EP3867782A1 - Authentication system and method - Google Patents
Authentication system and methodInfo
- Publication number
- EP3867782A1 EP3867782A1 EP19794229.5A EP19794229A EP3867782A1 EP 3867782 A1 EP3867782 A1 EP 3867782A1 EP 19794229 A EP19794229 A EP 19794229A EP 3867782 A1 EP3867782 A1 EP 3867782A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- input
- code
- input interface
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 230000003993 interaction Effects 0.000 claims abstract description 94
- 238000012360 testing method Methods 0.000 claims abstract description 56
- 230000004044 response Effects 0.000 claims abstract description 16
- 238000012795 verification Methods 0.000 claims description 108
- 238000004891 communication Methods 0.000 claims description 31
- 230000007246 mechanism Effects 0.000 claims description 25
- 230000008569 process Effects 0.000 description 16
- 230000006870 function Effects 0.000 description 12
- 238000012545 processing Methods 0.000 description 9
- 238000009795 derivation Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 241001465754 Metazoa Species 0.000 description 3
- 230000009191 jumping Effects 0.000 description 3
- 230000002085 persistent effect Effects 0.000 description 3
- 238000010200 validation analysis Methods 0.000 description 3
- 241000251468 Actinopterygii Species 0.000 description 2
- 241000282326 Felis catus Species 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000001052 transient effect Effects 0.000 description 2
- 206010041349 Somnolence Diseases 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000001149 cognitive effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000001627 detrimental effect Effects 0.000 description 1
- 230000009189 diving Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012015 optical character recognition Methods 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Definitions
- the present invention relates to a system, device and method of electronic authentication.
- the present invention relates to an improved means by which user authentication data can be collected via a mobile electronic device, especially for the purpose of verifying the identity of a user.
- One possible way of automating identity authentication is via interaction with existing and highly-secured technology platforms, such as those employed in banking systems. These system are relatively widespread, and are generally up-to-date and trusted holders of user identity. Furthermore, they can provide mechanisms by which users and third parties can interact with those systems in a way that can signal whether a purported identity of a user is genuine. For example, use of a payment card and a PIN (Personal Identification Number) can provide relatively secure means by which a user can verify their identity to, for example, a merchant - and indeed provide payment for goods and services as is well- known.
- PIN Personal Identification Number
- the PIN is assumed to be known only to the genuine user, and securely stored by a trusted authority (such as a banking card issuer).
- a trusted authority such as a banking card issuer
- the trusted authority also stores other personal identity information about a user, such as an address, a date of birth, name.
- a successful PIN validation and a successful transaction proves the identity of the user.
- PIN input is via a personal electronic user device such a smart-phone, and especially when PIN input is provided via a virtual keypad displayed on a touch-sensitive display screen.
- Such user devices are not designed specifically and exclusively for the purpose of PIN entry, and are often able to download and execute a variety of different programs and applications ("apps"). Accordingly, a security flaw may be introduced to such a device via an app which allows a malicious third party to intercept PIN entry. For example, malicious code may be installed on the device without a user's knowledge.
- a trusted program or app may in itself be encrypted and secured against direct observation or interference via such malicious code, there are other mechanisms by which a PIN may be determined indirectly.
- Devices such as smartphones incorporate a set of sensors that make these devices particularly prone to such an indirect attack.
- one malicious PIN interception method involves installing a data-logging routine that captures relatively unrefined data from the sensors resident on such a mobile device.
- Unrefined data captured from sensors such as an accelerometer or touch- sensitive component of a display screen can be used to subsequently reveal a likely sequence of coordinates pressed by a user on the display screen.
- a virtual keypad has a familiar layout, for example, with "1 " positioned at the top-left region of a screen, and "9" positioned bottom-right, a PIN can be readily inferred from the raw sensor data.
- Another vulnerability relates to man-in-the-middle (MITM) attacks.
- MITM man-in-the-middle
- a user authentication method for verifying the identity of a user comprising at least one of the steps of:
- the authentication request is sent to, and/or the authentication response is received from a trusted authority.
- other user information may be contained within the authentication request.
- other user information may include personal identity data that can be matched, together with the code, with data held by trusted authority. Accordingly, the identity of a user can be verified.
- the code-input session comprises at least one of the steps of:
- the step of displaying the virtual code-input mechanism, positioning input interface elements of the code-input mechanism, and/or permitting user interaction with a sequence of the input interface elements are carried out on or via a touch-sensitive display screen of an electronic user input device.
- the input device is a mobile device, such as a mobile telecommunications device.
- positioning input interface element on a screen at an absolute position that changes for each code-input session minimises the chance that the code can be inferred indirectly from the input device.
- the input interface elements display a unique character of the code to be inputted.
- the code to be inputted is a PIN (Personal Identification Number). Accordingly, there may be ten input interface elements, each representing one numerical character from 0 to 9, of a PIN code to be inputted.
- the code-input session further comprises displaying, ideally on the screen of the device, movement in the absolute position of each input interface element prior to the step of permitting user interaction with those input interface elements to specify the user input code.
- this provides a user with an intuitive way to understand where each input interface element is finally located prior to code entry. Displaying movement firstly signals to the user that the input interface elements positions are being randomised (as so to be mindful of code entry), and secondly provides feedback about how the input interface element positions have changed.
- movement of each input interface element comprises translational movement, ideally along a path.
- the translational movement is along a common path, common to all user interface elements.
- the path is an endless path, such as a circular path.
- movement in the absolute position of each input interface element occurs for a movement period, the length of the period being randomised over multiple code-input sessions.
- the speed of movement of the input interface elements is randomised over multiple code-input sessions.
- the relative position between input interface elements is maintained so that the same predetermined input interface elements are positioned adjacent to one another over multiple code-input sessions.
