GB2419016A - Cellular authentication token - Google Patents

Cellular authentication token Download PDF

Info

Publication number
GB2419016A
GB2419016A GB0422381A GB0422381A GB2419016A GB 2419016 A GB2419016 A GB 2419016A GB 0422381 A GB0422381 A GB 0422381A GB 0422381 A GB0422381 A GB 0422381A GB 2419016 A GB2419016 A GB 2419016A
Authority
GB
United Kingdom
Prior art keywords
accounts
otp
time
end user
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0422381A
Other versions
GB0422381D0 (en
Inventor
Arnon Speiser
Ronit Speiser
Dror Speiser
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0422381A priority Critical patent/GB2419016A/en
Publication of GB0422381D0 publication Critical patent/GB0422381D0/en
Publication of GB2419016A publication Critical patent/GB2419016A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/70Administration or customization aspects; Counter-checking correct charges
    • H04M15/745Customizing according to wishes of subscriber, e.g. friends or family
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/70Administration or customization aspects; Counter-checking correct charges
    • H04M15/765Linked or grouped accounts, e.g. of users or devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/70Administration or customization aspects; Counter-checking correct charges
    • H04M15/77Administration or customization aspects; Counter-checking correct charges involving multiple accounts per user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • H04M17/20Prepayment of wireline communication systems, wireless communication systems or telephone systems with provision for recharging the prepaid account or card, or for credit establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/01Details of billing arrangements
    • H04M2215/0108Customization according to wishes of subscriber, e.g. customer preferences, friends and family, selecting services or billing options, Personal Communication Systems [PCS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/72Account specifications
    • H04M2215/724Linked accounts
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/72Account specifications
    • H04M2215/724Linked accounts
    • H04M2215/7254Multiple accounts per user

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

Multiple One Time Password accounts and any other password accounts are managed on the same Cellular device. The management of the accounts means the definition, updating and showing of the account details and the production of the required OTP or other password when requested.

Description

Description
CcilularAuthenticatin Token (CAT) ()ne Mime Password (OTP) is an accepted security methodology that is used today to protect and secure server access. 'I'he ('Arl'is an inTlovativc way lo implement a O=l'l' on pro'rarnmahle ('ellulars and other mobile devices I'hc 0'1'P hardware security tokens of today arc made unique for each user's account. If the user has several secured accounts he has lo catty multiple Ijardware Tokens. which is veiny inconvenient.
The patent is the corrTbtnation <if a unique and sophisticated encryption algorithm and iDe use ,l'progTammahle cellular or mobile device for creating multiple One Time Password accounts and any other password accounts and manage them all on the same Cellular device.
The management of'the accounts means the definiti:,T1 updating and showing ofthe accounts details and the production of'the required O'l'l' or other password when requested.
rl'he CA I' provides the same level of security as existing, TFA 'tokens do' but with a much dower overhead and mark-et prices hrinfing the product to the category of commodity. E'veT- business should have a secured server and every business should be able to afford it.
he CA'L is made ot'twL-' standalone software code modules. ()ne that runs on a Cellular de\icc or any mobile device Nudity procraTTnirlg capabilities manages any number of'aeeounts and for each account it mates One 'f'ime Passwords. The other runs on a Server computer and verifies the One Time Password that arrives to the Server.
leer example:
lnternet Banking is a poplar service Or end users to access their Bank information and pert'o1 ontiTle transactions.
I'o access the persona] account, the end user is required to 1 ogin to the service.
T'o Login the user is required to enter a tin string of'1O and another fixed strincr as l'ass\Nord.
l'hese strings are easily hacked 'T o avoid the stealing Blithe Password we use the OTP methodolov. 'he end user is enteritis an 0'1'P in the 1 ogin windowed rather then a fixed password string. We provide the end user with a t-iien (in our ease - a software token that r uns on progrrammahle (:'ellulars and Mobile devices) that TnT-oduces the (:)TP. Each time the eT]d tTSCT \N'ants to aeee.ss lI,s Bail aecouilt. lie will be provided \itli a dLTrfe!-eilt C)rl P The Q I I's cats claTI_e eN cry Dune of TliutoS tat cilaTl<e on dead.
Our e!ld user Slav also have an account at another secured lntenet Service, such as for c>;ar.lple. an, On I.ine site lI,i filling, Ti,atent ap,pPeaticTns Again the usei- is reciuired to enter an 01 P iTI oT-der to, access his accost details arid fLIlirl'T hi T1ew IT] N7eT][iOTI.
Tfthe Patents site is using a regular OTP method. the user has to have a different token for this accouTlt He has to carry dificrcnt tokens One for the Bank. and one for the Patents site.
The (.A I is software token that runs on the end user programmable (. ellular or Mobile device that he carries with him anN'\A'aV. Phe (:'AT manages the production of the ()TPs to all the end user s accounts. fle noNN Lions not need to COFT:t multiple tok-cns

