness of current authentication and
authorization processes (such as those using biometrics) is that the action can be hijacked by executing a Trojan attack on the user's computer, for example. A Trojan attack is an attack in which the attacker pretends to be the user and/or the other system to which the user is communicating with. In other words, a valid, authorized user cannot verify that the action he or she is trying to execute is what is actually being executed, because a third party may be masquerading as the other system.
[1011] An example of this weakness is the untrusted browser attack used to divert money from a user's bank account. Mary's web browser may display to her that she is about to send $500 to Bob's account, but in reality her untrusted browser is configured to send $50,000 to a thief s bank account.
[1012] Since the web browser is executed on the user's computer, the browser cannot be trusted even when using PKI and one-time passcodes! A recent untrusted browser attack on the gold standard of security, RSA SecurlD, demonstrates this surprising fact. The consequences of this particular cyberattack were that $447,000 was stolen from a company bank account in a matter of minutes, even though the valid user was using one-time passcodes to make the transaction more secure. The details of this cyberattack are quoted below in a MIT Technology Review, entitled "Real-Time Hackers Foil Two-Factor
Security," September 18, 2009, which states, "In mid- July, an account manager at Ferma, a construction firm in Mountain View, CA, logged into the company's bank account to pay bills, using a one-time password to make the transactions more secure. Yet the manager's computer had a hitchhiker.
[1013] A forensic analysis performed later would reveal that an earlier visit to another website had allowed a malicious program to invade his computer. While the manager issued legitimate payments, the program initiated 27 transactions to various bank accounts, siphoning off $447,000 in a matter of minutes. "They not only got into my system here, they were able to ascertain how much they could draw, so they drew the limit," says Roy Ferrari, Ferma's president. The theft happened despite Ferma's use of a one-time password, a six- digit code issued by a small electronic device every 30 or 60 seconds. Online thieves have adapted to this additional security by creating special programs—real-time Trojan horses— that can issue transactions to a bank while the account holder is online, turning the one-time password into a weak link in the financial security chain. "I think it's a broken model," Ferrari says. Security experts say that banks and consumers alike need to adapt— that banks should offer their account holders more security and consumers should take more steps to stay secure, especially protecting the computers they use for financial transactions. 'We have to fundamentally rethink how customers interact with their banks online,' says Joe Stewart, director of malware research for security firm Secure Works, in Atlanta, GA. 'Putting all the issues with the technology aside, if [attackers] can run their code on your system, they can do anything you can do on your computer. They can become you."
[1014] A third fundamental shortcoming of current cybersecurity solutions is the fact that static authentication factors, such as passwords, PINs and biometrics, are entered directly into the user's computer or stored on computers that can be accessed in the network domain. The host domain and network are untrusted environments. This weakness makes static authentication factors vulnerable to phishing attacks in the host domain or security breaches in the network domain. Furthermore, some biometric factors are immutable, and if an immutable biometric factor is compromised, then the reuse of the compromised biometric factor reduces the security of the system.
BRIEF DESCRIPTION OF THE DRAWINGS
[1015] In the following drawings like reference numbers are used to refer to like elements. Although the following figures depict various examples, the one or more implementations are not limited to the examples depicted in the figures.
[1016] FIG. 1 A shows a block diagram of an embodiment of a system for secure transactions against cyberattacks;
[1017] FIG. IB shows a memory system that is a component of the system shown in
1A.
[1018] FIG. 2 A shows a block diagram of an embodiment of a service provider system;
[1019] FIG. 2B shows memory system that is a component of the system in FIG. 2A.
[1020] FIG. 3 A shows a flow diagram of an embodiment of a user- side method of setting up a system before starting a secure transaction;
[1021] FIG. 3B shows a flow diagram of an embodiment of a service provider-side method of setting up a system before starting a secure transaction;
[1022] FIG. 3C shows a flow diagram of an embodiment of a user-side method of initiating a secure transaction;
[1023] FIG. 4 shows a flow diagram of an embodiment of a service provider-side method of authenticating the user and requesting authentication;
[1024] FIG. 5 shows a flow diagram of an embodiment of a user system- side method of authenticating the service provider and requesting completion of the transaction;
[1025] FIG. 6 shows a flow diagram of an embodiment of a service provider system- side method of completing the transaction;
[1026] FIG. 7 shows a diagram of an embodiment of a browser with the recipient information being entered into the web browser; [1027] FIG. 8 shows an embodiment of a display screen that may use an LCD;
[1028] FIG. 9 shows a screenshot of an embodiment of user interface for entering the registration code of a user;
[1029] Fig. 10 shows an example of a user interface for performing a secure transaction.
DETAILED DESCRIPTION
[1030] Although the issues discussed in the background or elsewhere may have motivated some of the subject matter disclosed below, nonetheless, the embodiments disclosed below do not necessarily solve all of the problems associated with the subject matter discussed in the background or elsewhere. Some embodiments only address one of the problems, and some embodiments do not solve any of the problems associated with the subject matter discussed in the background or elsewhere. In general, the word "embodiment" is used to specify an optional feature and/or configuration.
[1031] Security solutions are provided for secure transactions against untrusted browser attacks and other cyberattacks. In some embodiments, the solution(s) described in the specification secure payment transactions. In other embodiments, the solution(s) may secure access and use of private networks such as Secret Internet Protocol Router Network (SIPRnet) or resources on a public infrastructure such as the electrical grid.
The System
[1032] FIG. 1A shows an embodiment of a system 100 for providing secure transactions. In an embodiment, system 100 may include user system 101, and user system 101 may include secure area 102, secure memory system 104, secure processor system 106, output system 108, input system 110, sensor 111, communication system 112, memory system 114, processor system 116, input/output system 118, operating system 120, and network interface 122. System 100 may also include network 124 and service provider system 126. In other embodiments, system 100 may not have all of the elements or features listed and/or may have other elements or features instead of, or in addition to, those listed.
[1033] System 100 is a system within which a secure transaction takes place (FIGs.
1A-3B discuss various details of system 100 and FIGs. 3C-6 discuss various methods for using system 100). In this specification the word system refers to any device or system of devices that communicate with one another. User system 101 is one that has a secure area that is dedicated for performing secure transactions over a network. User system 101 may be a single device or a combination of multiple devices. User system 101 may be a portable device, personal computer, laptop, tablet computer, handheld computer, mobile phone, or other network system, for example (in this specification a network system is any device or system that is capable of sending and/or receiving communications via a network). In an embodiment, a secure area 102 may be provided for performing secure transactions. In this specification, authentication information references to any form of information used for authenticating a user. In an embodiment, within secure area 102, authentication information, such as a biometric authentication and/or another form of authentication is bound to the authorization of an action. In other words, the authentication information is in some way combined with the information for performing the action, such as by being concatenated together and then applying a hash function to the result of the concatenation. In this specification, the words "action" and "transaction" may be switched one with another to obtain different embodiments. Throughout this specification, when ever information is disclosed as being combined, the information may be concatenated, added together (e.g., in a binary addition of the binary values of information), be different inputs to the same function, and/or combined in another manner.
[1034] A hash function, denoted by Φ, is a function that accepts as its input argument an arbitrarily long string of bits (or bytes) and produces a fixed-size output. In other words, a hash function maps a variable length message m to a fixed- sized output, < (m). Typical output sizes range from 160 bits, 256 bits, 512 bits, or can also be substantially larger.
[1035] An ideal hash function is a function Φ whose output is uniformly distributed in the following way: Suppose the output size of Φ is n bits. If the message m is chosen randomly, then for each of the 2n possible outputs z, the probability that < (m) = z is 2~n. In an embodiment, the hash functions that are used are one-way. A one-way function Φ has the property that given an output value z, it is computationally extremely difficult to find a message mz such that < (mz) = z. In other words, a one-way function Φ is a function that can be easily computed, but that its inverse Φ"1 is extremely difficult to compute. Other types of one way functions may be used in place of a hash function.
[1036] Any of a number of hash functions may be used. One possible hash function is
SHA-1, designed by the National Security Agency and standardized by the NIST,
[NIST STANDARDS 1995]. The output size of SHA-1 is 160 bits. Other alternative hash functions are of the type that conform with the standard SHA-256, which produces output values of 256 bits, and SHA-512, which produces output values of 512 bits,
[NIST STANDARDS 2001 ] . A hash function could be one of the SHA-3 candidates. A candidate example of a hash function is BLAKE. Another example of a hash function is Gr0stl. Another example of a hash function is JH. Another example of a hash function is Keccak. Another example of a hash function is Skein.
[1037] In an embodiment, secure area 102 may have its own secure processor system and secure memory system, which are not accessible by the rest of user system 101. Secure area 102 may be capable of taking over and/or blocking access to other parts of user system 101.
[1038] Secure memory system 104 may be a dedicated memory for securing transactions. In an embodiment, secure memory system 104 may not be accessed by the other processor systems of user system 101. Memory system 104 may include, for example, any one of, some of, any combination of, or all of a long-term storage system, such as a hard drive; a short-term storage system, such as random access memory; a removable storage system, such as a floppy drive or a removable drive; and/or flash memory. Memory system 104 may include one or more machine-readable mediums that may store a variety of different types of information. Secure memory system 104 may store methods and information needed to perform the secure transaction, such as a method for generating a passcode generator, user information, a method of generating a registration code generator, and encryption/decryption code. Secure memory system 104 may include one or more memory units that each write and/or read to one or more machine readable media. The term machine-readable medium is used to refer to any non-transient medium capable carrying information that is readable by a machine. One example of a machine-readable medium is a computer-readable medium.
Another example of a machine-readable medium is paper having holes that are detected that trigger different mechanical, electrical, and/or logic responses. The content of secure memory 104 is discussed further in FIG. IB, below.
[1039] Secure processor system 106 may include one or more processors. Processor system 116 may include any one of, some of, any combination of, or all of multiple parallel processors, a single processor, a system of processors having one or more central processors and/or one or more specialized processors dedicated to specific tasks. Processor system 116 implements the machine instructions stored in memory 114. Secure processor system 106 may include one or more processors that cannot be accessed by the main processor of the user system 101. For example, in an embodiment all of the processors of secure processor system 106 cannot be accessed by the main processor of system 101. In an embodiment, the operating system of user system 101 may have no access to secure area 102, and in an embodiment, secure area 102 may be programmed without benefit of an operating system, so that there is no standard manner of programming secure area 102, which thwarts hackers from sending read and/or write commands (or any other commands) to secure area 102, because secure area does not use standard read and write commands (and does not use any other standard commands). As a consequence, providing secure area 102 addresses the weakness of biometric authentication and other authentication methods. Secure memory system 104 may store a transaction passcode generator (which will be described later in conjunction with FIG. 3A).
[1040] Output system 108 may include any one of, some of, any combination of, or all of a monitor system, a handheld display system, a printer system, a speaker system, a connection or interface system to a sound system, an interface system to peripheral devices and/or a connection and/or interface system to a computer system, intranet, and/or internet, for example. In an embodiment, secure processor system 106 may be capable of taking over and using any portion of and/or all of output system 108. In an embodiment, a portion of the output system may be a dedicated display system that may be accessed only by secure area 102. In an embodiment, secure processor 106 may be capable of receiving input from input system 110 and/or blocking access to output system 108 by the main processor system and/or other devices.
[1041] Input system 110 may include any one of, some of, any combination of, or all of a biometric sensor 111, a keyboard system, a touch sensitive screen, a tablet pen, a stylus, a mouse system, a track ball system, a track pad system, buttons on a handheld system, character entry such as letters and numbers a scanner system, a microphone system, a connection to a sound system, and/or a connection and/or interface system to a computer system, intranet, and/or internet (e.g. IrDA, USB). In an embodiment, character entry may be performed on a touch sensitive screen such as an IPhone, IPad or Android phone. In an embodiment, biometric sensor 111 may be a finger print scanner or a retinal scanner. In an embodiment, user system 101 stores the processed data from user information 104B during registration. In an embodiment user system 101 retrieves user information 104B and compares the scanned output of sensor 111 to user information 104B to authenticate a user. In an embodiment secure processor 106 may be capable of receiving input from input system 110 and/or blocking access to input system 110 by the main processor system and/or other devices.
[1042] Communication system 112 communicatively links output system 108, input system 110, memory system 114, processor system 116, and/or input/output system 118 to each other. Communications system 112 may include any one of, some of, any combination of, or all of electrical cables, fiber optic cables, and/or means of sending signals through air or water (e.g. wireless communications), or the like. Some examples of means of sending signals through air and/or water include systems for transmitting electromagnetic waves such as infrared and/or radio waves and/or systems for sending sound waves.
[1043] Memory system 114 may include, for example, any one of, some of, any combination of, or all of a long-term storage system, such as a hard drive; a short-term storage system, such as random access memory; a removable storage system, such as a floppy drive or a removable drive; and/or flash memory. Memory system 114 may include one or more machine-readable mediums that may store a variety of different types of information. Memory system 114 and memory system 104 may use the same type memory units and/or machine readable media. Memory system 114 may also store the operating system of user system 101 and/or a web browser (which may also be referred to as an HTTP client). In embodiment, memory system 114 may also store instructions for input system 110 to read in biometric data and send the biometric data to secure area 102.
[1044] Processor system 116 may include one or more processors. Processor system
116 may include any one of, some of, any combination of, or all of multiple parallel processors, a single processor, a system of processors having one or more central processors and/or one or more specialized processors dedicated to specific tasks. Processor system 116 implements the machine instructions stored in memory 114. In an embodiment, processor 116 does not have access to secure area 102.
[1045] In an alternative embodiment, processor 116 only communicates to secure area 102 when secure area 102 authorizes processor 116 to communicate with secure area 102. Secure area 102 may prevent processor 116 from communicating to secure 102 during the secure area's execution of critical operations such as setup, generation of keys, registration code, biometric authentication or decryption of transaction information.
[1046] Input/output system 118 may include devices that have the dual function as input and output devices. For example, input/output system 118 may include one or more touch sensitive screens, which display an image and therefore are an output device and accept input when the screens are pressed by a finger or stylus, for example. The touch sensitive screen may be sensitive to heat and/or pressure. One or more of the input/output devices may be sensitive to a voltage or current produced by a stylus, for example. Input/output system 118 is optional, and may be used in addition to or in place of output system 108 and/or input device 110. In an embodiment, a portion of the input/output system 118 may be dedicated to secure transactions providing access only to secure area 102. In an embodiment, secure processor 106 may be capable of receiving/sending input/output from/via input system 110 and/or blocking access to input system 110 by the main processor system and/or other devices. Restricting access to a portion of and/or all of the input/output system 118 denies access to third party systems trying to hijack the secure transaction.
[1047] Operating system 120 may be a set of machine instructions, stored in memory system 110, to manage output system 108, input system 110, memory system 114, input/output system 118 and processor system 116. Operating system 120 may not have access to secure area 102. Network interface 122 may be an interface that connects user system 101 with the network. Network interface 122 may be part of input/output system 118. [1048] Network 124 may be any network and/or combination of networks of devices that communicate with one another (e.g., and combination of the Internet, telephone networks, and/or mobile phone networks). Service provider system 126 (which will be discussed further in conjunction with FIG. 2A) may receive the transactions. The recipient may be the final recipient or an intermediary recipient of transactions.