- the code-input session comprises displaying, at each user input element, a respective numerical character of a code to be inputted, the relative position between input interface elements being maintained so that input interface elements that represent numerically adjacent characters are positioned adjacent to one another over multiple code-input sessions.
- a user input element representative of the numeral "1 " is adjacent to that representative of the numeral "2”, and that in turn is adjacent to the input interface element representative of the numeral "3", and so forth.
- the code-input session comprises displaying, at each user input element, a respective character of a code to be inputted, the displayed characters conforming to a predetermined orientation.
- the predetermined orientation is ideally with reference to the orientation of the screen of the user input device.
- the predetermined orientation of the displayed characters is maintained over multiple code-input sessions, and irrespective of the absolute position and/or movement of the displayed characters.
- the electronic user input device comprises an orientation detector for detecting the orientation of the device.
- the orientation to which the displayed characters conform may be predetermined with reference to an orientation signal from the orientation detector.
- the code-input mechanism comprises a target region
- user interaction with each input interface element to specify a respective character of the secret authentication code comprises registering a drag interaction that follows a path starting at that input interface element, and ending at the target region.
- the drag interaction is a drag-touch interaction as registered by the screen of the user input device.
- the input interface element moves along the path during the drag-touch interaction, the position over time of the input interface element coinciding with the position of touch.
- the target region comprises a perimeter within which the path of the drag- touch interaction must end to specify a respective character of the secret authentication code.
- a drag interaction - especially a drag-touch interaction - is superior to traditional "tap" or "click” interactions to specify a user code via input interface elements.
- a drag interaction due to the variable nature of the path traced by a user, such a drag interaction is far less susceptible to malicious attack via sensor inference.
- a drag interaction is less likely to cause inadvertent code entry.
- a user is less likely to accidentally perform a drag interaction with a touch-sensitive display screen as compared with a simple "tap” interaction.
- the user interaction test checks for human interaction via the touch-sensitive display screen of the electronic user input device.
- the user interaction test is ideally configured to discriminate between human and automated interaction.
- failure of the user interaction test is a determination of automated interaction
- a pass of the user interaction test is a determination of human interaction.
- the user interaction test comprises at least one of:
- o displaying the plurality of images on the screen of the electronic user input device; o issuing a prompt, via the electronic user input device, to select one of the displayed images, the prompt notifying the user of the registered category;
- the user interaction test may comprises at least one of:
- Failure of the user authentication test may prevent carrying out of at least one subsequent method step. Repeated failure (for example, after a predetermined number of failures) of the user authentication test may prevent carrying out of any of the method steps. In other words, "lock-out" after X attempts. This can prevent brute-force attack.
- the user interaction test is carried out prior to initialising the code-input session.
- the test may be carried out at any time prior to sending an authentication response.
- the authentication response is sent only if the user interaction test has been performed, and ideally passed.
- a negative authentication response may be sent if the user interaction test has been performed and failed.
- a second aspect of the invention may reside in a computer-implemented user authentication system, the system comprising at least one of:
- the system comprises an electronic user input device in the form of a mobile device having a touch-sensitive display screen.
- the mobile device further comprises a communication module such as a wireless communication module.
- the mobile device is ideally operable to download an application via the wireless communication module, and execute the application, the executed application controlling the mobile device to:
- a code-input session for receiving a user input of a secret authentication code, such as a PIN;
- code-input session initialised by the mobile device may include the features and advantages as discussed above, in relation to the first aspect of the present invention.
- the code-input session may comprise at least one of:
- a virtual code-input mechanism having input interface elements each representing a character of a code to be inputted
- each input interface element on the display screen of the mobile device at an absolute position that changes for each code-input session, but maintains a predetermined position relative to the other displayed input interface elements
- the system may comprise a plurality of user input devices.
- the identity verification server of the system may be configured to participate in a user interaction test with the or each of those electronic user input devices.
- the identity verification server of the system is configured to validate (e.g. in conjunction with a trusted authority) secret authentication codes received from the or each electronic user input device determined to have been user operated to pass the user interaction test.
- the identity verification server is configured to participate in a user interaction test with the or each of those electronic user input devices by:
- the or each electronic user input device is configured to:
- the cryptographic function comprises encrypting the user-inputted secret authentication code using the symmetric encryption key.
- encryption key exchange between an electronic user input device and an identity verification server of the system occurs simultaneously, at least in part, with a user interaction test.
- the features of the method described in relation to the first aspect of the present invention may be provided as part of the system (or parts thereof) described in relation to the second aspect of the present invention. Furthermore, such features may themselves constitute further aspects of the present invention. By way of example, a further aspect may reside in a user interaction test for discriminating between human and automated interaction.
- a further aspect of the present invention may reside in methods and/or system for receiving from a user, a secret authentication code.
- Such further aspects may comprise displaying a virtual code-input mechanism having input interface elements each representing a character of a code to be inputted, positioning each input interface element on the screen at an absolute position that changes for each code-input session but maintains a predetermined position relative to the other displayed input interface elements, and permitting user interaction with a sequence of the input interface elements to specify a corresponding sequence of characters, thereby receiving from the user input of their secret authentication code.
- Figure 1 is schematic overview of a system according to a first embodiment of the present invention
- Figure 2 is a schematic block diagram of a mobile device of the system of Figure 1 ;
- Figures 3 to 11 , 14 and 15 show pages of a graphical user interface (Ul) as displayed on a screen of the mobile device of Figure 2, the Ul being generated by an application executed by the mobile device;
- Ul graphical user interface
- Figures 12 and 13 each show in isolation a PIN input mechanism of the Ul of Figure 11 ;
- Figure 16 is a flow diagram of information exchange between a mobile device and an identity verification server of the system of Figure 1.