Claims (4)

  1. Claims i. The prociuction of unique One Time Password sequence for
    multiple different accounts or1 a single pr-o,rammahle (cllular or Mobile device. An account contains the details for a secured service such as the I User ldcntifcation ( [D) and requires a C)ne T ime l'assword for each time the end user wants to l.os in to the service with his particular II). T he combination ofthe II) and OTP is used to authenticate tics end user.
  2. 2. The C)TP Generation fin the programmable C'ellular or Mobile crevice is stand-alone and does not recluire aunt sort of communication with the Servcr.
  3. A. Tile algorithms for generating the OTP could he of different types such as - time c,ricnted, where the OT? changes e-NCi,N' niiml-ici of second. Eli e\icni orienicc where the C)IP changes on request of a new 01I'.
  4. 4. I:ach account has a different sequence of OTPs.
GB0422381A 2004-10-08 2004-10-08 Cellular authentication token Withdrawn GB2419016A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0422381A GB2419016A (en) 2004-10-08 2004-10-08 Cellular authentication token

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0422381A GB2419016A (en) 2004-10-08 2004-10-08 Cellular authentication token

Publications (2)

Publication Number Publication Date
GB0422381D0 GB0422381D0 (en) 2004-11-10
GB2419016A true GB2419016A (en) 2006-04-12

Family

ID=33443598

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0422381A Withdrawn GB2419016A (en) 2004-10-08 2004-10-08 Cellular authentication token

Country Status (1)

Country Link
GB (1) GB2419016A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007145540A2 (en) * 2006-06-14 2007-12-21 Fronde Anywhere Limited Authentication methods and systems
GB2440358A (en) * 2006-06-30 2008-01-30 G3 Vision Ltd Authentication system and method using One Time Passwords (OTPs)
US9119076B1 (en) 2009-12-11 2015-08-25 Emc Corporation System and method for authentication using a mobile communication device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204725A1 (en) * 2002-04-26 2003-10-30 Masayuki Itoi Method and system for verifying identity

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204725A1 (en) * 2002-04-26 2003-10-30 Masayuki Itoi Method and system for verifying identity

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007145540A2 (en) * 2006-06-14 2007-12-21 Fronde Anywhere Limited Authentication methods and systems
WO2007145540A3 (en) * 2006-06-14 2008-03-06 Fronde Anywhere Ltd Authentication methods and systems
GB2440358A (en) * 2006-06-30 2008-01-30 G3 Vision Ltd Authentication system and method using One Time Passwords (OTPs)
GB2440358B (en) * 2006-06-30 2009-04-08 G3 Vision Ltd Authentication system and method
US9119076B1 (en) 2009-12-11 2015-08-25 Emc Corporation System and method for authentication using a mobile communication device

Also Published As

Publication number Publication date
GB0422381D0 (en) 2004-11-10

Similar Documents

Publication Publication Date Title
RU2346396C2 (en) Protection marker
US10402797B2 (en) Secured authentication and transaction authorization for mobile and internet-of-things devices
US9740849B2 (en) Registration and authentication of computing devices using a digital skeleton key
US7921455B2 (en) Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions
US9306954B2 (en) Apparatus, systems and method for virtual desktop access and management
US20160262013A1 (en) Soft token system
CN111199045A (en) Method and system for encrypted private key management for secure multiparty storage and delivery of information
CN109768865A (en) Block chain upper body part under credible performing environment digitizes realization method and system
EP2731043A1 (en) Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
CN103561034A (en) Secure file sharing system
WO2015188424A1 (en) Key storage device and method for using same
US9154304B1 (en) Using a token code to control access to data and applications in a mobile platform
CN103929306A (en) Intelligent secret key device and information management method of intelligent secret key device
US8619978B2 (en) Multiple account authentication
CN109711834B (en) Address management method for block chain cold wallet
US20190340264A1 (en) Data exchange group system and a method thereof
CN107733936B (en) Encryption method for mobile data
CN107104792B (en) Portable mobile password management system and management method thereof
NO340355B1 (en) 2-factor authentication for network connected storage device
Karim et al. Choosing the right MFA method for online systems: A comparative analysis
CN110909336B (en) Password management method and device based on fingerprint USB flash disk
CN105279453A (en) Separate storage management-supporting file partition hiding system and method thereof
GB2419016A (en) Cellular authentication token
WO2017092507A1 (en) Application encryption method and device, and application access method and device

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)