[1049] Service provider system 126 may be a financial institution or a recipient of a secure transaction. User system 101 may interact with any of a variety of service provider systems, such as service provider system 126, via a network 124, using a network interface 122. Service provider system 126 may be a system of one or more computers or another electronic device, and may be operated by a person that grants a particular user access to its resources or enables a particular event (e.g., a financial transaction, a stock trade, or landing a plane at an airport, and so on).
[1050] Methods for securing transactions are disclosed in this specification, which may be implemented using system 100. A financial transaction may be an instance or embodiment of a transaction. Further, a stock trade is one embodiment of a financial transaction; a bank wire transfer is an embodiment of a financial transaction and an online credit card payment is an embodiment of a financial transaction. Any operation(s) that runs in a trusted
environment, which may be secure area 102 may be treated as a secure transaction. In an embodiment, every secure transaction may include one or more atomic operations and the use of the word transaction is generic to both financial transactions and operations including atomic operations unless stated otherwise. In this specification, the word transactions is also generic to an individual or indivisible set of operations that must succeed or fail atomically (i.e., as a complete unit that cannot remain in an intermediate state). Operations that require security may include operations that make use of, or rely on, the confidentiality, integrity, authenticity, authority, and/or accountability of a system should be executed in a trusted environment (e.g., in a secure area, such as secure area 102). Types of operations that require security may be treated as secure transactions. Further, a successful transaction other than logging information alters a system (e.g., of service provider 126) from one known, good state to another, while a failed transaction does not. To be sure that a transaction results in a change of state only when the transaction is successful - particularly in systems that handle simultaneous actions - rollbacks, rollforwards, and deadlock handling mechanisms may be employed to assure atomicity and system state integrity, so that if there is an error in the transaction, the transaction does not take effect or does not cause an unacceptable state to occur.
[1051] In at least one embodiment, a secure transaction assures the following properties:
A. Availability: Having timely and reliable access to a transactional resource.
B. Confidentiality: Ensuring that transactional information is accessible only to those authorized to use the transactional information.
C. Integrity: Ensuring that transactional information is protected from unauthorized modification.
D. Authentication: Ensuring that transactional resources and users accessing the transactional resources are correctly labeled (identified).
E. Authorization: Ensuring that only authorized users have access rights to transactional resources.
F. Accounting: Ensuring that a transaction cannot be repudiated. Any operation that handles or provides access to data deemed too sensitive for an untrusted environment (e.g., any private data) may be treated as a secure transaction to ensure that information leakage does not occur. [1052] In at least one embodiment, a unique passcode is bound to, and depends upon, the transaction information. In an embodiment, each step of the transaction uses a different transaction passcode that is dependent on the transaction information and user verification information. In other words, in an embodiment, the passcode includes the transaction information. Furthermore, in at least one embodiment, if the transaction information has been altered relative to the transaction information stored in the user's secure area 102, then the unique passcode sent following the alteration will be invalid (an example, of a manner in which the transaction being altered is the dollar amount and account number of the recipient could be altered in an untrusted browser). Since the alteration of the transaction alters the passcode, the execution of the transaction would fail due to the incorrect unique passcode during that transaction step.
[1053] In addition, the secure transaction solution can be executed on a standalone portable device - e.g., a secure flash drive, portable token, or in a secure chip or a secure part of a chip, and the use of a standalone portable device makes it difficult for an attacker to gain access. In at least one embodiment, the secure chip or secure part of the chip may reside in a mobile phone. Some examples of a mobile phone are an Android phone, the iPhone and the Blackberry. In at least one embodiment, the secure chip or secure part of the chip may reside in a personal computer. In at least one embodiment involving a mobile phone or computer, the secure chip may be temporarily or permanently disconnected from the rest of the system so that the operating system 120 does not have access to critical information entered into and received (e.g., read or heard) from the secure area's user interface. In at least one
embodiment, this critical information may be authentication information, biometric information, passwords, passcodes, passcode generators, PINS, other kinds of authentication factors, transaction information, and/or other user credentials. [1054] In at least one embodiment in which user system 101 is a portable device, the portable device may have a user interface with one or more buttons or a navigation button, which may offer the user five choices (e.g., up, down, left, right, select). In at least one embodiment, the buttons or navigation button may be used to enter a PIN into the secure area. In at least one embodiment, the buttons or navigation buttons may be used to select one or more images stored in the secure area. In an embodiment, character entry of letters, numbers and other symbols may be performed on a touch sensitive screen: some devices that have touch sensitive screens are IPhones, IPads and Android smartphones. In at least one embodiment, the user interface may enable the user to enter transaction information directly to the secure area or secure part of the chip.
[1055] Portable embodiments of user system 101 enable users to execute secure transactions in remote places such as inside a jet, on a golf course, inside a moving automobile, from a hotel room, in a satellite, at a military gate, and/or other isolated places.
[1056] Although some embodiments of user system 101 below may be described using fingerprints as an example, other items or a combination of these items may be used for verifying the true identity of the person such as face prints, iris scans, finger veins, DNA, toe prints, palm prints, handprints, voice prints and/or footprints. Any place, the expression "biometric prints" occurs any of the above listed different specific types of biometrics may be substituted to get specific embodiments. In terms of what a person knows, the authentication items may be PINs, passwords, sequences, collections of images that are easy to remember, and/or even psychometrics. In an embodiment, the item used to verify the person may be any item that is unique. In an embodiment, the item(s) used to verify the person may be one or more items that as a combination are difficult to fabricate, guess, find by trial and error, and/or compute. In an embodiment, the item(s) used to verify the person are uniquely associated with this person. In an embodiment, the item used to verify the person has an unpredictable element. For example, in one instance, a transaction may require a fingerprint and the person selecting an apple image as user verification where the secure area indicates, via the user interface, to the user to choose their favorite food. In another instance at a later time, a transaction may require a fingerprint and the person selecting a correct image or collection of images from a display screen. Example images could be a picture or photo of an orange, a train, a specific pattern such as a peace sign or a diagram or a logo, a Mercedes, a house, a candle, or a pen. In at least one embodiment, the person may add his or her own images during registration, which are then used for user verification during the transaction. When images are a part of the user verification process, a display screen that is a part of the secure area 102 and/or controlled by secure area 102 is used.
[1057] In at least one embodiment, secure area 102 may be a specialized part of the chip (e.g., a microprocessor), where the operating system 120 and web browser software do not have access to this specialized part of the chip. In at least one embodiment, a specialized part of the chip may be able to turn off the operating system 120's access to presses of the buttons or finger presses of the screen of a mobile phone (or other computing device), preventing malware and key or screen logging software from intercepting a PIN, character entry of letters, numbers or other symbols or the selection of one or more images. In at least one embodiment, a specialized part of the chip may be able to temporarily disconnect the rest of the chip's access to the screen (e.g., by preventing the execution of the operating system 120 and web browser). In at least one embodiment, part of the display screen may be permanently disconnected from the part of the chip (e.g., from the microprocessor of the chip) that executes the operating system 120 and web browser. In at least one embodiment, a part of the chip may only have access to the biometric sensor, while the rest of the chip - executing the operating system 120 and web browser - is permanently disconnected from the biometric sensor. [1058] At least one embodiment uses a secure device that produces unique passcodes from biometric prints that can be used as one-time passwords. For each acquired biometric print, the derived passcodes created from the biometric print and the transaction information for that particular transaction is unique.
[1059] Another embodiment includes a secure area, such as secure area 102, that executes the biometric acquisition and storage of a registration code, passcode generator, seed, cryptography key(s) and other user credentials, which may be created from the biometric prints or created from unpredictable physical processes in secure area 102, or created from a combination of the biometric prints and unpredictable processes In at least one embodiment, photons may be produced by the hardware as a part of the unpredictable process. In least one embodiment, the unpredictable process may be produced by a specialized circuit in the secure area.
[1060] In yet another embodiment of the invention, biometric prints and/or unpredictable information from unpredictable physical processs are used to generate a registration code in the secure area 102. The secure area 102 may include embedded software. In at least one embodiment, the embedded software is on a chip with a physical barrier around the chip to hinder reverse engineering of the chip, and/or hinder access to passcode generators, keys, transaction information, and/or possibly other user credentials. The use of biometric prints to create one-time passcodes within a secure area may eliminate the use of static passwords that need to be memorized and need to be stored on the host computer or need to be stored on an insecure part of the chip executing the operating system 120 and web browser. The use of other biometric information entered into the secure area may eliminate a person entering a static password into an insecure part of the system.
[1061] By executing the fingerprint software or other type of biometric software on a secure embedded device, the fingerprints (or other biometric prints) are less susceptible to theft, the biometric prints are not transmitted to the insecure part of the system, nor is there any need to have encrypted templates of the biometric prints transmitted to an insecure device. Each of the above embodiments may be used separately from one another in combination with any of the other embodiments. All of the embodiments of this specification may be used together or separately.
Secure Area in a Device or a Chip
[1062] The secure area 102 may be part of user system 101 or a special part of the chip that is able to acquire biometric prints, store authentication information, and/or authenticate the newly acquired items. The authentication information may include templates of biometric prints, images, pins, and/or passwords. The secure area may also be a part of the device where critical transaction information may be entered or verified on a display that the secure area only has access to. In at least one embodiment, the host computer (domain) and the network have no access to the transaction information, no access to the keys, no access to biometrics, no access to passcode generators, and/or no access to other critical user credentials (the transaction information, the keys, the biometrics, passcode generators, and/or other critical user credentials may be the contained and processed by the secure area).
[1063] For a payment transaction, one item of transaction information may be the name of the person or entity sending the money. Another item of transaction information may be the name of the person or entity receiving the money. Another item of transaction information, may be the date or time of day. Another item of transaction information may be the sending person's (or entity's) account number. Another item of transaction information may be the receiving person's (or entity's) bank account number (the sending person or entity is the person or entity that sends a message that is part of the transaction and the receiving person or entity is the person or entity that receives the message that is part of the transaction. Another item of transaction information may be the sending person's (or entity's) routing number. Another item of transaction information may be the receiving person's (or entity's) routing number. Another item of transaction information may be the amount of money that may be expressed in dollars, Euros, yen, francs, deutschmark, yuan or another currency.
[1064] During setup, one or more biometric prints may be acquired, and one or more unique registration codes and in at least one embodiment encryption keys may be generated from the one or more of the biometric prints (items) or generated from an unpredictable physical process or both. In at least one embodiment, the unpredictable physical process may come from a hardware chip or hardware circuit that uses photons as a part of the
unpredictable process to create the encryption keys. During authentication, if the acquired biometric print is an acceptable match, then a sequence of transaction steps that make up the complete transaction may be initiated.
[1065] The software that secure area 102 executes may be embedded in secure memory 104. In an embodiment, there is no operating system on the device or on secure area 102 of user system 101. In an alternative embodiment, there is an operating system. The secure biometric print device has a number of components, which are described later. The security of the secure area 102 may be enhanced by any one of, any combination or of, or all of (1) the use of embedded software, (2) the lack of an operating system, and (3) the secure area being at least part of a self-contained device not connected to a computer or the internet. For example, the unit that includes the secure area may contain its own processor. In an embodiment, the secure area may not have any of these security enhancing features. The biometric sensor enables user system 101 to read biometric prints. The biometric sensor may include a fingerprint area sensor or a fingerprint sweep sensor, for example. In at least one embodiment, the biometric sensor may contain an optical sensor that may acquire one or more types of biometrics. In at least one embodiment, the biometric sensor may be a microphone or other kind of sensor that receives acoustic information, such as a person's voice. In at least one embodiment, the sensor may be a device that acquires DNA or RNA. In an embodiment, secure processor system 106 may execute the software instructions, such as acquiring a biometric print from the sensor, matching an acquired biometric print against a stored biometric print, sending communication and control commands to a display, and/or encrypting the registration code and transmitting the registration code to the administrator when the user and administrator are not in the same physical location. By including processor system 106 in secure area 102, the security is enhanced, because the external processor is given fewer chances to inspect contents of secure area 102. Alternatively, secure area 102 may store software instructions that are run by secure processor system 106.
Processor system 106 performs the biometric print acquisition, the encryption, and/or generation of the passcode. Alternatively, a specialized logic circuit is built that carries out the functions that the software causes the processors to perform, such as driving sensor 111 (which may be an acquisition unit, such as a biometric sensor).
[1066] Secure memory system 104 may contain non- volatile memory in addition to volatile memory. Non-volatile memory enables the device to permanently store information for generating passcodes, encryption keys, and passcode generators. In another embodiment, secure memory system 104 may include memory on secure processor system 106. In another embodiment, the sensor or input system 110 and secure processor system 106 may be integrated into a single chip. Alternatively, in another embodiment, the sensor in input system 110 and secure processor system 106 may be two separate chips.
Content of Memory in Secure Area
[1067] FIG. IB shows an embodiment of a block diagram of the contents of memory system 104 of FIG. 1A, Memory system 104 may include instructions 152, which in turn may include a setup routine 154, an authentication of user routine 156, a secure transaction routine 158, having an initial request routine 160, a service provider authentication routine 162, and a completion of transaction routine 164. Instructions 154 (of memory 104) may also include registration code generator 166, drivers 168, controller 169, generate encryption key 170, generate passcode generator 172, perturb encryption key 174, perturb passcode generator 175, generate passcode 176, hash functions 178, perturbing functions 180, and user interface 181. Memory system 104 may also store data 182, which may include biometric template T 184, registration key R 186, current encryption key K 188, current passcode generator G 190, and transaction information S 192. In other embodiments, memory system 104 may not have all of the elements or features listed and/or may have other elements or features instead of, or in addition to, those listed.
[1068] Instructions 152 may include machine instructions implemented by processor