- FIG 1 is a schematic overview of a system 1 of an embodiment of the present invention.
- the system 1 comprises an identity verification server 2, an application hosting platform 2a, a trusted authority 3, a querying party 4, and a mobile user input device 10 each communicatively interlinked to one another via a communications network 5.
- the mobile device 10 is in the form of a smartphone having a touch-sensitive display screen 11 on which can be displayed interface elements, and via which a user can interact with those interface elements.
- the system 1 will have a plurality components of the same type. For example, there could be many mobile devices, possibly numbering in the thousands or millions, or more. However, for clarity, a single system component type (e g. mobile device 10) is depicted in Figure 1 , and representative of each of the potentially multiple components of that type.
- FIG. 2 is a schematic block diagram of the mobile device 10 of Figure 1.
- the mobile device 10 further comprises a wireless communication module 12 for interfacing with the network 5, a processing module 13, and a memory module 14.
- the mobile device 10 also comprises a sensor set 17, a camera 18 and an NFC (Near-Field Communication) module 19.
- the mobile device also comprises a Trusted Execution Environment (TEE) module 13a within the processing module 13 which guarantees the security, integrity and confidentiality of the data handled by the processing module 13.
- TEE Trusted Execution Environment
- the memory module 14 comprises a transient memory 15 such as a cache, for transiently storing data, and a persistent memory 16 within which an operating system, file system and applications of the mobile device 10 are stored and executed via the processing module 13 at run-time.
- a transient memory 15 such as a cache
- a persistent memory 16 within which an operating system, file system and applications of the mobile device 10 are stored and executed via the processing module 13 at run-time.
- the mobile device 10 further comprises other components that are typically common in smart-phone and tablet devices, but are not necessarily shown in the drawings.
- these other components include: a compass, an orientation detector, an accelerometer, a battery, a timer, audio transducers, tactile transducers (e.g. vibration transducer), a clock, and a GPS positioning device.
- the components of the mobile device 10 are functionally and communicatively linked to one another as schematically indicated by the dotted lines in Figure 2.
- the mobile device 10 may also comprise additional communication modules (e.g. BLE/Bluetooth, cellular etc), to allow communication with other components or sub-components of the system 1.
- the identity verification server 2 is configured to make an application (or "app") available for download on to the mobile device.
- the app provides the functionality of the enhanced method of user authentication, as will be described in greater detail below.
- the provision of the app is ideally via the network 5 from a third-party application hosting platform 2a, for example, an Android or iOS "app store" as is well-known in the art.
- the identity verification server 2 may provide a hyperlink or similar to guide the mobile device to the location of the appropriate application hosted by the app hosting platform 2a.
- the querying party 4 may provide a copy or version of the app.
- the app of the present embodiment may be embedded within, or called specifically from another 3 rd party application, or via a hyperlink, optionally provided by the querying party 4.
- 3 rd party mobile applications can make use of the functionality provided by the app, as will be described, to verify the identity of a user.
- the app 9 when run or managed by the mobile device 10, in conjunction with the hosting platform 2a, is configured to automatically detect when the application requires updating, and either auto-update, or prompt a user to affirm that an update should take place.
- the identity verification server 2 also is arranged to enter into communication with user mobile devices 10 to prompt updating of the app, set up a user account, exchange information relating to an identity verification transaction, and also act as an intermediary between the user mobile devices and the trusted authority 3. It should be noted that in various embodiment the identity verification server 2 may perform at least part of the function of the trusted authority 3 (and vice-versa) but, in the present embodiment these two identities are represented individually in the interests of clarity.
- the identity verification sever 2 may act as a gateway to multiple trusted authorities, each with different data sets ad functions relating to the authentication of user.
- the trusted authority 3 exemplified in Figure 1 is embodied by systems of a banking authority 3 which has conducted a rigorous check of the identity of a user and has securely issued to that user a payment card 8 and a PIN (Personal Identity Number) known only to that user and the banking authority 3.
- a credit or banking account may be opened in the name of the user by the banking authority 3, and standard use by the user of the payment card 8 in conjunction with the PIN can provide a way for that user to authorise payment from that account for goods or services.
- the payment card 8 is of a "Chip-and-PIN" type meaning that a secure processing element 80 - the "chip” 80 - is supported on the card 8.
- Payment terminals interfacing with the chip 80 of the card 8 allow a user to provide an offline PIN which is validated by the chip 80, or an online PIN which is validated by the banking card issuer and used to generate a validation code upon provision of a correct PIN, that validation code being used to confirm overall
- the payment card 8 may not necessarily be provided with a secure processing element 80, but may be provided with another machine-readable component (e.g. a magnetic strip) which can allow an online PIN-based payment transaction to occur.
- a secure processing element 80 may be provided with another machine-readable component (e.g. a magnetic strip) which can allow an online PIN-based payment transaction to occur.
- another machine-readable component e.g. a magnetic strip
- the banking authority can verify the identity of the user. As will be described in further detail below, this can be achieved by using user information that has been generated, collected or otherwise in the possession of the banking authority, at least one component of which is secret information such as a PIN associated with the payment card. This is used in conjunction with other user information that relates to the identity of the user. For example, such user information may be information that is unhidden - such as that borne on the payment card. Such unhidden is generally physically borne on the front of the payment card.
- User information may include a payment card number 81 , payment card validity dates 82, and a name of the user 83.
- Other user-specific information e.g. stored on the chip 80 or held by the trusted authority 3 may include, but is not limited to, a postal address, email address and telephone number.
- the querying party 4 includes the systems of a third party that wishes to query the identity of the user from the trusted authority 3. For example, this may be necessary as part of a customer or consumer registration process, or KYC (Know Your Customer) procedures necessary to prevent fraudulent transactions between the querying party and unknown users.
- the querying party 4 may be associated with a provider of legal or financial services - for example a solicitor or insurance provider - and before entering into a contract for service with a customer or client, the identity of the that client must be verified.
- the querying party 4 can request a user of the mobile device 10 to download and interact with the app through which the identity of that user can be independently verified via the identity verification server 2 and trusted authority 3.
- FIG. 1 An overview of an exemplary user identity verification process is shown in Figure 1.
- the steps of this identify verification process generally involve communication between members of the system 1 , and are represented by double-headed dashed-line arrows 1a to 1 g.
- Step 1a involves conferring the mobile device 10 with access to the app 9. In the present example, this is prompted by the querying party 4.
- the querying party 10 wishes to have the identity of the user of the mobile independently verified, and so sends a hyperlink to the mobile device.
- the hyperlink may point to an electronic resource located via a third-party hosting platform.
- the app is located at the system of the querying party 4, the app being modified to be proprietary to the querying party 4 - for example, bearing the branding of the querying party 4, and providing additional functionality appropriate for the performance of the service to be provided by the querying party to the user of the mobile device 10.
- User selection of the hyperlink causes the mobile device 10 to access the relevant resource hosted by the querying party 4, and download the app 9 for subsequent execution.
- Step 1 b involves the mobile device 10 acquiring and executing the app 9.
- the app 9 is at least partially executed within the TEE module 13a.
- the app is configured to receive user input to collect user information so as to set up an account with the identity verification server 2.
- Step 1c the mobile device 10 establishes secure communication with the identity verification server 2.
- the mobile device 10 is configured by the app 9 to acquire further user information, including a secret authentication code such as a PIN, to be used in the verification of the identity of the user.
- the mobile device 10 is configured by the app to transfer to the identity verification server 2 an encrypted package including the user information that has been provided by the user (including the PIN). It should be noted that some parts of Step 1 b and 1c may occur concurrently, or in a different order as stated.
- Step 1d the encrypted package is processed by the identity verification server 2 - for example decrypting it, and then re-encrypting it as part of the separate and secure communication between the identity verification server 2 and the trusted authority 3.
- a second encrypted package is sent from the identity verification server 2 to the trusted authority 3, the second encrypted package containing the secret authentication code, together with additional user information.
- Various other transactional parameters may also pass between the trusted authority 3 and the identity verification server 2.
- Step 1e the trusted authority 3 receives and decrypts the second encrypted package, and determines whether the secret authentication code is correct (when cross-referenced with the additional user information), and in response sends a positive or negative confirmation message back to the identity verification server 2 that confirms respectively whether or not the secret authentication code paired together with the additional user information matches that which is held by the trusted authority 3.
- Step 1f receipt of a positive verification message from the trusted authority 3 by the identity verification server 2 is deemed to be representative of the verified identity of the user.
- This verification can be transmitted by the identity verification server 2 back to the mobile device 10, for example for the purpose of unlocking otherwise restricted functionality resident in the app 9.
- the verified identity of the user is transmitted to the querying party 4 thereby providing independent verification of the identity of the user of the mobile device 10 to the querying party 4.
- a token may be provided by the identity verification server 2 to the mobile device 10 to pass on to the querying party 4.
- the mobile device 10 may provide to the identity verification server 2 an electronic address of the querying party 4 (e.g. an IP address, URL, email, etc). This allows the identity verification server 2 to communicate directly with the querying party 4 following the outcome of a determination of the identity of the user of the mobile device 10.
- secure communication between the identity verification server 2 and the trusted authority 3 is preferably via a separate secure communication channel within the network, with at least one layer (e.g. physical layer, data-link layer etc.) being unconnected with the part of the network used for communication between other components of the system 1 .
- layer e.g. physical layer, data-link layer etc.
- Steps 1 b and 1 c are shown with reference to Figures 3 to 15 which are screenshots of pages of (or parts of) a graphical user interface (Ul) as generated by the app 9 for display on the screen 11 of the mobile device 10 running the app 9.
- Figures 3 to 15 are screenshots of pages of (or parts of) a graphical user interface (Ul) as generated by the app 9 for display on the screen 11 of the mobile device 10 running the app 9.
- the screen 11 is a touch-sensitive electronic screen 11 , it is able to receive a user touch input, such as a drag interaction for example, to manipulate and select certain Ul elements.
- a simple touch input such as a tap interaction involves a user tapping a region of a screen, typically to select an underlying displayed user interface element such as a button.
- a drag interaction involves a user maintaining contact with the screen 11 whilst tracing path on it. "Drag and drop” involves releasing that contact at the end of the path.
- Figure 3 shows an initial page of the Ul presenting three user-selectable options or "buttons". These are represented by three regions occupied by the text: "New user?", “Sign-in” and “Clear data”, and each can be selected via a tap interaction.
- Selecting the latter option clears from the persistent and transient memory 15, 16 any previously entered user data. Selecting the "Sign-in” option relies on a user having previously entered their user data, and set up an account with the identity verification server 2, for example via previously selecting the "New user?" option. Selecting the "New user?" option leads to a set of pages represented by Figures 4 to 6 of the Ul within which a user is guided to enter their details into the appropriate fields of the Ul. As is well-known in the art, these fields can be populated by selecting the region occupied by those fields, and then entering characters using a virtual keyboard (not shown).
- the details collected relate to user information such as: first name, last name, date of birth, nationality, phone number, postal address, email address, password, security question, security answer and account currency. Any one or a combination of these features may be used for the purposes of identity verification. However, these details are primarily for the purpose of setting up an account with the identity verification server 2.
- the account holds the user information for the convenience of the user so that in subsequent use of the app, it is not necessary to re-enter most of the user information again. Assuming a user has already provided their details and set up an account, selecting the "Sign in” option from the initial page simply further requires the provision by the user of the user's email (as a username) and password to log into an account already established at the identity verification server 2.