106. Setup routine 154 is a routine that handles the setting up of the user system 101, so that user system 101 may be used for performing secure transactions. Setup routine 104 may collect a new user's biometric print, and apply a hash function to the biometric print (and/or to other user information) to generate a registration key R. In at least one embodiment, there may be specialized hardware in the secure area to help create unpredictableness used for the generation of key(s), seed(s), and/or registration code(s). Alternatively, the registration code, seed, or key may be generated by applying the hash function to the raw biometric print data, for example. Similarly, setup routine 154 may apply a hash function to authentication information, such as a biometric print, to hardware noise produced by a phototransistor, and/or other user information or a combination of these to generate an initial encryption key. The setup routine 154 may also send the registration code and/or the encryption key to the service provider system 126. In another embodiment, the registration code R and/or the initial encryption key may be received from service provider 126. [1069] Authentication of user routine 156 may authenticate the user each time the user attempts to use user system 101. For example, user system 101 may include a biometric sensor (e.g., as sensor 111) that scans the user's biometric print, reduces the biometric print to a template, and matches the newly derived biometric template to a stored template (which was obtain by setup routine 154). Then, if the stored template and the newly derived template match, the user is allowed to use user system 101.
[1070] In an alternative embodiment, a biometric print acquired may be directly matched with a stored template. Alternatively or additionally, authentication of user routine 156 may require the user to enter a password. If the password received and the password stored match, the user is allowed to use user system 101.
[1071] Secure transaction routine 158 is a routine that implements the secure transaction. The initial request routine 160 is a first phase of secure transaction routine 158. One purpose of initial request routine 160 is to generate a passcode from a combination of the current passcode generator and transaction information. The transaction information is encrypted with the encryption key. The encrypted transaction information and the passcode are sent to the service provider. During initial request routine 160, the passcode generator is perturbed and the encryption key is perturbed to obtain a new passcode generator and a new encryption key, respectively. In an alternative embodiment, the encryption key is not changed each time. In an embodiment, each passcode is generated form a different passcode generator. In an embodiment, the passcode is generated from the passcode generator after generating the prior passcode, which may be generated any time after generating the prior passcode and before generating the current passcode, such as just after generating the prior passcode or just before generating the current passcode. After initial request routine 160 sends the passcode and encrypted transaction information to service provider system 126, secure transaction routine 158 waits for a reply, which will include a passcode that is dependent on the passcode generator and transaction information.
[1072] Service provider authentication routine 162 authenticates the information provided by the service provider. The transaction passcode sent by the service provider 126 to system 101 in reply to initial request 160 may be authenticated by service provider authentication routine 162 (throughout this specification, the word passcode and the phrase transaction may be substituted one for another to obtain different embodiments). If the service provider that sent the passcode is the wrong service provider, it is unlikely that the service provider will have the correct transaction information and the correct passcode generator, and consequently the passcode returned will be incorrect.
[1073] Completion of transaction routine 164 completes the portion of the transaction performed by system 101. If the service provider is authenticated, completion of transaction routine 164 generates yet another passcode from the passcode generator and transaction information and sends the passcode to the service provider.
[1074] Registration code generator 166 may be an algorithm for generating a registration code from biometric data, unpredictableness generated by an unpredictable process in the hardware in the secure area of the chip, and/or other information. Instructions 154 (of memory system 104) may also include registration code generator 166. Drivers 168 may include drivers for controlling input and output devices, such as the keyboard, a monitor, a pointing device (e.g., a mouse and/or a touch pad), a biometric print sensor (for collecting biometric prints). Controller 169 may include one or more machine instructions for taking control of the keypad, monitor and/or network interface, so the transaction may be performed securely, without fear of the processor system 116 compromising security as a result of being taken over by malware sent from another machine. [1075] Generate encryption key 170 are machine instructions that generate a new encryption key (e.g., by applying a function). In at least one embodiment, the encryption key is not updated after the initial step. Generate passcode generator 172 may include machine instructions that generate a new passcode generator from a prior passcode generator. In other words, generate passcode generator 172 may be an algorithm for generating a passcode generator from previous passcode generator. Generate passcode generator 172 may combine (e.g., concatenate) the prior passcode generator with current transaction information and apply a one-way function (e.g., a one-way hash) to the combination or may perturb the prior passcode generator. Perturb encryption key 174 perturbs the current encryption key to thereby generate the next encryption key. Perturb passcode generator 175 perturbs the current passcode generator to thereby generate the next passcode generator. The perturbing function could apply a one-way function to the passcode generator and other information. Generate passcode 176 generates a new passcode. Generate passcode 176 may generate the passcode by applying a hash function to a combination of (e.g., a concatenation of) the passcode generator and transaction information.
[1076] Hash functions 178 may use one or more one-way functions, which may be used by generate registration code 166 for generating a registration from a biometric print and/or other user information. Alternatively or additionally, hash functions 178 may use a one-way function, which may be used by generate passcode 176 for generating a new passcode from the combination of a passcode generator and transaction information.
Optionally, hash functions 178 may include a different function for generate registration code 166 and generate passcode 176. Those hash function(s) of hash functions 178 that are used by initial request 160, authentication of service provider routine 162, and completion of transaction routine 164 may be the same as one another or different from one another. [1077] Perturbing functions 180 may include one or more perturbing functions, which may be used by perturb encryption key 174 and perturb passcode generator 175 generate passcode generator 176. The perturbing functions in perturbing functions 180 used by perturb encryption key 174 and perturb passcode generator 176 may be the same or different from one another. Different perturbing functions of perturbing functions 180 may be used during each initial request 160, authentication of service provider routine 162, and/or completion of transaction routine 164. Although perturbing functions 180 and hash functions 178 are indicated as separate storage areas in perturb encryption key 174 and perturb passcode generator 175, the perturbing functions may just be stored as part of the code for perturb encryption key 174 and perturb passcode generator 175. In this specification anytime a hash function is mentioned or a perturbing function is mentioned any other function may be substituted (e.g., any perturbing function may be replaced with a hash function and any hash function may be replaced with a perturbing function) to obtain another embodiment.
Optionally, any perturbing function and/or hash function mentioned in this specification may be a one way function.
[1078] User interface 181 provides a page, or another method of displaying and entering information so that the user interface may provide the following functionalities, labeled with the letters A-F.
[1079] A. The user may view the transaction information being sent. B. The user may enter instructions for sending transaction information. C. The user may receive information about whether or not the biometric print was acceptable. D. The user may determine whether it is necessary to enter another biometric print or another type of user authentication such as a PIN or a sequence of images known by the user. E. The user may determine the current state in the transaction process. F. The user may read or enter directions for the next step in the transaction process. [1080] Data 182 may include any data that is needed for implementing any of the routines stored in memory 104. Biometric template T 184 may include templates, such as minutiae and/or other information characterizing biometric prints of users, which may be used to authenticate the user each time the user would like to use secure area 102 and/or system 101. Registration key R 186 may be generated by applying a hash function to biometric print(s) and/or information derived from an unpredictable physical process, and may be used for generating passcode generators by perturbing the registration code or applying a hash code to the registration code. In one embodiment, the unpredictable physical process may use one or more phototransistors, each of which senses photons.
[1081] Current encryption key K 188 is the current encryption key, which may be stored long enough for the next encryption key to be generated from the current encryption key. Similarly, current passcode generator G 190 may stored long enough for generating the current passcode and the next passcode generator. The passcode generator is a value (e.g., a combination of various symbols and characters) that is combined with the transaction information, and a function may be applied to the combination to generate a passcode.
Transaction information S 192 may include information about a transaction that the user would like to perform. Transaction information 190 may combined with the current passcode generator and to generate the current transaction passcode.
Service Provider System
[1082] FIG. 2 A shows a block diagram of an embodiment of a service provider system 200 in a system for securing transactions against cyber attacks. In an embodiment, service provider system 200 may include output system 202, input system 204, memory system 206, processor system 208, communication system 212, and input/output system 214. In other embodiments, the service provider system 200 may not have all the components and/or may have other embodiments in addition to or instead of the components listed above.
[1083] Service provider system 200 may be a financial institution or any other system such as a power plant, a power grid, or a nuclear plant or any other system requiring secure access. In an embodiment, service provider system 200 may be an embodiment of service provider system 126. Any place in this specification where service provider 126 is mentioned service provider 200 may be substituted. Any place in this specification where service provider 200 is mentioned service provider 126 may be substituted. Service provider system 200 may include one or more webservers, applications servers, and/or databases, which may be part of a financial institution, for example.
[1084] Output system 202 may include any one of, some of, any combination of, or all of a monitor system, a handheld display system, a printer system, a speaker system, a connection or interface system to a sound system, an interface system to peripheral devices and/or a connection and/or interface system to a computer system, intranet, and/or internet, for example.
[1085] Input system 204 may include any one of, some of, any combination of, or all of a keyboard system, a touch sensitive screen, a tablet pen, a stylus, a mouse system, a track ball system, a track pad system, buttons on a handheld system, character entry of letters, numbers or other symbols on a touch sensitive screen, a scanner system, a microphone system, a connection to a sound system, and/or a connection and/or interface system to a computer system, intranet, and/or internet (e.g. IrDA, USB).
[1086] Memory system 206 may include may include, for example, any one of, some of, any combination of, or all of a long term storage system, such as a hard drive; a short term storage system, such as random access memory; a removable storage system, such as a floppy drive or a removable drive; and/or flash memory. Memory system 206 may include one or more machine-readable mediums that may store a variety of different types of information. The term machine-readable medium is used to refer to any medium capable carrying information that is readable by a machine. One example of a machine -readable medium is a computer-readable medium. Another example of a machine-readable medium is paper having holes that are detected that trigger different mechanical, electrical, and/or logic responses. Memory 206 may include encryption/decryption code, generate passcode generator, and algorithms for authenticating transaction information, for example (memory 206 is discussed further in conjunction with FIG. 2B).
[1087] Processor system 208 executes the secure transactions on system 200.
Processor system 208 may include any one of, some of, any combination of, or all of multiple parallel processors, a single processor, a system of processors having one or more central processors and/or one or more specialized processors dedicated to specific tasks. In an embodiment, processor system 208 may include a network interface to connect system 200 to user system 101 via network 124. In an embodiment, processor 208 may execute encryption and decryption algorithms, which may generate the passcode with which the transaction information was encrypted. In an embodiment, processor 208 may decrypt secure messages from user system 101 and/or encrypt messages sent to user system 101.
[1088] Communication system 212 communicatively links output system 202, input system 204, memory system 206, processor system 208, and/or input/output system 214 to each other. Communications system 212 may include any one of, some of, any combination of, or all of electrical cables, fiber optic cables, and/or means of sending signals through air or water (e.g. wireless communications), or the like. Some examples of means of sending signals through air and/or water include systems for transmitting electromagnetic waves such as infrared and/or radio waves and/or systems for sending sound waves. In embodiment, memory system 206 may store instructions for system 200 to receive authenticated secure transaction information from user system 101.
[1089] Input/output system 214 may include devices that have the dual function as input and output devices. For example, input/output system 214 may include one or more touch sensitive screens, which display an image and therefore are an output device and accept input when the screens are pressed by a finger or stylus, for example. The touch sensitive screen may be sensitive to heat and/or pressure. One or more of the input/output devices may be sensitive to a voltage or current produced by a stylus, for example. Input/output system 118 is optional, and may be used in addition to or in place of output system 202 and/or input device 204.
[1090] FIG. 2B shows an embodiment of a block diagram of the contents of memory system 206 of FIG. 2A, Memory system 206 may include instructions 220, which in turn may include a setup routine 222, an authentication of user routine 224, a request for authentication routine 226, completion of transaction routine 228, generate registration code 230, generate encryption key 232, generate passcode generator 234, perturb encryption key 236, perturb passcode generator 238, generate passcode 240, hash functions 242, and perturbing functions 244. Memory system 206 may also store data 245, which may include registration code R 246, current encryption key K 248, current passcode generator G 250 , and transaction information S 252. In other embodiments, memory system 206 may not have all of the elements or features listed and/or may have other elements or features instead of, or in addition to, those listed.
[1091] Setup routine 222 is a routine that handles the setting up of the service provider system 200, so that service provider system 200 may be used for performing secure transactions. Setup routine 222 may receive a registration code from the user system, which in turn may be used for generating the initial passcode and/or initial encryption key. [1092] In an alternative embodiment, the user may send the biometric print or template of the biometric print to service provider system 200, and service provider system 200 may generate the registration code from the biometric print in the same manner that user system 101 generates the registration code from the template of the biometric print or from the biometric print and/or information obtained from an unpredictable physical process (e.g., by setup routine 222 applying a hash function to the biometric print and/or information derived from an unpredictable physical process).
[1093] In another embodiment, the user may visit the location of service provider, where the service provider may collect the biometric print or the user, which is used by service provider system 200 for creating the template of the biometric print, the registration code, and/or the initial encryption key. In this embodiment, user system 101 may obtain the biometric template, initial encryption key, and/or the registration code from service provider system 200 instead of the user system 101 collecting the biometric print, creating the biometric template, initial encryption key, and/or creating the registration code.
[1094] Authentication of user routine 224 may optionally receive and may process the initial request from initial request routine 160 of user system 101 to perform the transaction, which includes a passcode. Authentication of user routine 224 may decrypt the encrypted transaction information with the encryption key and generate the passcode from a
combination of the current passcode generator and transaction information. If the passcode generated by service provider system 200 and the passcode received match from user system 101, then the user has been authenticated. If the passcode received and the passcode generated do not match, the process is terminated, and optionally an error message is sent to user system 101. During authentication of user routine 224, the passcode generator is perturbed (stored at service provider system 200) and the encryption key (stored at service provider system 200) is perturbed to obtain a new passcode generator and a new encryption key, respectively, so that the passcode generator and encryption key used by service provide system 200 is the same as (or sted differently is synchronized with) the passcode generator and encryption key used by user system 101. As with user system 101, an embodiment, each passcode is generated from a different passcode generator. In an embodiment, the passcode is generated from the passcode generator generated after generating the prior passcode, which may be generated any time after generating the prior passcode and before generating the current passcode, such as just after generating the prior passcode or just before generating the current passcode, so long as the passcode generator and encryption key of the service provider system 200 is the same as used by user system 101 for creating the passcode being authenticated.