- More sensitive information may also be collected, in particular relating to the unhidden data borne and visually presented by the payment card 8, such as the payment card number 81 , payment card validity dates 82 and name 83.
- the camera 18 may be enabled by the app 9 to capture a temporary image of the payment card 8 and subject that image to optical character recognition to extract the visually recognisable data on the payment card 8.
- Character position analysis can be used to determine which fields that data represents. For example, a centrally-located row of fourteen to sixteen numerals is indicative of a the payment card number 81.
- a user may be prompted to enter other data - for example, that on the reverse of the payment card 8, such as a card verification code (CVC). Additional data may also be collected from the payment card 8 via the NFC (near field communication) module 19 of the mobile device 10 - assuming the payment card supports NFC communication.
- CVC card verification code
- a PIN is presumed to be sensitive information that demands a particularly robust and secure exchange between the mobile device 10 and the identity verification server 2. This is because an encrypted representation of the PIN associated with the payment card 8 is passed from the mobile device 10 to the identity verification server 2, and this provides a highly reliable means by which the identity of the user of the mobile device 10 can be independently verified. Accordingly, a exceptionally secure exchange is needed to protect the secrecy of the PIN.
- Figures 8 to 15 depict that which is presented by the Ul of the app 9 to a user of the mobile device 10 during such a secure exchange.
- a first stage of the secure exchange between the mobile device 10 and the identity verification server 2 relates to securing the mobile device 10 (see Figure 8). This may include disabling any non-essential and concurrently-running processes on the mobile device 10 - for example, other applications which may otherwise gain access to the data handled by the app of the present embodiment, and even sensors which may be maliciously exploited to infer sensitive data. Alternatively, securing the mobile device 10 may simply be achieved by running the app (or part thereof) within the TEE which isolates sensitive data from other components of the mobile device 10. (It should also be noted that the collection of sensitive data, such as that relating to Figure 8a, may be collected after securing the mobile device 10).
- a second stage comprises a combined image and key exchange process between the mobile device 10 and the identity verification server 2. This not only ensures the security of the data passing between the mobile device 10 and identity verification server 2, but also improves the security of the system 1 as a whole, making it more difficult for a malicious third party to flood the system 1 with multiple automated PIN guesses.
- a user interaction test is employed for discriminating between human and automated operation (e.g. uses of the app and/or requests directed at the identity verification server). Automated operation can be indicative of a malicious attack, and so the user interaction test can be used to indicate and secure against this.
- a first set of nine images are obtained from the identity verification server 2 and presented via the Ul of the app 9 to the user for selection.
- the app 9 is arranged to receive via the screen 1 1 a user touch input to select one of the nine images. Information relating to the selected image is sent back to the identity verification server 2.
- a second set of nine images are obtained from the identity verification server 2, and presented via the III of the app 9 to the user for selection. The user is guided upon presentation of the second set of images to select an image that shows the same object as that in the previous selection.
- the app 9 is arranged to receive a further user touch input to select one of the second set of nine images, and information relating to the selected image from the second set is sent to the identity verification server 2.
- selection of the same image type twice also ensures that the control of user input to the app 9 has not been hijacked by a malicious actor between each image selection process.
- Each image of every set that is transmitted from the identity verification server 2, and displayed via the Ul of the app belongs to a specific category.
- these categories relate to an object that a user viewing the image can see (e.g. from Figure 9 in order: a car, boat, cat, fish, ball, face, dog, flower and aeroplane).
- images within the same set belong to a different categories.
- an image in one set generally belongs to the same category as a corresponding image in a different set.
- the second set shown in Figure 10 also show images each belonging to one of the categories: car, boat, cat, fish, ball, face, dog, flower and aeroplane.
- image categories aren't necessarily restricted to objects, and, in other embodiments, may extend to subjects (e.g. sport, science, weather etc.), actions (e.g. jumping, diving, etc.), or more generally to concepts (e.g. high, hot, sleepy, etc.).
- images may notionally belong to multiple categories. This can represent a challenge to the preferred requirement that there is an unambiguous 1 : 1 mapping between the images of the first set and the images of the second set.
- an image-choosing process to ensure that there is an unambiguous relationship between an image chosen from the first set, and a corresponding image from the second set.
- the process ensures that only one of the images from the second set can belong to a matching category.
- an image database is maintained, the image database referencing each image with multiple tags, each tag representing a category.
- the image categories that are chosen are those which are relatively straightforward for a human to recognise and distinguish between, but are relatively difficult for an automated system to recognise. Accordingly, this part of the process ensures that it is difficult for a malicious third party to automate an attack on the system 1 - e.g.
- the identity verification server 2 may limit the period allowed for a user to select a first and/or second image from the two sets presented. These measures improve the security of the system 1 as a whole.
- the app 9 is arranged to initialise a code-input session for receiving a user input of the PIN associated with the payment card 8.
- different user interaction tests may be used.
- user interaction tests that use categorised images, in that they are known to be particularly resistant to automated attacks.
- embodiments may involve assigning to each of a plurality of images a predetermined category, and then registering one of those categories as that which needs to be selected by a user in order to pass the user interaction test.
- a different number of images may be used.
- the registration of the category to be selected is triggered by the selection of one of the first set of images - i.e. the category associated with that selected image is the registered category which must be selected again by the user via the second set of images in order to pass the user interaction test.
- the selection of an image of a dog from the first set of images registers the category as "dog".
- the user is prompted to select an image of a dog from the second category.
- an alternative user interaction test may simply be to prompt a user to select the (or every) image displayed that shows a dog.
- the user may be prompted to select every image that "shows the same animal". In such a case, selection of multiple images may be necessary to conduct the user interaction test.
- the test involves registering a category that needs to be selected by a user in order to pass the user interaction test, and then determining whether the user interaction test has been passed if the user-selected image is assigned to that registered category.
- a pass of the user interaction test leads to the app 9 initialising a code-input session.
- Figure 11 shows a PIN input page as displayed via the Ul of the app 9 during such a code-input session.
- the Ul displays on the screen 1 1 a virtual PIN input mechanism 30 having ten input interface elements 40-49, each bearing one of each numeral from 0 to 9, from which a PIN can be composed.
- the PIN input mechanism 30 further comprises a bucket element 31.
- the bucket element 31 , and each of the input interface elements 40-49 comprise a circular component.
- the circular component of the bucket element 31 has a larger perimeter than that of the interface elements 40-49.
- the bucket element 31 is centrally- located relative to the input interface elements 40-49 which are distributed around the bucket element 31 broadly following a circular path to match the outer perimeter of the circular component of the bucket element 31. Adjacent input interface elements are spaced equally from one another in a regular arrangement.
- the bucket element 31 is configured as a target region to which input interface elements 40-49 can be sequentially dragged to allow a user to specify a sequence of numbers corresponding to a PIN.
- absolute position of the interface elements 40-49 is altered by the app for each code-input session.
- absolute position here can be also defined as position relative to a boundary defined by the screen and/or to the position of the central "bucket".
- the starting position, prior to movement, of the interface elements 40-49 may be predetermined by the app.
- the final position however can be effectively randomised by varying the distance the interface elements are moved.
- the starting position is randomised also.
- the speed at which the interface elements move, and/or the time they take to reach their final position may also be randomised.
- PIN input mechanism in that the position of the of the interface elements 40-49 relative to one another is not changed, and so this improves a user's familiarity with the input layout without being detrimental to security. Thus a user is able to enter their PIN relatively quickly and without mistake.
- a further cognitive aid to a user operating the PIN input mechanism 30 is provided by positioning the input interface elements so that the values of the numerals that they bear are arranged in order (i.e. with 0 adjacent to 1 , 1 adjacent to 2, etc).
- input interface elements that represent numerically adjacent characters are positioned adjacent to one another over multiple code-input sessions.
- the device comprises an orientation detector
- input from this can be used to maintain a convenient orientation of the numerals (and the Ul in general).
- the orientation detector may be disabled prior to PIN input.
- the app is configured to permit user interaction with the PIN input mechanism 30 so as to specify a sequence of numbers corresponding to the PIN of a user's payment card.
- a prompt in the form of a written instruction 50 is provided to the user on the PIN input page of Figure 11 to " Drag and drop your PIN digits to the bucket' at the same time as displaying the PIN input mechanism 30.
- a user makes contact with the screen at the location of a corresponding input interface element 40-49, traces a path to "drag” the input interface element within the perimeter of the circular component of the bucket element 31 , and then releases contact with the screen to "drop” it into the bucket element 31.
- the app is configured to register a drag touch interaction with each input interface element 40-49. If the drag touch interaction follows a path beginning at an input interface element 40-49, and ending at the bucket element 31 , then the app is configured to append the numeral associated with that input interface element 40-49 to the PIN sequence.
- This "drag-and-drop" method of PIN digit selection is particularly advantageous compared, for example, to simple keypad touch selection. It prevents accidental digit selection, and also provides increased resilience against malicious PIN inference, for example via detection of response from sensors such as the accelerometer in the event that they cannot be disabled.
- the user is provided feedback about the generation and length of the PIN sequence via a PIN entry indicator 51 which indicates when digits are entered using the PIN entry mechanism 30.
- the PIN entry indicator 51 is configured to alter the appearance of indicia in response to each PIN digit entry so that the user is provided feedback about how many digits have been entered (or remain to be entered).
- a spot is displayed over each one of a row of four indicators zones, with the number of spots displayed corresponding to the number of PIN digits entered.
- the PIN entry indicator may be adapted to accommodate for PINs or code of different lengths. For example, a different number of spots and indicator zones may be displayed and updated.
- step 1 c submission of an entered PIN sequence initiates step 1 c as mentioned above, during which the app causes the mobile device 10 to establish a secure communication with identity verification server 2, and transfers to it the encrypted package that includes the entered PIN sequence together with other user information.
- a further processing transaction page of the Ul is displayed to the user as shown in Figure 14.
- This provides processing status feedback to the user via a rotating circular arrangement of arrowheads.
- This signals to a user to wait for the further transaction verification steps (e.g. steps 1 d, 1 e and 1f) to complete, and the non-static nature of this provides reassurance that the mobile device 10 is still operating as intended as hasn't suffered a processing error, or crashed.
- a further success verification page of the Ul is displayed to the user as shown in Figure 15. Additional functionality may thereafter be provided - for example, granting a user access to a service that was previously disabled.
- FIG 16 a flow diagram of one example of a detailed information exchange via the network 5 between the mobile device 10 and the identity verification server 2 is shown. This relates primarily to Steps 1 c to 1 e as discussed above.
- a first stage of this information exchange relates to account set up.
- the app 9 is configured to receive user input to gather user information as discussed above, and then the app 9 is configured to transmit a selection of that user information to the identity verification server 2 to create a user account on the identity verification server 2.
- the request sent to the identity verification server 2 can simply be in the form of typical login credentials (i.e. username and password).
- the identity verification server 2 In response to receiving a request to create or log into an account, the identity verification server 2 checks its database to verify that the request is valid - for example checking the credentials provided from the mobile device 5. If the request is valid, the identity verification server 2 sends a response to the mobile device 10 that includes a GUID (Global Unique Identifier).