[1095] After authentication of user routine 224 authenticates the passcode sent from user system 101, service provider system 200 needs to be authenticated by user system 101 (e.g., so that the user knows that the service provider is not an imposter and thereby protect against man-in-the-middle attacks). Authentication of service provider routine 226 creates a new passcode, which is sent to the user system 101 for authentication. As part of authentication of user routine 224, service provider 200 perturbs the passcode generator, and applies a function (e.g., a one-way hash function) the combination of the passcode generator and the transaction information (which generates the new passcode). In order for service provider system 200 to be authenticated, both service provider system 200 and user system 101 generate the new passcode from the same passcode generator and transaction information, and since the passcode generator is indirectly derived from the biometric print and in some embodiments indirectly derived from an unpredictable physical process. Since the transaction information is likely to vary with every transaction, the passcode is likely to be hard to duplicate by someone posing as the user or service provider. [1096] After sending the passcode for authenticating the service provider, service provider system 200 waits for a reply, including a new passcode and transaction information, to complete the transaction. Upon receipt of the passcode and an encrypted message, user authentication routine 224 again authenticates user system 101 by decrypting the encrypted message to obtain the new transaction information, perturbing the generating of the new passcode by applying a one way function to the combination of the passcode generator and the transaction information, and comparing the new passcode generated and the new passcode received. If the passcode is determined to be authentic, completion of transaction routine 228 completes the transaction using the transaction information sent from user system 101 by initial request routine 160 and/or completion of transaction routine 164. The transaction information sent by initial request routine 160 and completion of transaction routine 164 may be the same or different. In an embodiment, the transaction information sent from user system 101 to service provider system 200 are not known in advance. In another embodiment, the transaction information used and/or sent during initial request routine 160 may be information that is already known by service provider system 200, while the transaction information sent during transaction routine 164 (which is after user system 101 and service provider system 200 authenticated one another) may include some transaction information that was previously unknown to the service provider 200. Initial request routine 160 may send a perturbation of a hash of an initial passcode and encrypted transaction information, to service provider system 200, and secure transaction routine 158 may wait for a reply, which will include a passcode that is dependent on the passcode generator and transaction information.
[1097] Generate registration code 230 is optional and may be the same as generate registration code 166. In an embodiment, both generate registration code 166 and 230 are present, and both user system 101 and service provider system 200 generate the registration code separately. Only one of generate registration code 230 and 166 is necessary, the registration code may be generated in one of user system 101 and service provider system 200, and sent to the other of user system 101 and service provider system 166, and in an embodiment of user system 101 and service provider system 166 does not generate the registration code.
[1098] Generate encryption key 232 are machine instructions that generate a new encryption key from (e.g., by applying a function, such as a perturbing function to) a prior encryption key. Generate encryption key 232 may be the same routine as generate encryption key 170 except that generate encryption key 232 is implemented at service provider 200 and generate encryption key 170 is implemented at user system 101. Generate passcode generator 234, which may be the same as generate passcode generator 172, are machine instructions that generate a new passcode generator from a prior passcode generator. In other words, generate passcode generator 234 may be an algorithm for generating a passcode generator from previous passcode generator. Generate passcode generator 234 may combine (e.g., concatenate) the prior passcode generator with current transaction information and apply a one-way function (e.g., a one-way hash function) to the combination or may perturb the prior passcode generator. Perturb encryption key 236 may be the same as perturb encryption key 174, and perturb encryption key 236 perturbs the current encryption key to thereby generate the next encryption key. Perturb passcode generator 238 may be the same as perturb encryption key 175, and perturb passcode generator 238 perturbs the current passcode generator to thereby generate the next passcode generator. Generate passcode 240 may be the same as generate passcode 176, and generate passcode 240 may generate a new passcode. Generate passcode 240 may generate the passcode by applying a hash function to a combination of (e.g., a concatenation of) the passcode generator and transaction information. Hash functions 242 may be the same as hash functions 178. Hash functions 242 may be one a way functions, which may be used by generate registration code 230. Hash functions 242 may be used to generate passcode 240. Hash functions 242 may be used for generating a registration code from a biometric print and/or information from an unpredictable physical process and/or other user information. Hash functions 242 may be used for generating a new passcode from the combination of a prior passcode and transaction. Optionally, hash functions 242 may include a different function for generate registration code 230 and generate passcode 240. Those hash function(s) of hash functions 242 that are used by authentication of user routine 224, request for authentication routine 226, and completion of transaction routine 228 may be the same as one another or different from one another. The perturbing functions in perturbing functions 244 used by perturb encryption key 236 and perturb passcode generator 238, and may be the same or different from one another.
Different perturbing functions of perturbing functions 244 may be used during each of authentication of user routine 224, request for authentication routine 226, and completion of transaction routine 228. Although perturbing functions 244 and hash functions 242 are indicated as separate storage areas in from perturb encryption key 236 and perturb passcode generator 238, the perturbing functions may just be stored as part of the code for perturb encryption key 236 and perturb passcode generator 238.
[1099] Data 245 may include any data that is needed for implementing any of the routines stored in memory 206. Registration key R 246 may be the same as registration code 186 and may be generated by applying a hash function to biometric print(s) and/or information from an unpredictable physical process, and may be used for generating passcode generators by perturbing the registration code or applying a hash code to the registration code.
[1100] Current encryption key K 248 may be the same as current encryption key 188, and may be the current encryption key, which may be stored long enough for the next encryption key to be generated from the current encryption key. Similarly, current passcode generator G 250 may be the same as passcode generator G 190 and may stored long enough for generating the current passcode and the next passcode generator. The passcode generator is a value (e.g., a combination of various symbols and characters) that is combined with the transaction information, and a function may be applied to the combination to generate a passcode. Transaction information S 252 may be the same as transaction 192, and may include information about a transaction that the user would like to perform. Transaction information S 252 may combined with the current passcode generator and to generate the current passcode. Transaction information S 252 may be received from user system 101 and may be used to perform a transaction at service provider system 200 on behalf of user system 101.
[1101] FIGs. 3 A, 3B, 3C and 4-6 show methods for different parts of a secure transaction. The methods of FIGs. 3A-3C and 4-6 may be implemented on system 100.
Setup of User System
[1102] FIG. 3 A shows a flowchart of an embodiment of method 300A of setting up user system 101 for securing transactions against cyber attacks. User system method 300 A may be the setup performed by user system 101 before starting a secure transaction.
[1103] In step 302, the biometric print information may be obtained from the user from a biometric sensor 111 in input system 110. Method 300 A may also collect other setup information, such as a Personal Identification Number (PIN), a password, and/or a sequence or collection of images that are easy to remember. The setup data that was collected may be denoted as a T.
[1104] In step 304, a hash function Φ or any other one way method is applied on the biometric print information and other collected data T. A hash function Φ is applied to T, one or more times denoted as < k(T), to create the registration code R which may be stored in secure area 102. In other words, R = < k(T). The registration code is a sequence of symbols. An example of a registration code with 16 symbols is "lAe58GnZbk3T4pcQ". A registration code in hex format may be used:
"32DE0FA3908F100BBCEFFE3E4CB2382E376629E34A11478291A09B2A3DFFEF." A registration code with punctuation and other symbols may also be used. An example of a registration code with 32 symbols is "l !56hs#KUD3_4xP*7:y2iW=K;r.+4vN?" . There is at least one unique registration code for each passcode generator. In at least one embodiment, more than one different hash function may be used so for example, SHA-1 may be applied to U one or more times and Keccak may be applied to W one or more times.
[1105] In step 306, transaction passcode generator G is computed. For example, transaction passcode generator G may be generated by applying a hash function Φ to registration code R. In other words, G = O(R). In an embodiment, in step 306 transaction passcode generator G may be stored in secure memory system 104. In this specification, passcode generator and transaction passcode generator may be used interchangeably. The transaction passcode generator G may be stored in secure memory system 104 and is a value (e.g., a number or sequence of symbols, such as alphanumeric characters) from which user system 101 may generate a one-time transaction passcode. For example, a one-way function may be applied to a combination of the transaction passcode generator G and transaction information to generate the one-time passcode. Each transaction code generator may be generated from a prior transaction passcode generator, by applying a function to the prior passcode generator. In an embodiment, both the user system 101 and service provider system 126 separately generate each transaction passcode generator G and each one-way passcode. [1106] In an alternative embodiment, the application of hash function Φ in step 306 may be skipped and the registration code is stored as an initial passcode generator. [1107] In step 308, a cryptographic key K may be generated. In at least one embodiment, the biometric print information T is divided into two parts U,W. U may be used to generate the registration code R and W is used to help generate an encryption key K that the user's secure area and the administrator only have access to. Similarly, the registration code may be generated as R=Ok(U, I) and the encryption key may be generated as K = < k(W, I) where I is information created from an unpredictable physical process. Alternatively, the registration R code may be generated from the biometric print, the initial transaction passcode generator may be generated from the registration code and each subsequent passcode generator may be generated from the prior transaction passcode generator. The transaction passcode generator may be used as the encryption key or may be generated by applying yet another one way function to the transaction passcode generator. [1108] In step 310, the registration code R generated in step 306 and the cryptographic key K generated in step 308 may be securely transferred to service provider system 126. In an embodiment, the secure distribution of R and K may be performed by a Diffie-Hellman key exchange.
[1109] A Diffie-Hellman key exchange is a key exchange method where two parties
(Alice and Bob) that have no prior knowledge of each other jointly establish a shared secret key over an unsecure communications channel. Before the Diffie-Hellman key exchange is described it is helpful to review the mathematical notion of a group. A group G is a set with a binary operation *, (g*g is denoted as g2; g*g*g*g*g is denoted as g5), such that the following four properties hold:
(i.) The binary operation * is closed on G. In other words, a*b lies in G for all elements a and b in G.
(ii.) The binarv orjeration * is associative on G. a*(b*c) = (a*b)*c for all elprnp i+e n h anH c in G
(iii.) There is a unique identity element e in G. a*e = e*a = a.
(iv). Each element a in G has a unique inverse denoted as a'1. a*a~l = a~l*a = e.
[1110] The integers {. . ., -2, -1, 0, 1, 2, . . .} with respect to the binary operation + are an example of an infinite group. 0 is the identity element. For example, the inverse of 5 is -5 and the inverse of -107 is 107.
[1111] The set of permutations on n elements {1, 2, n}, denoted as Sn, is an example of a finite group with n\ elements where the binary operation is function composition. Each element of 5* n is a function p: {\, 2, n}→ {1, 2, n) that is 1 to 1 and onto. In this context, p is called a permutation The identity permutation e is the identity element in Sn , where e(k) = k for each k in {1, 2, ..., n) .
[1112] If H is a non-empty subset of a group G and H is a group with respect to the binary group operation * of G, then H is called a subgroup of G. H is a proper subgroup of G if H is not equal to G (i.e., H is a proper subset of G). G is a cyclic group if G has no proper subgroups.
[1113] The integers modulo n (i.e., Zn ={[0], [1], ... [n-1]} are an example of a finite group with respect to addition modulo n. If n = 5, [4]+[4] = [3] in Z5 because 5 divides (4+4) - 3. Similarly, [3]+[4] = [3] in Z5. Observe that Z5 is a cyclic group because 5 is a prime number. When p is a prime number, Zp is a cyclic group containing p elements {[0], [1], . . . [p-1]} . [1] is called a generating element for cyclic group Zp since [l]m = [m] where m is a natural number such that 0 < m≤ p-l and [lY = [0]. This multiplicative notation works as follows: [l]2 = [1] + [1]; [l]3 = [1] + [1] + [1]; and so on. This multiplicative notation (i.e. using superscripts) is used in the description of the Diffie-Hillman key exchange protocol described below. [1114] There are an infinite number of cyclic groups and an infinite number of these cyclic groups are extremely large. The notion of extremely large means the following: if 21024 is considered to be an extremely large number based on the computing power of current computers, then there are still an infinite number of finite cyclic groups with each cyclic group containing more than 21024 elements.
[1115] Steps 1 , 2, 3, 4, and 5 describe the Diffie-Hellman key exchange.
1. Alice and Bob agree on an extremely large, finite, cyclic group G and a generating element g in G. (Alice and Bob sometimes agree on finite, cyclic group G and element g long before the rest of the key exchange protocol; g is assumed to be known by all attackers.) The group G is written multiplicatively as explained previously.
2. Alice picks a random natural number a and sends ga to Bob.
3. Bob picks a random natural number b and sends gb to Alice.
4. Alice computes (gb)a.
5. Bob computes (ga)b.
[1116] Both Alice and Bob are now in possession of the group element gab, which can serve as the shared secret key. The values of (gb)a and (ga)b are the same because g is an element of group G.
[1117] Alice can encrypt a message m, as mgab , and sends mgab to Bob. Bob knows |G|, b, and g '. A result from group theory implies that the order of every element of a group divides the number of elements in the group, denoted as |G|. This means x1 1 = 1 for all x in G where 1 is the identity element in G. Bob calculates (g°)|G|~b = (g|G|)ag~ab = (gab)_1. After Bob receives the encrypted message mgab from Alice, then Bob applies (gab)_1 and decrypts the encrypted message by computing mgab (gab)_1 = m. [1118] The user and the service provider 126 agree upon a common key for the registration key. The user then encrypts one of the common keys with the registration key. The service provider 126 encrypts the common key with other information, which may be information specific to the user or a random number, for example. Then the user sends the encrypted common key (that was encrypted by the user with the registration) to the service provider 126, and the service provider 126 sends the encrypted common key that the service provider 126 encrypted to the user. Next, the user encrypts the encrypted common keys that was received from the service provider 126 with the registration key, and the service provider 126 encrypts the encrypted common key received from the user (which was encrypted with the registration key) with the same information that was used to encrypt the original copy of the common key of the service provider 126. Thus, both the user and the service provider 126 will now have the common encrypted key derived from the registration key supplied by the user and the information supplied by the service provider 126. The resulting encrypted common key may be used as the registration key (instead of the original registration key).
[1119] Optionally, the user system 101 and the service provider 126 may also agree upon a common key for the encryption key. The common key of the encryption key and registration key may be the same as one another or different. The user system 101 then encrypts one of the common keys and the encryption key. The server encrypts the common key with other information, which may be information specific to the user or a random number for example (as was done for the registration key). Then the user system 101 sends the encrypted common key (that was encrypted by the user with the encryption key) to the service provider 126, and the service provider 126 sends the encrypted common keys (which was encrypted service provider 126) to the user. Next, the user encrypts the encrypted common key that were received from the service provider 126 with the encryption key, and the service provider 126 encrypts the encrypted common keys received from the user (which was already encrypted with the encryption key by the user) with the same information that was used to encrypt the original copy of the common keys of the service provider 126. Thus, both the user and the service provider 126 will now have the common key encrypted by the encryption key supplied by the user and the information supplied by the service provider 126. The resulting encrypted common key may be used as the encryption key (instead of the original encryption key). Alternatively, the encryption key may be derived from the registration key by both the service provider 126 and user.