- GUID Global Unique Identifier
- the GUID is used to identify communication that occurs specifically between the identity verification server 2 and the mobile device 10, and distinguishing it from other communications and transactions that may occur between the identity verification server 2 and other mobile devices, especially as many of these may be occurring concurrently.
- the app 9 configures the mobile device 10 to react to the response containing the GUID from the identity verification server 2 by generating a further user-specific GUID (U.GUID) which may be a derivation of the GUID received from the identity verification server 2.
- U.GUID may be the output of an information processing function taking the GUID as an input. This may be as simple as appending additional characters to the GUID.
- the U.GUID may be generated from the GUID via a cryptographic process.
- the U.GUID is formulated in a way that allows verification that the U.GUID has been derived or generated from the GUID, thereby evidencing it originated from the mobile device 10. This promotes the reliability of the communication link between the identity verification server 2 and the mobile device 10, especially if a cryptographic process is used for the derivation.
- the app 9 configures the mobile device 10 to transmit the U.GUID back to the identity verification server 2.
- the identity verification server 2 checks that the U.GUID is authorised, and if so, generates a transaction GUID (T.GUID). Again, this may be generated as a derivation of the received U.GUID, and again, this may be achieved by applying a cryptographic function using the U.GUID as an input, and yielding the T.GUID as an output.
- T.GUID transaction GUID
- nine image GUIDs (I. GUID 1..9) are generated by the identity verification server 2, with each I. GUID uniquely identifying an image of a first set of nine images.
- the first set of nine I. GUIDs form a first I. GUID List which is sent together with the T.GUID back to the mobile device 10.
- the I. GUIDs uniquely identify, but do not necessarily form part of an image data file.
- the image data files - for example, in JPEG, PNG or another suitable image format - are accessible to both the identity verification server 2 and the mobile device 10. Both entities are able to match an I. GUID with a specific image, but the image files themselves are not necessarily transmitted together with the I. GUIDs from the identity verification server 2 to the mobile device. This can promote the security of
- the image data files themselves can be acquired by the mobile device 10 and the identity verification server 2 via a separate process - for example, via accessing an encrypted image database. This may be hosted by the identity verification server 2.
- a bank of images may be pre-loaded on to the persistent memory 16 of the mobile device 10 by the app 9, the appropriate images fetched by using the I. GUIDs as a reference.
- the app 9 configures the mobile device 10 to receive the T.GUID and I. GUID list - and also the associated image files is they are not already resident in the memory of the mobile device 10.
- the T.GUID is checked to ensure that it validly originated from the identity verification server 2, and if so, the first set of nine images associated with the I. GUID list are presented - such as that described above with reference to Figure 9.
- the app 9 is configured to enable user selection of one of those images, and from this a Selected Image GUID (SI. GUID) is generated. As before, this may be a derivation of the I. GUID associated with the selected image, and that derivation may be via an encryption function.
- SI. GUID Selected Image GUID
- the app 9 configures the mobile device to then transmit the SI. GUID back to the identity verification server 2 together with the T.GUID.
- the identity verification server 2 In response to receipt of a valid SI. GUID and T.GUID combination, the identity verification server 2, generates a second set of image GUIDs (I. GUID 10..18). As before, each I.GUID uniquely identifies an image of a second set of nine images. The second set of nine I.GUIDs form a second I.GUID List which is send together with the T.GUID back to the mobile device 10.
- the app 9 configures the mobile device 10 to receive the T.GUID and the second
- the second set of nine images associated with the second I.GUID list are presented - such as that described above with reference to Figure 10.
- the app 9 is configured to enable user selection of one of those images, and from this a second Selected Image GUID (SI_2.GUID) is generated.
- SI_2.GUID Selected Image GUID
- this may be a derivation of the I.GUID associated with the selected image, and that derivation may be via an encryption function.
- the mobile device 10 is configured by the app 9 to prepare a Public- Private key pair (Kpr, Kpu), and further configures the mobile device 10 to transmit the public key (Kpu), the T.GUID and the SI_2.GUID of the second selected image to the identity verification server 2. Notably, as the public key (Kpu) is transmitted
- each I.GUID refers to an image depicting an object or concept.
- the identity verification server 2 keeps track of the categories associated with each I.GUID, as sent to the mobile device 10. Firstly, this is so that the second I.GUID list and associated second set of images can include one image that belongs to a category common to at least the first image selected by the user.
- the identity verification server 2 is able to carry out a check to determine whether both selected GUIDs relate to images belonging to the same category. As mentioned above, these measures improve the security of the system 1 as a whole, and are especially useful against resisting an automated brute-force attack on the identity verification server
- the identity verification server 2 Upon receipt of the T.GUID, the SI_2.GUID and the Kpu, the identity verification server 2 is configured to perform checks to determine that the T.GUID is valid, and the SI_2.GUID is associated with the same category as the SI.GUID received earlier as part of the same transaction (as identified by the T.GUID).
- the identity verification server 2 Assuming such checks are satisfactory, the identity verification server 2 generates an Rijndael key (RK) which is a symmetrical encryption key. In alternative embodiments, other types of symmetrical keys may be generated by the identity verification server 2.
- RK Rijndael key
- the symmetrical key may be an AES key, for example.
- Rijndael key (RK) itself is encrypted by the identity verification server 2 using the public key (Kpu) received by the identity verification server 2 from the mobile device 10. This forms part of an encrypted package (ERK) that is then sent back to the mobile device 10 together with the T.GUID.
- the mobile device 10 is then configured by the app 9 to: receive the encrypted package (ERK), encrypted by the Kpu, the package containing an encryption key (RK) that has been provided by the identity verification server 2; decrypt the encrypted packaged (ERK) using the private key (Kpr) to obtain the encryption key (RK) that has been provided by the identity verification server 2;
- TD transaction data package
- unhidden payment card data e.g. that which is physically borne on the front of the payment card, such as validity dates and name.