[1120] In other embodiments, the secure transmission may use elliptic curve cryptography which is similar to the Diffie-Hellman exchange described previously. In other embodiments, the secure transmission R and K may use a camera that reads a proprietary pattern that the portable device is able to display after setup is complete. In at least one embodiment, the registration code R may be given to the administrator in the same physical place, such as at a bank, or the registration code may be mailed or electronically transmitted to the administrator if setup is accomplished remotely. In some applications, the registration code may be encrypted first and then electronically transmitted or sent by mail. The service provider system 126 uses the registration code R to generate the encryption key (that service provider system 126 received), and is used to compute the passcode generator G as G = < k(R) where k > 0 and stores transaction passcode generator G and encryption key K for a particular user in a secure area 102. The number k in the operator < k() is the number of times that the operator Φ() is applied to R. In an embodiment, prior to creating each passcode a new passcode generator is generated from which the new passcode is generated by applying Φ() to the prior value of the passcode generator and transaction information Sk. In other words, Gn = f Sn) is the nth transaction passcode, where ψ is another function, which may be the same or different than Φ. [1121] In an embodiment, each of the steps of method 300A may be a distinct step. In other embodiments, method 300A may not have all of the above steps and/or may have other steps in addition to or instead of those listed above. The steps of method 300 A may be performed in another order. Subsets of the steps listed above as part of method 300A may be used to form their own method. In an embodiment, there could be multiple instances of method 300 A, each performed in response to performing another transaction or another part of the same transaction. The multiple instances of method 300A may be performed sequentially (e.g., each sequential instance performing the next part of a sequence of transactions or of a sequence of operations making up a single transaction) or in parallel.
Setup of Service Provider
[1122] FIG. 3B shows a flowchart of an embodiment of method 300B of setting up service provider system 126 for secure transactions against cyber attacks. Service provider setup method 300B may be the setup performed by service provider 126 before starting a secure transaction procedure.
[1123] In a step 332, service provider 126 may receive registration code R, cryptographic key K along with user information such as name and account number. In another embodiment, service provider 126 generates the passcode and/or encryption key in parallel with user system 101 or instead of service provider 126.
[1124] In an embodiment, each of the steps of method 300B may be a distinct step. In other embodiments, method 300B may not have all of the above steps and/or may have other steps in addition to or instead of those listed above. The steps of method 300B may be performed in another order. Subsets of the steps listed above as part of method 300B may be used to form their own method. In an embodiment, there could be multiple instances of method 300B. User System Method of Initiating the Transaction and Requesting Authentication
[1125] FIG. 3C shows a flowchart of an embodiment of method 300C in system 100 for secure transactions against cyberattacks. User system method 300C may be performed by user system 101 after the setup described in method 300A. Method 300C may be an embodiment of initial request routine 160 (FIG. IB).
[1126] In step 352, user system 101 may receive a request from a user (via an interface on the user system 101) to start a secure transaction with service provider system 126. User system 101 may also receive biometric print information or other information from the user to authenticate the user. Processor system 1 16 may send a request to secure processor system 106 to authenticate the user with the information stored during setup. In this specification, the terms authenticate, verify, and validate (and their conjugations) may be interchanged with one another to obtain different embodiments.
[1127] In step 354, user system 101 receives transaction information from the user.
The transaction information SD may be stored either in secure memory system 104. In an embodiment, the transaction information is only stored in encrypted form in secure memory system 104, and nowhere else. In another embodiment, the transaction information may be stored unencrypted in the secure area 102 and/or elsewhere. In this specification, transaction information refers to one or more items of information that describe the transaction. For a payment transaction, one item may be the name of the person or entity sending the money. Another item may be the name of the person or entity receiving the money. Another item may be the date. Another item may be the sender's (entity's) account number. Another item may the receiving person's (entity's) bank account number. Another item may be the sender's (entity's) routing number. Another item may be the receiving person's (entity's) routing number. Another item may the amount of money which may be expressed in dollars, Euros, Yen, Francs, Deutschmark or another currency.
[1128] In at least one embodiment, the transaction may be a stock trade. In these embodiments, the stock account number may be part of the transaction information. In at least one embodiment, the ticker symbol of the stock - for example, GOOG— being bought or sold may be part of the transaction information (or the name of a commodity or other item being purchased). The number of shares may be part of the transaction information. The price per share (or unit price) at which the person wishes to buy or sell the shares may be an item of the transaction information. If the stock purchase (or sale) is a limit order, then an indication that the stock purchase is a limit order may be an item of the transaction information. If the stock purchase (or sale) is a market order, then an indication that the purchase is a market order may be an item of the transaction information. The name of the stock account (e.g. Ameritrade, Charles Schwab, etc.) or broker may also be an item of the transaction information.
[1129] In step 356, the transaction information SD may be encrypted with a key K, as
MD = E(SD, K), and optionally stored in secure memory system 104. In step 358, secure processor system 106 applies a hash function Φ to the first passcode generator GD stored in secure memory 104 (step 306) and the transaction information received SD in step 354 to generate a first one-time transaction-passcode PD. In other words, PD= 0(GD,SD). The first transaction-passcode may be used once for the transaction SD, and the transaction passcode may be unique to every transaction and every use. The one-time transaction passcode PD, may be a sequence of symbols. In this specification passcode, transaction passcode, and onetime transaction passcode may be substituted one for another to obtain different
embodiments. The one-time transaction passcode PD, may dependent on the transaction information SD- An example of a numeric passcode is "925438710". An example of a transaction passcode may be a sequence of hexadecimal numbers "3 A 21 5B DE OF 99". An example of an alphanumeric passcode with 8 symbols may be "4zc8vNXA" and an example with 16 symbols including punctuation and other symbols is "&xL#WBq61 !j$uS_m". In an embodiment, each time a user submits a valid biometric print to the passcode generator, a new one-time transaction passcode is created from the current passcode generator G. The service provider checks that the passcode is derived from one of the passcode generator in the database and the particular transaction information. In other embodiments, a new passcode is generated more frequently than every time a user submits a valid user authentication. For example, a new passcode may be generated every other time or on a random schedule that the user is unaware.
[1130] In step 360, the current passcode generator GD is altered to generate a new passcode generator, the next passcode generator, for creating the next transaction passcode in the next use of the transaction system. In other words, new GD' = f(Go), where there are an infinite number of functions that f could be. In at least one embodiment, the new value of GD (the second passcode generator) can be updated to f(GD, SD) where the new passcode generator (the second passcode generator) is dependent on the transaction information SD- The function f will be referred to as the perturbing function. One possible perturbing function f could update the new transaction passcode generator to 0(GD, SD). An alternative perturbing function f could add 0(GD, SD) to GD. Another possible perturbing function f could xor GD and 0(GD, SD). Another possible perturbing function f could add 1 to G and permute the order of the symbols in GD using some randomly chosen permutation. Even another possible perturbing function f could add 1 to GD, and then permute the bits in GD. GD could be used as a seed for a deterministic "pseudo-random" number generator, which is used as f to generate a new GD. In step 362, the one-time transaction passcode PD and encrypted transaction information E(SD, K) may be transmitted to a display or submitted directly to service provider 126. In at least one embodiment, the one-time transaction passcode PD may be encrypted before transmitting to the service provider 126 for additional security.
[1131] In an embodiment, the one-time transaction-passcode PD (e.g., the first one time passcode) and encrypted transaction information MD may be displayed to service provider system 126, when the user is in the same physical location as service provider system 126. In another embodiment, the user may transmit the one-time transaction-passcode PD over a telephone. In another embodiment, the user may submit the one-time transaction- passcode PD and encrypted transaction information MD to the web browser and use the Internet for transmission to service provider system 126. In another embodiment, the user may submit the one-time transaction-passcode PD and encrypted transaction information MD by some other electronic means such as a fax machine or an ATM machine.
[1132] In an embodiment, each of the steps of method 300C may be a distinct step. In other embodiments, method 300C may not have all of the above steps and/or may have other steps in addition to or instead of those listed above. The steps of method 300C may be performed in another order. Subsets of the steps listed above as part of method 300C may be used to form their own method. In an embodiment, there could be multiple instances of method 300C.
Service Provider Method of Authenticating the User and Requesting Authentication
[1133] FIG. 4 shows a flowchart of an embodiment of method 400 in a system 100 for securing transactions against cyber attacks, authenticating the user, and requesting authentication of the user to authenticate the service provider 126. Method 400 may be performed by service provider 126 upon a request to perform a secure transaction. Service provider 126 stores registration code R and encrypted key K during setup performed by method 300 A. Method 400 may be an embodiment of a combination of authentication of user 224 and request for authentication routine 226 (FIG. 2B). [1134] In step 402, service provider system 126 receives one-time transaction passcode PD and encrypted transaction information MD, (sent in step 362). In step 404, service provider system 126 decrypts the transaction information using the stored encryption key K and applies the decryption function to MD to get Ss according to Ss = decrypt MD with K In step 405, service provider system 126 computes transaction passcode PD based on the passcode generator and received transaction information Ss, and computes the next passcode generator based on the prior transaction passcode generator Gs-i, as Gs = O(Gs-i); and transaction passcode Ps = < (Gs,Ss). In step 406, method 400 compares the received one-time passcode PD and computes one-time passcode Ps. If the received one-time passcode and computed one-time passcode do not match, then method 400 proceeds to step 408. In step 408, service provider system 126 aborts the transaction. Returning to step 406, if the received one-time passcode and computed one-time passcode match, then method 400 proceeds to step 410. In step 410, service provider system 126 updates the transaction passcode generator Gs to the next transaction passcode generator Gs' by applying a hash function, Gs' = f(Gs), where f may be the same as, or different from, Φ. In step 412, service provider system 126 computes a new one-time transaction-passcode Ps' using the updated transaction passcode generator Gs', the system computes Ps' = (Gs', Ss). The new one-time transaction-passcode Ps' is transmitted to user system 101. In step 414, the encryption key K may be updated using methods similar to updating transaction passcode generator. In other words, updated encryption key K' = γ(Κ). Step 414 is optional. In step 416, the encrypted transaction information is computed as Ms = E(Ss, 7(K)) and sent to user system 101. Steps 402-410 may be an embodiment of a combination of authentication of user 224, and steps 412- 416 may be an embodiment of request for authentication routine 226 (FIG. 2B). The generation of the new passcodes and new passcode generator sent to the user may be performed as part of authentication of user 224 or request for authentication routine 226 (FIG. 2B). [1135] In an embodiment, each of the steps of method 400 may be a distinct step. In other embodiments, method 400 may not have all of the above steps and/or may have other steps in addition to or instead of those listed above. The steps of method 400 may be performed in another order. Subsets of the steps listed above as part of method 400 may be used to form their own method. In an embodiment, there could be multiple instances of method 400.
User System Method of Authenticating the Service Provider and Requesting Completion of the Transaction
[1136] FIG. 5 shows a flowchart of an embodiment of method 500 in a system for authenticating the service provider and requesting completion of the transaction, for securing transactions against cyber attacks. Method 500 may be performed by user system 101 after receiving transaction passcode Ps' and encrypted transaction information Ms from service provider system 126 after method 300C. Method 500 may be an embodiment of
authentication of service provider routine 162.
[1137] Method 500 verifies that user system 101 is communicating to the correct service provider system by checking the next passcode and further verifies that the transaction information has not changed by decrypting the received transaction information SD'= Decrypt E(S, γ(Κ) ) and checks that the service provider system knows that the transaction information is still So- If the verification or check is invalid, then the transaction is aborted. In an embodiment, although transaction information may initially be sent as part of method 300C, the transaction is not committed as a result of method 300C, but instead is committed on the basis of the transaction information sent in method 500. Method 500 is an embodiment of authentication of service provider 162. [1138] In step 502, the transaction information Ms (sent from service provider 126 in step 416) is decrypted, SD' = decrypt Ms. In step 504, the decrypted transaction information SD' is compared with the stored transaction information SD (stored in step 354) to further verify whether the service provider system 126 received the correct transaction information. If the received (and optionally decrypted) transaction information does not match the stored (and optionally decrypted) transaction information, method 500 proceeds to step 518. If the received and generated second transaction passcode match and/or the received and stored transation information match, method 500 proceeds to step 506. In step 506, user system 101 computes the next transaction passcode PD'= (GD' , SD) (the second transaction passcode) using the next transaction passcode generator GD' (computed in step 360) unless the next transaction passcode was already computed in method 300C. In an embodiment, the next transaction passcode (the second transaction passcode) is only generated just before the next transaction passcode is needed (e.g., milliseconds before the next transaction passcode is needed) and then deleted immediately after use so that the transaction passcode never exists for more than a few millisecond or for more than a few seconds. In step 508, the received transaction passcode Ps' (computed in step 412 and sent from service provider system 126) is compared with the computed (or generated) transaction passcode PD' to verify that user system 101 is communicating with service provider 126. If the passcodes do not match, then method 500 proceeds to step 518. In step 510, the passcode generator is updated by user system 101 for the third time, GD" = f(GD') or GD" = f(SD, GD'). In step 512, the next (or third) one time transaction passcode PD" is computed by applying a hash function on the transaction passcode GD" and transaction information SD, PD"= (GD", Sd). In step 514, encrypted transaction information MD'= E(SD, γ (K))) is computed (optionally, if the transaction information was stored in encrypted form, encrypted with the first encryption key, the transaction information is first decrypted with the first encryption key prior to being encrypted with the third encryption key, if necessary). In step 516, the encrypted transaction information MD' (now encrypted with the third encryption key) and the transaction passcode PD" (the third transaction passcode) are transmitted to service provider system 126. As mentioned above, in step 508, if the decrypted transaction information does not match the stored transaction information, method 500 proceeds to step 518. In step 518, method 500 aborts the transaction which may be due to a mismatch in transaction passcode or a mismatch of transaction information.
[1139] In an embodiment, each of the steps of method 500 may be a distinct step. In other embodiments, method 500 may not have all of the above steps and/or may have other steps in addition to or instead of those listed above. The steps of method 500 may be performed in another order. Subsets of the steps listed above as part of method 500 may be used to form their own method. In an embodiment, there could be multiple instances of method 500.
Service Provider Method of Completing the Transaction
[1140] FIG. 6 shows a flowchart of an embodiment of method 600 in a system for completing secure transactions against cyber attacks. Method 600 may be performed by service provider system 126 after receiving one-time transaction passcode PD" and encrypted transaction information MD' (after step 516). Method 600 may be an embodiment of completion of transaction routine 228.
[1141] In step 601 , method 600 receives the transaction passcode and encrypted transaction information for the second time (which were sent in step 516 of method 500, FIG. 5). In step 602, passcode generator is updated by applying a function on the previous passcode generator, Gs"= f(Gs'). In step 604, method 600 decrypts the received transaction information (sent from user system 101 in step 516), Ss'=Decrypt (MD'). In step 606, the next transaction passcode is computed by applying a hash function to a combination of the updated passcode generator of step 602 and transaction information Ss', to create transaction passcode Ps" = < (Gs", Ss' ). In step 608, the received transaction passcode PD" (sent from user system 101 in step 516) is compared with the computed transaction passcode Ps" to verify that service provider 126 is communicating with the correct user system 101. If the passcodes do not match, method 600 proceeds to step 614 where the method 600 terminates. In step 610, method 600 compares the decrypted transaction information Ss' with the stored transaction information Ss (stored in step 354) to further verify whether the service provider system 126 received the correct transaction information. If the decrypted transaction information does not match the stored transaction information, method 600 proceeds to step 614 where the method terminates. In step 612, service provider 126 completes the transaction requested by user system 101. Method 600 transfers control to step 614 from either step 608 or step 610. In step 614, method 600 aborts the transaction which may be due to an invalid transaction passcode or a mismatch in transaction information.