- these may be scanned into the app via a card-scanning process, or manually entered by user via character input into relevant fields; and
- the identity verification server 2 is able to decrypt the ETD with the same Rijndael key (RK) to decrypt and extract the transaction data package (TD), including the PIN entered by the user during the code-input session.
- RK Rijndael key
- the transaction data package (TD), or part thereof, can be encrypted again as part of a second encrypted package that is transmitted to the trusted authority 3 as part of Steps 1 d and 1 e already described above with reference to Figure 1.
- a positive or negative confirmation message then prompts the identity verification server 2 to send a transaction result back to the mobile device 2.
- the transaction result thus reflects trusted authority verification of authentication on the basis of the received TD - i.e. via verification that the PIN is correct.
- the pairing of a correctly-submitted PIN together with other identity data e.g. user information such as unhidden payment card data
- the embodiment described discusses the input and handling of secret information associated with a payment card, such as a PIN.
- a payment card such as a PIN
- other secret authentication codes may be handled in a similar manner.
- the PIN input mechanism 30 may be a different code input mechanism.
- Input interface elements representative of a different set of characters may be used (e.g. alphanumerical characters).
- components of the system may be substituted with other functionally- similar components.
- the invention is particularly applicable for use with a mobile device, other electronic user input devices may be used instead (e.g. tablets or other such computing devices).
- the means by which the application is acquired by the computing device is a wireless telecommunication module.
- Other ways of downloading the application are possible (e.g. via a wired connection, or via "side-loading").
- communication via the network 5 with other components of the system may be achieved via a communication module other than the wireless
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1817093.6A GB201817093D0 (en) | 2018-10-19 | 2018-10-19 | Authentication system and method |
PCT/GB2019/052985 WO2020079451A1 (en) | 2018-10-19 | 2019-10-18 | Authentication system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3867782A1 true EP3867782A1 (en) | 2021-08-25 |
Family
ID=64453835
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19794229.5A Withdrawn EP3867782A1 (en) | 2018-10-19 | 2019-10-18 | Authentication system and method |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3867782A1 (en) |
GB (1) | GB201817093D0 (en) |
WO (1) | WO2020079451A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11550702B1 (en) | 2021-11-04 | 2023-01-10 | T-Mobile Usa, Inc. | Ensuring that computer programs are accessible to users with disabilities, such as for use with mobile phones |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417420A (en) * | 2020-11-26 | 2021-02-26 | 维沃移动通信有限公司 | Information processing method and device and electronic equipment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8522327B2 (en) * | 2011-08-10 | 2013-08-27 | Yahoo! Inc. | Multi-step captcha with serial time-consuming decryption of puzzles |
US9613356B2 (en) * | 2013-09-30 | 2017-04-04 | Square, Inc. | Secure passcode entry user interface |
US9767263B1 (en) * | 2014-09-29 | 2017-09-19 | Amazon Technologies, Inc. | Turing test via failure |
-
2018
- 2018-10-19 GB GBGB1817093.6A patent/GB201817093D0/en not_active Ceased
-
2019
- 2019-10-18 WO PCT/GB2019/052985 patent/WO2020079451A1/en unknown
- 2019-10-18 EP EP19794229.5A patent/EP3867782A1/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11550702B1 (en) | 2021-11-04 | 2023-01-10 | T-Mobile Usa, Inc. | Ensuring that computer programs are accessible to users with disabilities, such as for use with mobile phones |
US11860767B2 (en) | 2021-11-04 | 2024-01-02 | T-Mobile Usa, Inc. | Testing computer program accessibility for users with disabilities, such as for use with mobile phones |
Also Published As
Publication number | Publication date |
---|---|
WO2020079451A1 (en) | 2020-04-23 |
GB201817093D0 (en) | 2018-12-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3487119B1 (en) | Two-channel authentication proxy system capable of detecting application tampering, and method therefor | |
AU2018333068B2 (en) | Systems and methods for managing digital identities associated with mobile devices | |
JP4540479B2 (en) | How to link devices | |
CA2876629C (en) | Methods and systems for using derived credentials to authenticate a device across multiple platforms | |
US9544143B2 (en) | System and method of notifying mobile devices to complete transactions | |
EP3190770B1 (en) | User authentication method with enhanced security | |
EP2893484B1 (en) | Method and system for verifying an access request | |
CN105959287A (en) | Biological feature based safety certification method and device | |
US20110213711A1 (en) | Method, system and apparatus for providing transaction verification | |
JP2018532301A (en) | User authentication method and apparatus | |
TR201810238T4 (en) | The appropriate authentication method and apparatus for the user using a mobile authentication application. | |
US20110202762A1 (en) | Method and apparatus for carrying out secure electronic communication | |
EP3662430B1 (en) | System and method for authenticating a transaction | |
EP3005265A1 (en) | User authentication system and method | |
US20140053251A1 (en) | User account recovery | |
US20170155629A1 (en) | Network-based user authentication device, method, and program that securely authenticate a user's identity by using a pre-registered authenticator in a remote portable terminal of the user | |
JP7554197B2 (en) | One-click login procedure | |
CN111783049A (en) | User information processing method and system based on block chain | |
CN111052164A (en) | Settlement system, settlement method, and program | |
EP3867782A1 (en) | Authentication system and method | |
US20180241745A1 (en) | Method and system for validating website login and online information processing | |
JP6349188B2 (en) | User authentication device | |
US20160125410A1 (en) | System and Method for Detecting and Preventing Social Engineering-Type Attacks Against Users | |
KR20160008012A (en) | User authentification method in mobile terminal | |
WO2017145273A1 (en) | User authentication device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20210511 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20231206 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20240409 |