[1142] In an embodiment, each of the steps of method 600 may be a distinct step. In other embodiments, method 600 may not have all of the above steps and/or may have other steps in addition to or instead of those listed above. The steps of method 600 may be performed in another order. Subsets of the steps listed above as part of method 600 may be used to form their own method. In an embodiment, there could be multiple instances of method 600.
[1143] Methods 300B, 400, 500 and 600 may be repeated every time the user would like perform a transaction, and the passcode, passcode generator, and optionally the encryption key are further updated to new values as a result of the repetition.
[1144] In methods 300B, 400, 500, and 600, although the transaction information sent always pertains to the same transaction (until that transaction is committed) different the transaction information may be sent each time the user sends transaction information to the service provider, so long as the service provider receives all the transaction information the second time the passcode and transaction information are sent (prior to the completing the transaction).
[1145] FIG. 7 shows a diagram of a browser showing the recipient information being entered into the web browser.
In at least one embodiment, it may be more convenient for part of the transaction
information T to be entered into the web browser and part of the transaction information S will come from the secure area. In at least one embodiment, transaction information T for the recipient may be entered directly into the web browser. Transaction information may contain the recipient's name on the account; the name of the bank or financial institution; the recipient's account number and other important items such as the routing number. In at least one embodiment, the user's transaction information S may be entered into the secure area of the device during setup (enrollment). This may occur when the bank or financial account is opened. The user's transaction information S may be entered after the account is opened at the financial institution or remotely on the device.
ALTERNATIVE EMBODIMENT USING TIME (implemented in system 100): SETUP
[1146] During setup, in the secure area 102, biometric print information obtained from the user and in at least one embodiment unpredictable noise received from the hardware in the secure area
102 is passed to a one-way hash function Φ or another one way method. In one embodiment, the unpredictable noise may come from a physical process using one or more photo-transistors. The unpredictable noise and/or biometric data is used by the user system 101 to generate a seed σ and in at least one embodiment a cryptographic key K. Then seed σ and key K are securely transmitted to the administrator. The secure distribution of seed σ and cryptographic key K may be performed by a
Diffie-Hellman key exchange. Alternatively, service provider system 126 may generate σ and key K from biometric data and/or unpredictable noise (e.g., while the user visits the offices of the service provider), and the seed and key are sent from service provider 126 to user system 101. In at least one embodiment, the distribution and transmission of seed σ and cryptographic key K may use elliptic curve cryptography for creating the cryptographical key K and/or for the encryption used in the Diffie-Hellman key exchange. In at least one embodiment, the secure transmission of seed σ and encryption key K may use a camera that reads a proprietary pattern that the portable device is able to display after setup is complete.
[1147] In at least one embodiment, the seed σ may be given to the administrator in the same physical place, such as at a bank, or the seed may be mailed or electronically transmitted to the administrator if setup is accomplished remotely. In some applications, the seed may be encrypted first and then electronically transmitted or sent by mail. Throughout this specification the term administrator and service provider 126 may be interchanged to obtain different embodiments and terms of use. Throughout this specification user system 101 and user may be substituted one for another to obtain different embodiments except in discussion of the user interacting with user system 101.
SETUP (USER REGISTRATION)
[1148] During setup, the user presents user information, which may include his / her biometric attributes one or more times to a sensor. Setup may also request the user to present information that he or she knows. The information that the user knows may be a PIN, password, or a sequence or collection of images that are easy to remember. At the end of setup, the following steps are executed:
[1149] Step 1.) Biometric print information, unpredictable noise from hardware in the secure area and other items (e.g., images, PIN, etc.) obtained from the setup, denoted as user information T, are used to create a seed σ. A hash function Φ is applied to user information T, one or more times denoted as Ok(T), to create the seed σ. In other words, σ = Dk(T). In at least one embodiment, user information T is divided into two parts U, W as described in the previous section and U is used to generate the seed and W is used to generate an encryption key K, which the user's secure area and the administrator only have access to. Similarly, the encryption key may be generated by applying the hash function one or more times to the other part of the user information W one or more times (which may be written as K = 0J W)). In at least one embodiment, more than one type of hash function may be used so for example, SHA-1 may be applied to one part of the user information U one or more times and Keccak may be applied to the other part of the user information W one or more times.
[1150] Step 2.) The seed σ and the cryptography key K are transmitted to a passcode display or possibly encrypted and wirelessly transmitted to the administrator.
[1151] Step 3.) The seed σ is securely displayed to the administrator in the same physical place or possibly decrypted by the administrator if received from a remote location and stored in a secure area maintained by the administrator.
SECURELY EXECUTING A FINANCIAL TRANSACTION
[1152] When a transaction is requested by the person, after a valid biometric print match occurs or a valid verification of other user items such as password, PIN, or images at user system 101, in at least one embodiment, there are transaction steps A, B, and C, which make up a successful transaction. Steps A, B, and C help prevent an un-trusted browser attack or other cyberattack from compromising the transaction.
[1153] TRANSACTION STEP A. The person (user) securely enters transaction information into the secure area 102 of his device (e.g., user sytem 101) and the transaction information is securely transmitted to the backend administrator (user's bank account that verifies the person and executes the transaction) (e.g., at service provider 126).
A.1 The person selects and enters transaction information I into the secure area 102 of user system 101.
A.2 Transaction information I is encrypted in secure area 102 with key K denoted as E(I, K). A.3. The transaction seed σ is retrieved or reconstructed from a secure area 102. A.4 The current time i is read.
A.5 A hash function Φ is applied to transaction seed σ and transaction information I, denoted as Φ(σ, I , Ti), to create the one-time transaction passcode P. In other words, P = Φ(σ, I , Xi).
A.6 The one-time transaction passcode P and encrypted transaction information E(I, K) may transmitted from user system 101 to a display or submitted directly to the administrator at service provider system 126. During transmission, in some embodiments P may be encrypted for additional security. There are many different methods for transmitting the passcode and encrypted transaction information to the administrator (bank) at service provider system 126. In one method, the passcode and encrypted transaction information may be displayed to the administrator, when the user is in the same physical location as the administrator. In a second method, the user may wirelessly transmit the passcode via a mobile phone to service provider system 126. In a third method, the user may submit the passcode and encrypted transaction information to the web browser of user system 101 and use the Internet for transmission to the administrator (bank) at service provider system 126. In many other methods, the user may submit the passcode and encrypted transaction information by some other electronic means, such as a fax machine or an ATM machine. In at least one embodiment, the current time Xi is determined and rounded to the nearest minute, for example. Optionally, the sender and receiver may compute the difference in time between the clock of the sender and the clock of the receiver prior to sending a message in case the two clocks are not sufficiently synchronized. In other embodiments, the time may be rounded to the nearest 5 minutes, the nearest, 10 minute, or the nearest hour, for example. Here the reference time is GMT time. For example, if the exact time is 19:05 and 45 seconds, then i is set to is 19:06 pm.
[1154] In other embodiments, the current time Xi is determined and rounded to the nearest 90 second. In other embodiments, the current time %\ is determined and rounded to the nearest 5 minutes. In these embodiments, if the exact time is 6:07 and 57 seconds, then Xi is set to 6: 10. In at least one embodiment, the administrator (e.g., via service provider system 126) verifies the transaction passcode and verifies the encrypted transaction information and then executes this transaction if the transaction passcode is valid based on the decrypted transaction information, the same seed and the current time. In this specification the words "valid" and "authenticated" and their conjugations may be substituted one for another to obtain different embodiments. If the transaction passcode is determined to not be correct, or the decrypted transaction information is unreadable, then the transaction is aborted. In other embodiments, the administrator continues with transaction steps B and C before the transaction is executed.
[1155] TRANSACTION STEP B. The administrator (bank) receives at service provider system 126 the encrypted transaction information and one-time transaction passcode. The administrator decrypts the transaction information and checks that the onetime transaction passcode is correct (e.g., the decrypted transaction information, the seed, and the time at which the passcode was generated are encrypted with a one-way hash function thereby computing the passcode, and the computed passcode is compared to a newly sent passcode to determine if there is a match.). If the one-time transaction passcode received from the user is not correct (e.g., if the sent passcode does not match the computed passcode), the transaction is aborted, and no transaction occurs. If the one-time transaction passcode received from the user is correct (e.g., if the sent passcode matches the computed passcode), then the administrator sends a new transaction passcode back to the user. The new passcode may be computed by optionally applying a function f to the seed σ to form f(o) and applying a hash function to the combination of f(a), transaction information I, time τ2, as P' = Φ( f(o), I ¾), where x2 is the new current time read by the administrator (at serice provider system 126). In at least one embodiment, the function is not applied to the seed σ, the new passcode is generated by applying a hash function to the combination of the seed σ, transaction information I, time x2, as P' = Φ( σ, I , τ2), which is a specific case of the prior expression for computing the new passcode in which, f(a) = σ. In other embodiments, f is a function that both the user and administrator both know.
[1156] In at least one embodiment, the encryption key K may be updated, denoted as γ(Κ), using similar methods to the update of the transaction passcode generator. Then the encrypted transaction information E(I, γ(Κ)) or E(I, K) is sent from the administrator (bank) back to the user. (Updating the encryption key K helps address sniffing and replay attacks.)
[1157] TRANSACTION STEP C. The user, via user system 101 , verifies that he or she is communicating to the correct administrator (bank) at service provider system 126 by checking the next passcode Φ( f(a), I , x2) based on the user's current time and the user's seed. The user, via user system 101, further verifies that the transaction information has not changed by decrypting E(I, γ(Κ) ) or decrypting E(I, K) and checks that the administrator knows that the transaction information is still I. In some embodiments, the user may check the transaction information and associated transaction passcode by reading them from a display screen that can only be accessed by the secure area. If the verification or check are invalid, then the transaction is aborted. The user submits a new transaction passcode Φ( f(f(a)), I , x3)) and also E(I, γ(γ(Κ)) ) back to the administrator. If these values received by the administrator, at service provider system 126, are valid, the transaction is successfully executed by service provider system 126. Otherwise, the administrator (bank), via service provider system 126, aborts the transaction.
SPEED IMPROVEMENTS FOR MANY USERS
[1158] In at least one embodiment, there may be many users for the administrator to keep records of. For these embodiments, the administrator can speed up the search process, by replacing previous steps by the following: [1159] The administrator uses an index U or other identifier associated with transaction passcode P, and uses index U to find the corresponding passcode generator Gu- Alternatively a user identifier may be sent as a separate data item to the administrator. (The passcode generator for each user can be indexed by the user number or index U in a database.) The administrator applies a hash function Φ to Gu, S denoted as 0(Gu, S), and compares it to P.
[1160] If 0(Gu, S) equals P, then the transaction passcode submitted by the field user is valid, and the passcode generator is set equal to the new value of G', generated by applying the perturbing function to G, i.e. G' = f(G, S) or G' = f(G) depending on the embodiment.
REDUCING USER AND TRANSMISSION ERRORS
[1161] If a user is reading the one-time transaction passcode from a display, sometimes the user may incorrectly read the one-time passcode or incorrectly write the onetime passcode down. Alternatively, the user may forget to record the one-time transaction passcode, or the user may type the one-time passcode into a keyboard incorrectly or the wireless transmission (or other transmission) may flip one or more bits which cause the onetime transaction passcode received by the administrator to be invalid. In any of these cases, the user may present biometrics or other authentication items again, and user system 101 will generate a new transaction passcode updating the passcode generator and passcode, whereas since the transaction as not successful, service provider system 126 will not update the passcode generator and passcode. As a result, user system 101 and service provider system 126 may be out of synchronization. Although user system 101 may be configures so as to revert back to the prior passcode and passcode generator is the transaction does not complete, another error may occur causing the passcode and passcode generator at user system 101 to be out of synchronization with the passcode and passcode generator at service provider system 126. To handle this situation, user system 101 and/or service provider system 126 may be capable of specifying a particular passcode generator according to the number of times (k) that Φ or f is applied. In an embodiment the k that is specified should be large enough to ensure that the same passcode is never used twice.
[1162] As an example, in at least one embodiment, if the last passcode successfully submitted was the 101st passcode (or some other number passcode, Nl), then the
administrator may request the 1 19th passcode (or yet another number passcode, N2) and the user will send the 119th passcode (or the N2 passcode). In at least one embodiment, the passcode requested may be encrypted. In at least one embodiment, if the user has already generated a number of passcodes up to the 124th passcode (or another number passcode, N3) and the passcode requested by the administrator is not greater than the current one to be generated by the user, i.e., 124 (or N3), the user may communicate to the administrator, please request a passcode greater than 124th passcode (N3). In this case, the administrator may request the 1001st passcode from the user (or another number passcode N4, where Nl < N2 < N3 < N4).
SECURING EXECUTABLES AND THEIR FUNCTIONALITY
[1163] In at least one embodiment, there is computer program E that performs an important functionality. In at least one embodiment, computer program is executable code that has been compiled from source code such as C or C++ or FORTRAN. In other embodiments, computer program may refer to virtual machine code. As an example, a computer program written in the source code language JAVA compiles to java virtual machine code, which is then executed on the JAVA virtual machine. It is important that the functionality of computer program E is not be disabled by malware. In embodiments that use vehicles such as autos and truck, E may unlock the brakes. In another vehicle embodiment, some computer program E may turn off an engine. In another embodiment, computer program E may start the turbines in a dam. In another embodiments, computer program E may carry out a financial transaction between two financial institutions. In another embodiment, computer program E may execute inside a router and help transmit data packets over the internet. In another embodiment, computer program E may regulate the water flow in a nuclear power plant. In another embodiment, computer program E may run the infrastructure in an oil refinery plant.
[1164] In at least one embodiment, there are methods used to prevent malware from changing or corrupting the functionality of some computer program E, which may be in the form of executable code. The methods that protect against malware may be combined in various ways in different embodiments. One method is to authenticate the computer code. This means that the method assures that the purpose or functionality of the computer code is not altered. This method is helpful in cyber security as some kinds of malware change or sabotage the purpose of the computer program. As an example, malware may lock the brakes in an automobile when the driver did not press on the brake pedal. Sometimes, the malware may reach the network of the automobile via wireless access. One method is for the authentication to occur by creating a signature S for correct computer program E and making all other programs that call or request the functionality from computer program E to communicate to computer program E that they know this signature. Consider program F which would like to call computer program E, and then it could take a private key V and sign signature S without revealing S so that malware cannot fake knowledge of the signature. In this embodiment, D(V, S) may be transmitted to computer program E along with a request to execute computer program E. Computer program E validates the signature by decrypting with public key P and then checking that S is a valid signature for computer program E. In at least one embodiment, the signature S may be created at the time of programming the chip that contains computer program E. In other embodiments, signature S may be created later after the vehicle is registered with one or more owners. This might occur after the automobile has been purchased by an owner.
[1165] In other embodiments, computer program E may have functionality that executes a financial transaction for a financial institution such as a bank or investment fund or even a government institution such as the post office, the IRS or Freddie Mac.
USER INTERFACE IN THE SECURE AREA
[1166] In at least one embodiment, the user interface may be connected to the secure area of the device may have a display screen and navigation buttons or character entry of letters, numbers or symbols using a touch sensitive screen. In at least one embodiment, the device may have a USB connection. In at least one embodiment, the device containing the secure area 102 may contain a wireless chip and a battery. In at least one embodiment, the device may be a mobile phone.
[1167] FIG 8 shows a display screen. In at least one embodiment, the display screen may be an OLED. In other embodiments, the display screen may use an LCD. In at least one embodiment, some or all of the financial institution members of SWIFT may be stored into the secure area of the chip inside the device when the user registers with the bank or opens an account. In at least one embodiment, the user may use the navigation buttons, and/or character entry of letters, numbers or symbols using a touch sensitive screen and a display screen to scroll and select one of the banks to make a transaction with. In at least one embodiment, the user may use navigations buttons or a touch sensitive screen and display screen to scroll and select other transaction information stored in the secure area of the chip. In at least one embodiment, the user may use the navigation buttons and display screen to scroll and select letters or words that help enter transaction information. [1168] In at least one embodiment, the user may be an employee of the bank. In at least one embodiment, the device may be used to securely execute wire transfers between two banks. In at least one embodiment, the device containing the secure area may contain a microphone. In at least one embodiment, the secure area of the chip may contain speech recognition code to receive transaction instructions or information from the user. In at least one embodiment, the device may have one or more biometric sensors. In at least one embodiment, the display screen may act as a keyboard for entering passwords and transaction information. In at least one embodiment, the display screen may enable the user to verify that the transaction information is correct or has not been tampered with by malware before executing the transaction.
[1169] In an embodiment, each passcode generator is not stored in a database but stored in a separate chip which is indexed by the user's name and/or user id. In an
embodiment, the function call trxl _passcode(user_name, routing jmmber, trx_amouni) is passed in the user's name, userjiame, the user's routing number, routing jiumber, and the transaction amount, trx_amount, and trxl _passcode returns a transaction passcode that the bank expects to be the correct passcode.
[1170] The returned transaction passcode is compared to the transaction code received from the user's device. This embodiment protects the passcode generator, because the passcode generator never leaves the separate chip.
[1171] In an alternative embodiment,
trx2 _passcode(recipient_name, receipient_routing_number, trx_amouni);
passes the user's name, userjiame, the user's routing number, r outing jiumber, and the transaction amount, trx_amount, and trxl _passcode returns a transaction passcode Q that the bank expects to be the correct transaction passcode, which is dependent on the recipient's name, the recipient's routing number and the transaction amount to be sent from the user to the recipient. The transaction passcode Q is compared to the transaction passcode received from the user's device, which may be a token, mobile phone or other device. In an embodiment, an interface retrieves a passcode generator, passcode _generator, from a database. In an embodiment, the interface is implemented with the diameter protocol <http://en.wikipedia.org/wiki/Diameter_(protocol)>. In an alternative embodiment, the interface is implemented with the RADIUS protocol
<http://en.wikipedia.org/wiki/RADIUS>. In an embodiment, each pass code ^generator is stored in an embedded database. In an embodiment, the passcode generator,
passcode ^generator, is a string of the form
"23 102 215 211 55 125 14 25 36 48 152 201 106 11 77 20 21 76 53 89 29 104 114 188 209 45 135 94 15 35 47 254 219 125 35 14 19 25 27 244 236" or the string might be longer. In an embodiment, the passcode generator, passcode _generator, is a sequence of bytes of the form:
"2AB02CE4E1BA93DBC9E844E6551E3CC3FF83A7877B1A4A3205885E724159AB7291 8AFCD 15FE817A87B305F43C 10500CE2290C49AC032F7B674230A84FEA2DD IE".
[1172] In an embodiment, the passcode generator, passcode ^generator may be substantially longer. For example, passcode ^generator may have a length of 2048 bytes or 65,536 bytes.
[1173] In the C programming language the length of the passcode generator could be declared as follows
unsigned char passcode_generator[64]; or
char passcode_generator[2048]; or unsigned char passcode_generator[65536];
An example of a user iame is Alex Barangan. In the C programming language the user name could be declared as follows, unsigned char userjiame [200] = {Ά', Ί', 'e', 'x', ' ', 'B', 'a', 'r', 'a', 'η', 'g\ 'a', 'η', '\0'}; [1174] An example of a routing iumber is string "124000379". An example of trx_amount is "$5000".
[1175] Cryptor is the name of function that encrypts or decrypts transaction data. In an embodiment, the function the decrypts and encrypts transactions may execute a symmetric cryptography algorithm such as AES-256. In another embodiment, function that encrypts or decrypts transaction data, cryptor, may execute an asymmetric cryptography algorithm such as RSA or ECC (Elliptic curve cryptography).
[1176] Consider the C function call cryptor("d", ciperjext, keyjbytes).
The option "d" tells the function to decrypt ciperjext. In an embodiment ciperjext is an encypted string of the form "A1092BFF . . . 55." In an alternative embodiment "127 134 147 189 209 . . . 234". This represents the text that has been encrypted, keyjbytes is the variable storing the key that is used by cryptor to decrypt ciperjext. In an embodiment, keyjbytes is a string of the form "7BCAF22D . . . 0E38". In an alternative embodiment, "123 202 242 45 . . . 14 156". In an embodiment, keyjbytes may have length of 32 bytes. In another embodiment, keyjbytes may have length of 2048 bytes. In an embodiment, the decrypted ciphertext may be returned in the string ciperjext.
[1177] Consider the C function call cryptor("e", plain Jext, keyjbytes); The option "e " tells the function to encrypt plain Jext. In an embodiment plain Jext is a string of the form "User: Alex Barangan. Account Number: 121456789-3456789956. Bank: Wells Fargo. Amount: $5000.
Recipient: Michael Fiske. Account Number: 101345729- 2411779888 Bank: Citibank" This represents the text that has been encrypted, keyjbytes is the variable storing the key that is used by cryptor to encrypt plain Jext.
[1178] In an embodiment, keyjbytes is a string of the form "7BCAF22D . . . 0E38". In an alternative embodiment, keyjbytes may have the string "123 202 242 45 . . . 14 156". In an embodiment, keyjbytes may have length of 32 bytes. In another embodiment, keyjbytes may have length of 2048 bytes. In an embodiment, the encrypted ciphertext may be returned in the string plain Jext.
TRANSACTION DEMO STEPS [1179] Some of the details of these steps are for pedagogical purposes in order to teach or demonstrate to a potential licensee how the underlying security works.
[1180] Step 1. Enter transaction information into the secure area. For example the transaction information may be
Name: Alex Barangan
Routing Number: 121 456 789
Transaction Amount $: 5000
[1181] Step 2. The secure area displays in encrypted form the transaction information on the display screen (e.g., an organic light emitting diode OLED). In some production versions the encrypted transaction information is not displayed, but is wirelessly sent to the web browser or backend.
[1182] Step 3. A user with privileged access to the secure area manually enters this encrypted information read off the display along with a one-time passcode into that browser at a webpage, such as www.biogy.com/TRX. Similarly, in at least some production version the encrypted transaction information with the one-time passcode is sent automatically to the system that would from the secure area of the user system to the service provider system. For example, the format of the information may be
Passcode: trx _passcode
Name: encj ame
Routing Number: enc _routing_number
Transaction Amount: enc_trx_amount
where trx _passcode is the variable for storing the passcode, encjiame is the variable for storing the name, enc _r outing _number, is the variable for storing the routing number, and enc_trx_amount is the variable for storing the transaction amount. (The above encrypted info depends on entering this information directly into the device in step 1.) [1183] The correct passcode is dependent on the name, routing number, transaction amount and the passcode generator. A function called trx_passcode will return the correct passcode (under normal conditions, returning the passcode would be sent automatically but for purposes of better understanding this embodiment, this is important.)
[1184] Step 4. A web browser checks trx _passcode and makes the following executable calls:
cryptor d enc iame passcode _generator
and namejnts is returned
cryptor d enc _r outing jmmber passcode _generator
and routing jiumber Jnts is returned
cryptor d enc _trx _amount passcode generator
and trx _amount Jnts is returned
ints_to_str namejnts
name is returned
ints o_str routing iumber Jnts
routing _number is returned
ints o_str trx _amount Jnts
trx_amount is returned
authenticate jpasscode name routing jiumber trx_amount passcode jgenerator trx jpasscode
[1185] The following algorithm may be executed.
If passcode is valid
{
next jgenerator catches returned value of authenticate jpasscode x . . .
cryptor e namejnts next generator
returns enc2_name cryptor e routingjmmber _ints next_generator
returns enc2 _r outing jmmber
cryptor e trx_amount_ints next_generator
returns enc2_trx_amount
}
else
{
Indicate invalid one ime _passcode.
Transaction not completed, (an option may be put here for how to handle the errror). Exit
}
If passcode is valid, browser displays new encrypted information on the web page:
Passcode: Valid Transaction Passcode
Name: enc2_name
Routing Number: enc2_routing_number
Transaction Amount: enc2 _trx_amount
[1186] Step 5. The encrypted fields are read by the person off the browser, entered back into the secure area. In at least some production versions the encrypted information is automatically transmitted from the service provider system back into the secure area. The personal vault or secure area checks to see that new encrypted information matches the transaction information sent in step 1. If there is a match, the match confirms that the backend actually has the correct transaction information.
[1187] Step 6. If there is a match, the vault sends a new passcode passcode _authorize and new encrypted transaction info back (resulting from a thirrd encryption) to web browser to authorize the transaction. The information sent may include Passcode: passcode _authorize
Name: enc3 name
Routing Number: enc3 _routing_number
Transaction Amount: enc3 trx amount
[1188] Step 7. The browser indicates successful transaction with transaction confirmation number displayed. Critical transaction details are encrypted.
[1189] Transaction Demo Steps.
An interface retrieves the passcode generator, passcode generator, from a database. trx_passcode(name, routing number, trx amount, passcode generator), in which the transaction passcode (trx_passcode) is computed based on the name on the account (name), the routing number (routing number), the transaction amount trx_passcode (trx amount), and passcode generator (passcode generator). On the Unix command line: authenticate_passcode x name routing number trx amount passcode generator where: name is plaintext string of the form "Alex".
routing number is plaintext string of the form "124000379".
trx_amount is plaintext string of the form "123456789".
embodiment, passcode ^generator is a string of the form "123 202 242 209 45 135 94 15 35 47 254 219 125 35 14 19'
cryptor xd ciper ext key_bytes In an embodiment, ciperjext is encypted of the form "127 134 147 189 209 . . . 234" key_bytes is a string of the form "123 202 242 209 45 135 94 15 35 47 254 219 125 35 14 19". The trx _passcode function returns a decrypted string of the form "97 84 57 92 201 . . . 207" embodiment, cryptor xd uses an internal static _key cryptor xe plain Jext key_bytes
plainjext is string of the form "127 134 147 189 209 . . . 234"
key_bytes is string of the form
"123 202 242 209 45 135 94 15 35 47 254 219 125 35 14 19"
Returns an encrypted string of the form "97 84 57 92 201 . . . 207"
In an embodiment, cryptor xe uses an internal static_key
[1190] FIG. 9 shows a screenshot of an embodiment of user interface 900, which is for entering the registration of a user. Figure 9 has user name field 902, registration code field 904, register button 906 and authentication link 908. In other embodiments, user interface 900 may not have all of the elements listed and/or may have other elements instead of or in addition to those listed.
[1191] User name field 902 may be an input box to enter the user name as entering during the setup. Registration code field 904 may be the registration code received during setup that a user enters to perform a transaction. Selecting register button 906 enables a user to register for being able to execute transactions. Selection of authentication link 908, displays an authentication screen.
[1192] Figure 10 shows an embodiment of a screenshot of a user interface 1000, which is an embodiment of a user interface for authenticating a passcode. User interface 1000 has username field 1002, passcode field 1004, transaction name field 1006, transaction routing field 1008, transaction amount field 1010, enter button 1012 and registration code link 1014. In other embodiments, user interface 1000 may not have all of the elements listed and/or may have other elements instead of or in addition to those listed.User name field 1002 is an input box to enter the name of the user as registered during setup. Passcode field 1004 is the passcode obtained during setup, transaction name 1006. Transaction routing field 1008 maybe the routing number of the service provider. Transaction amount field 1010 is the transaction amount. Enter button 1012 when selected authenticates the passcode. Registration code link 1014 when selected displays a screenshot similar to user interface 900.
[1193] C. Database
[1194] TRANSACTION DEMO STEPS
[1195] Step 1. The user enters transaction information into the secure area 102. Name: Alex Barangan
Routing Number: 123 345 678
Transaction Amount: 1500000
[1196] Step 2. The secure area 102 displays in encrypted form the transaction information on the display (e.g., Organic Light Eitting Diode (OLED) or other display screen).
[1197] Step 3. The users with privileged access to the secure area 102 may manually enter this encrypted information to read off the display along with a one time passcode into a browser or this may be transmitted automatically. In at least some production versions, the encrypted information is transmitted automatically without being read off the display and manually entered. An example user interface 1000 is shown in FIG. 10. In the remainder of the example, the variables and functions that are used to represent the encrypted information is as follows.
Passcode: trx _passcode Name: encj ame
Routing Number: enc _r outing jmmber
Transaction Amount: encJ.rx_am.ount
[1198] In the above, trx _passcode is output passcode, which results from a function that produces the passcode, using enc iame, enc_routing_number, and enc_trx_amount as the inut variables, (The above encrypted information depends on entering this information directly into the device in step 1.)
[1199] The correct passcode depends on the name, routing number, transaction amount and the passcode generator. The function trx_passcode may return the correct passcode.
[1200] (Under normal conditions, the passcode trx_passcode would be sent automatically to the administrator, but for purposes of understanding the solution, an example is given in which the information is sent manually.)
[1201] Step 4. The web browser checks the passcode, trx _passcode. For example, the interface code may make the following executable calls for encrypting the transaction information. In the following, cryptor xd is an encryption function with two input variable that are encrypted together to return an encrypted output.
[1202] cryptor xd encjiame passcode _generator, which encrypts the name with the passcode generator to return the encrypted name, namejnts
[1203] cryptor xd encjouting umber passcode _generator,
which encrypts the routing number with the passcode generator to return the encrypted routing number, routing umber Jnts .
[1204] cryptor xd enc Jrx _amount passcode ^generator which encrypts the amount of the transaction with the passcode generator to return the encrypted transaction amount, trx _amount Jnts. [1205] The above encrypted information is sent to the administrator performing the transaction on behalf of the user, where the information is decrypted., as follows.
[1206] The following instruction decrypts the name ints_to_str namejnts where name is returned. The following instruction decrypts the routing number
ints_to_str routing iumb er jnts (routing iumber is returned)
[1207] The following instruction decrypts the transaction amount
ints_to_str trx_amount_ints . (trx_amount is returned)
The following instruction authenticates the passcode, name, transaction amount, and routing number authenticate _passcode x name routing iumber trx_amount passcode generator trx jpasscode
[1208] The following routine is performed to update the passcode generator if the passcode is valid. Or abort the transaction if the passcode was not valid.
If passcode is valid
{
next jgenerator catches returned value of authenticate jpasscode x . . .
cryptor xe name ints next generator
returns enc2_name
}
[1209] cryptor xe routing number ints next generator
returns enc2_routing_number
[1210] cryptor xe trx amount ints next generator
returns enc2_trx_amount
Else
{ Indicate invalid one time passcode.
Transaction not completed, (create an option here).
Exit
}
[1211] If the passcode and other transaction information is valid, the browser displays new encrypted information on the web page:
Passcode: Valid Transaction Passcode
Name: enc2_name
Routing Number: enc2 _routing_number
Transaction Amount: enc2 _trx_amount
[1212] Step 5. The encrypted fields are read by the person or the device from the browser, entered or transmitted back into the secure area. In an at least some production versions the encrypted information is automatically transmitted from the service provider system back into the secure area. The Personal Vault secure area checks to see that new encrypted information matches the transaction information sent in step 1.
[1213] This confirms that the backend actually has the correct transaction
information.
[1214] Step 6. If the information matches, the demo device sends a new passcode passcode _authorize and new encrypted transaction information back (resulting from a third encryption) to the web browser to authorize the transaction.
Passcode: passcode _authorize
Name: enc3_name
Routing Number: enc 3 _r outing jmmber
Transaction Amount: enc3 trx amount [1215] In an embodiment, only the step 4 check is performed by the service provider if a faster transaction desired.
[1216] EXTENSIONS AND ALTERNATIVES
[1217] Each embodiment disclosed herein may be used or otherwise combined with any of the other embodiments disclosed. Any element of any embodiment may be used in any embodiment. At least one embodiment of this specification includes all of the embodiments being used together except for those that are mutually exclusive.
[1218] Although the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the true spirit and scope of the invention. In addition, modifications may be made without departing from the essential teachings of the invention.

Claims

1. A method of securing a transaction comprising:
generating a passcode from information about the transaction, at a user system, the user system having a processor system having at least one processor, a communications interface, and a memory system;
sending, by the user system, the passcode generated to a service provider, for authentication in conjunction with a request to perform the transaction; and receiving at the user system from the service provider system, a response if the passcode is valid.
2. The method of claim 1 further comprising changing the passcode at each step of the transaction that involves an exchange of information related to the transaction between the user system and the service provider system.
3. The method of claim 2 further comprising,
at each step of the transaction, updating a value that is a passcode generator, and the changing of the passcode at each step including at least, at each step generating the passcode from the passcode generator and the transaction information.
4. The method of claim 1, further comprising sending a registration code to the service provider prior to sending the passcode.
5. The method of claim 1, wherein the user system includes a secure area and a remaining portion that includes all of the user system but the secure area, the remaining portion of the user system not having access to the secure area; the method further comprising storing a transaction passcode generator in a secure area in the user system.
6. The method of claim 5, applying a one-way function on the registration code to generate an initial passcode generator or using the registration code as the initial passcode generator, the generating of the passcode from the information about the transaction, including at least generating the passcode from the information about the transaction and from the passcode generator.
7. The method of claim 6 wherein the one-way function is a hash function.
8. The method of claim 1, wherein the information includes biometric data of the user associated with the transaction.
9. The method of claim 1, further comprising sending a registration code and a cryptographic key to the service provider prior to sending the passcode.
10. The method of claim 9, further comprising:
receiving, at the user system from the service provider, encrypted transaction information; updating the passcode generator;
decrypting the encrypted transaction information with the cryptographic key that was
updated,
computing a new transaction passcode with the passcode generator that was updated and the transaction information; comparing the one-time transaction passcode received and the new transaction passcode generated;
comparing the transaction information received with stored transaction information;
if the one-time transaction passcode received and the new transaction passcode generated match and if the transaction information received matches stored transaction information, continuing the method.
11. The method of claim 1 further comprising sending a digital signature with the passcode and the transaction information.
12. The method of claim 11 wherein said computer program is authenticated by using a signature associated to said computer program.
13. The method of claim 12 wherein said computer program must receive verification that user system knows the signature in order to execute the transaction.
14. The method of claim 13 wherein validating that the user knows the computer program signature also involves authenticating user with biometric.
15. The method of claim 13 where validating that user knows said computer program also has user validate transaction information on the display screen.
16. The method of claim 13 wherein said user system is executed by one or more processors in a vehicle.
17. The method of claim 16 wherein said service provider is executed by one or more processors in a vehicle.
18. The method of claim 1 wherein said service provider is a bank or financial exchange.
19. The method of claim 18 wherein said financial exchange is NASDAQ.
20. The method of claim 1 wherein said passcode is not created until after a valid user authentication.
21. The method of claim 20 wherein said authentication is a biometric authentication.
22. The method of claim 20 wherein said authentication uses at least a PIN or a password.
23. The method of claim 20 wherein said authentication has user select at least one visual image.
24. The method of claim 1 where said passcode is also dependent on a seed and the current time.
25. A system comprising;
a first processor system having at least one processor,
a first memory system with which the processor system communicates,
a user interface for the user to enter and view information that is processed by the processor system, and a network communications system for receiving and sending messages over a network that are processed by the processor system;
a secure area including at least
a second processor system for processing secure transactions, and a second memory system storing a passcode, a passcode generator, which is a value form which the passcode is generated;
the second memory and second processor system being communicatively coupled to one another;
the first processor system having no access to the second processor system and the second memory system.
26. The system of claim 25, wherein said system executes on a mobile phone.
27. The system of claim 25, further comprising:
a display screen, the secure area being communicatively coupled to the display screen;
the secure area being communicatively coupled to at least a portion of the display screen for displaying information about the transaction on the display screen.
28. The system of claim 25 the first processor not having access to the display screen controlled by the second processor system in the secure area at least while the portion of the display screen is being controlled by the second processor system.
29. The system of claim 25 further comprising buttons or character entry of letters, numbers or other symbols into a user interface that is only connected to the secure area so as to not be accessible to the first processor system.
30. The system of claim 25 where the second memory system, which is in the secure area storing one or more algorithms that cryptographically bind the passcode to the transaction information, so that the passcode will not be valid if the passcode is based on incorrect transaction information.
31. A method comprising:
receiving, at a user system, user information from the user to authenticate the user;
sending, from a user system, a request to initiate a secure transaction with service provider system;
receiving at the user system transaction information from the user;
encrypting the transaction information with a first encryption key,
storing in a secure memory of the user system the encrypted transaction information; the transaction information including a name of a sender, which is a person or entity sending the money, a name of a person or entity receiving the money, a date associated with the transaction,, an account number of the sender, an account number of a receiver the sender's routing number, the receiver's routing number; an identifier of a product traded, the number of units exchanged, a unit price, a name of a broker, and/or an amount of money associated with the transaction;
applying, by a secure processor a hash function to a combination of a first passcode generator and the transaction information, therein generating a first one-time transaction- passcode that is based on both the transaction information and the first passcode generator;
applying a function, at the user system, to the first passcode generator to a generate a second passcode generator, for use for creating a second one time transaction passcode; applying a function, at the user system, to the first encryption key to generate a second encryption key;
transmitting the first one-time transaction passcode and encrypted transaction information from the sender to the receiver;
receiving, at the user system from the reciever, the second one time transaction passcode and the transaction information encrypted with a second encryption key that was generated by the reciever;
decrypting, at the user system, the message that was received from the receiver, with the second encryption key that was generated at the user system;
applying, at the user system, the hash function to a combination of the transaction
information and the second passcode generator to generate the second passcode; determining, at the user system, whether the second passcode received and the second
passcode generated match; if the second passcode received and the second passcode generated do not match terminating the method;
determining, at the user system, whether the transaction information sent and the transaction information received match; ; if the transaction information received and the transaction information sent do not match terminating the method;
applying, at the user system a function to a combination of the second passcode generator and the transaction information to generate a third transaction passcode;
applying, at the user system a function to the second encryption key to generate a third
encryption key;
encrypting, at the user system, the transaction information with the third encryption key; transmitting from the user system to the receiver the transaction information encrypted with the third encryption key and the third transaction passcode; the secure memory and the secure processor being located in a secure area of the user system; the user system processor system and memory system that is not in the secure area, which have not access to the secure area.
32. A method comprising:
at a service provider system, receiving a request to perform a secure transaction including at least a first one-time transaction passcode and encrypted transaction information that was encrypted with a first encryption key;
decrypting, at the service provider, the transaction information;
applying a hash function to a combination of the transaction information and a first passcode generator to generate the first one-time passcode;.
comparing, by the service provider system, the first one-time passcode received to the first one-time passcode generated;
if the first one-time passcode received and the first one-time passcode generated do not
match, the service provider system terminating the method;
if the first one-time passcode received and first one-time passcode generated match, then applying, by the service provider system, a hash function to the first passcode generator to generate a second passcode generator;
applying, by the service provider system, a hash function to a combination of the second passcode generator and the transaction information received to produce a second onetime transaction-passcode;
applying a function, by the service provider system, to the first encryption key to generate a second encryption key;
encrypting, by the service provider system, the transaction information with the second
encryption key; transmitting from the service provider system to the user, the second onetime transaction passcode and the encrypted transaction information that was encrypted with the second encryption key;
receiving, at the service provider, a third one time transaction passcode and the encrypted information encrypted with a third encryption key;
applying, by the service provider system, a function to the second encryption key to generate the third encryption key;
decrypting the encrypted transaction information that was encrypted with the third encryption key;
applying, by the service provider system, a function to the second passcode generator to generate the third passcode generator;
applying, by the service provider system, a function to a combination of the third passcode generator and the transaction information to generate the third one-time passcode; comparing, by the service provider system, the third one-time transaction passcode received to the third one-time passcode generated and the transaction information encrypted with the third encryption key that was received to the transaction information;
if the third one-time transaction passcode received does not match the third one-time
passcode generated terminating the method;
if the transaction information encrypted with the third encryption key that was received does not match the transaction information stored, terminating the method;
if the third one-time transaction passcode received matches the third one-time passcode generated and if the transaction information encrypted with the third encryption key that was received matches the transaction information stored, completing the transaction.
EP12832873.9A 2011-09-25 2012-09-23 Securing transactions against cyberattacks Withdrawn EP2758922A4 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201161626485P 2011-09-25 2011-09-25
US201261659376P 2012-06-13 2012-06-13
US13/541,733 US9858401B2 (en) 2011-08-09 2012-07-04 Securing transactions against cyberattacks
PCT/US2012/056786 WO2013044192A2 (en) 2011-09-25 2012-09-23 Securing transactions against cyberattacks

Publications (2)

Publication Number Publication Date
EP2758922A2 true EP2758922A2 (en) 2014-07-30
EP2758922A4 EP2758922A4 (en) 2015-06-24

Family

ID=47915111

Family Applications (1)

Application Number Title Priority Date Filing Date
EP12832873.9A Withdrawn EP2758922A4 (en) 2011-09-25 2012-09-23 Securing transactions against cyberattacks

Country Status (2)

Country Link
EP (1) EP2758922A4 (en)
WO (1) WO2013044192A2 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10268843B2 (en) 2011-12-06 2019-04-23 AEMEA Inc. Non-deterministic secure active element machine
US9858401B2 (en) 2011-08-09 2018-01-02 Biogy, Inc. Securing transactions against cyberattacks
US9235697B2 (en) 2012-03-05 2016-01-12 Biogy, Inc. One-time passcodes with asymmetric keys
US9049226B1 (en) 2013-03-12 2015-06-02 Emc Corporation Defending against a cyber attack via asset overlay mapping
DE102013006549A1 (en) * 2013-04-08 2014-10-09 Fiducia It Ag Method and system for cashless payment or cash withdrawal with a mobile customer terminal
US11823190B2 (en) * 2013-12-09 2023-11-21 Mastercard International Incorporated Systems, apparatus and methods for improved authentication
CN107306183B (en) * 2016-04-22 2021-12-21 索尼公司 Client, server, method and identity verification system
JP7152765B2 (en) * 2016-06-29 2022-10-13 株式会社プロスパークリエイティブ Communication system, communication device used therein, management device and information terminal
US20190327092A1 (en) * 2018-04-23 2019-10-24 Avago Technologies General Ip (Singapore) Pte. Ltd. Methods and systems for secure biometric authentication
GB2585010B (en) * 2019-06-24 2022-07-13 Blockstar Developments Ltd Cryptocurrency key management
CN113221128B (en) * 2020-01-21 2022-11-08 中国移动通信集团山东有限公司 Account and password storage method and registration management system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002123779A (en) * 2000-10-12 2002-04-26 Hitachi Ltd Method and system for processing settlement and recording medium with stored program
NL1030558C2 (en) * 2005-11-30 2007-05-31 Sdu Identification Bv Authorization document issuing device for e.g. passport issuance, has computer that communicates with clerk unit in the form of secure session that makes use of cryptographic key stored in secure application module of clerk unit
KR100645401B1 (en) * 2006-05-01 2006-11-15 주식회사 미래테크놀로지 Time sync type otp generation device in mobile phone and generation method
US20090063850A1 (en) * 2007-08-29 2009-03-05 Sharwan Kumar Joram Multiple factor user authentication system
US20100125635A1 (en) * 2008-11-17 2010-05-20 Vadim Axelrod User authentication using alternative communication channels
KR20100136269A (en) * 2009-06-18 2010-12-28 주식회사 비즈모델라인 System and method for managing otp with biometrics and recording medium
KR20110039947A (en) * 2009-10-13 2011-04-20 주식회사 아레오네트웍스 System and method for on-line wireless settlement and program recording medium
US20110231315A1 (en) * 2010-03-16 2011-09-22 Infosys Technologies Limited Method and system for making secure payments

Also Published As

Publication number Publication date
WO2013044192A3 (en) 2013-05-30
EP2758922A4 (en) 2015-06-24
WO2013044192A2 (en) 2013-03-28

Similar Documents

Publication Publication Date Title
US20180144114A1 (en) Securing Blockchain Transactions Against Cyberattacks
US11855983B1 (en) Biometric electronic signature authenticated key exchange token
US11824991B2 (en) Securing transactions with a blockchain network
US10491379B2 (en) System, device, and method of secure entry and handling of passwords
US10592651B2 (en) Visual image authentication
CN108809659B (en) Dynamic password generation method, dynamic password verification method, dynamic password system and dynamic password verification system
US20190050554A1 (en) Logo image and advertising authentication
EP2758922A2 (en) Securing transactions against cyberattacks
EP2648163B1 (en) A personalized biometric identification and non-repudiation system
US11949785B1 (en) Biometric authenticated biometric enrollment
CN109076090B (en) Updating biometric data templates
KR102477000B1 (en) Trusted Key Server
US11693944B2 (en) Visual image authentication
US11128453B2 (en) Visual image authentication
US11405387B1 (en) Biometric electronic signature authenticated key exchange token
TW201223225A (en) Method for personal identity authentication utilizing a personal cryptographic device
WO2014039763A1 (en) Visual image authentication and transaction authorization using non-determinism
CN110689351A (en) Financial service verification system and financial service verification method
US20240169350A1 (en) Securing transactions with a blockchain network
US20230359764A1 (en) Visual Image Authentication

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20140327

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20150521

RIC1 Information provided on ipc code assigned before grant

Ipc: G06F 21/57 20130101ALI20150515BHEP

Ipc: G06Q 20/40 20120101ALI20150515BHEP

Ipc: G06Q 20/38 20120101ALI20150515BHEP

Ipc: H04L 29/06 20060101ALI20150515BHEP

Ipc: H04L 9/32 20060101AFI20150515BHEP

Ipc: G06F 21/32 20130101ALI20150515BHEP

Ipc: G06Q 40/02 20120101ALI20150515BHEP

17Q First examination report despatched

Effective date: 20181204

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20200605

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20201016