GB2419016A - Cellular authentication token - Google Patents
Cellular authentication token Download PDFInfo
- Publication number
- GB2419016A GB2419016A GB0422381A GB0422381A GB2419016A GB 2419016 A GB2419016 A GB 2419016A GB 0422381 A GB0422381 A GB 0422381A GB 0422381 A GB0422381 A GB 0422381A GB 2419016 A GB2419016 A GB 2419016A
- Authority
- GB
- United Kingdom
- Prior art keywords
- accounts
- otp
- time
- end user
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/70—Administration or customization aspects; Counter-checking correct charges
- H04M15/745—Customizing according to wishes of subscriber, e.g. friends or family
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/70—Administration or customization aspects; Counter-checking correct charges
- H04M15/765—Linked or grouped accounts, e.g. of users or devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/70—Administration or customization aspects; Counter-checking correct charges
- H04M15/77—Administration or customization aspects; Counter-checking correct charges involving multiple accounts per user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M17/00—Prepayment of wireline communication systems, wireless communication systems or telephone systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M17/00—Prepayment of wireline communication systems, wireless communication systems or telephone systems
- H04M17/20—Prepayment of wireline communication systems, wireless communication systems or telephone systems with provision for recharging the prepaid account or card, or for credit establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0108—Customization according to wishes of subscriber, e.g. customer preferences, friends and family, selecting services or billing options, Personal Communication Systems [PCS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/72—Account specifications
- H04M2215/724—Linked accounts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/72—Account specifications
- H04M2215/724—Linked accounts
- H04M2215/7254—Multiple accounts per user
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
Multiple One Time Password accounts and any other password accounts are managed on the same Cellular device. The management of the accounts means the definition, updating and showing of the account details and the production of the required OTP or other password when requested.
Description
Description
CcilularAuthenticatin Token (CAT) ()ne Mime Password (OTP) is an accepted security methodology that is used today to protect and secure server access. 'I'he ('Arl'is an inTlovativc way lo implement a O=l'l' on pro'rarnmahle ('ellulars and other mobile devices I'hc 0'1'P hardware security tokens of today arc made unique for each user's account. If the user has several secured accounts he has lo catty multiple Ijardware Tokens. which is veiny inconvenient.
The patent is the corrTbtnation <if a unique and sophisticated encryption algorithm and iDe use ,l'progTammahle cellular or mobile device for creating multiple One Time Password accounts and any other password accounts and manage them all on the same Cellular device.
The management of'the accounts means the definiti:,T1 updating and showing ofthe accounts details and the production of'the required O'l'l' or other password when requested.
rl'he CA I' provides the same level of security as existing, TFA 'tokens do' but with a much dower overhead and mark-et prices hrinfing the product to the category of commodity. E'veT- business should have a secured server and every business should be able to afford it.
he CA'L is made ot'twL-' standalone software code modules. ()ne that runs on a Cellular de\icc or any mobile device Nudity procraTTnirlg capabilities manages any number of'aeeounts and for each account it mates One 'f'ime Passwords. The other runs on a Server computer and verifies the One Time Password that arrives to the Server.
leer example:
lnternet Banking is a poplar service Or end users to access their Bank information and pert'o1 ontiTle transactions.
I'o access the persona] account, the end user is required to 1 ogin to the service.
T'o Login the user is required to enter a tin string of'1O and another fixed strincr as l'ass\Nord.
l'hese strings are easily hacked 'T o avoid the stealing Blithe Password we use the OTP methodolov. 'he end user is enteritis an 0'1'P in the 1 ogin windowed rather then a fixed password string. We provide the end user with a t-iien (in our ease - a software token that r uns on progrrammahle (:'ellulars and Mobile devices) that TnT-oduces the (:)TP. Each time the eT]d tTSCT \N'ants to aeee.ss lI,s Bail aecouilt. lie will be provided \itli a dLTrfe!-eilt C)rl P The Q I I's cats claTI_e eN cry Dune of TliutoS tat cilaTl<e on dead.
Our e!ld user Slav also have an account at another secured lntenet Service, such as for c>;ar.lple. an, On I.ine site lI,i filling, Ti,atent ap,pPeaticTns Again the usei- is reciuired to enter an 01 P iTI oT-der to, access his accost details arid fLIlirl'T hi T1ew IT] N7eT][iOTI.
Tfthe Patents site is using a regular OTP method. the user has to have a different token for this accouTlt He has to carry dificrcnt tokens One for the Bank. and one for the Patents site.
The (.A I is software token that runs on the end user programmable (. ellular or Mobile device that he carries with him anN'\A'aV. Phe (:'AT manages the production of the ()TPs to all the end user s accounts. fle noNN Lions not need to COFT:t multiple tok-cns
Claims (4)
- Claims i. The prociuction of unique One Time Password sequence formultiple different accounts or1 a single pr-o,rammahle (cllular or Mobile device. An account contains the details for a secured service such as the I User ldcntifcation ( [D) and requires a C)ne T ime l'assword for each time the end user wants to l.os in to the service with his particular II). T he combination ofthe II) and OTP is used to authenticate tics end user.
- 2. The C)TP Generation fin the programmable C'ellular or Mobile crevice is stand-alone and does not recluire aunt sort of communication with the Servcr.
- A. Tile algorithms for generating the OTP could he of different types such as - time c,ricnted, where the OT? changes e-NCi,N' niiml-ici of second. Eli e\icni orienicc where the C)IP changes on request of a new 01I'.
- 4. I:ach account has a different sequence of OTPs.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0422381A GB2419016A (en) | 2004-10-08 | 2004-10-08 | Cellular authentication token |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0422381A GB2419016A (en) | 2004-10-08 | 2004-10-08 | Cellular authentication token |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0422381D0 GB0422381D0 (en) | 2004-11-10 |
GB2419016A true GB2419016A (en) | 2006-04-12 |
Family
ID=33443598
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0422381A Withdrawn GB2419016A (en) | 2004-10-08 | 2004-10-08 | Cellular authentication token |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2419016A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007145540A2 (en) * | 2006-06-14 | 2007-12-21 | Fronde Anywhere Limited | Authentication methods and systems |
GB2440358A (en) * | 2006-06-30 | 2008-01-30 | G3 Vision Ltd | Authentication system and method using One Time Passwords (OTPs) |
US9119076B1 (en) | 2009-12-11 | 2015-08-25 | Emc Corporation | System and method for authentication using a mobile communication device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030204725A1 (en) * | 2002-04-26 | 2003-10-30 | Masayuki Itoi | Method and system for verifying identity |
-
2004
- 2004-10-08 GB GB0422381A patent/GB2419016A/en not_active Withdrawn
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030204725A1 (en) * | 2002-04-26 | 2003-10-30 | Masayuki Itoi | Method and system for verifying identity |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007145540A2 (en) * | 2006-06-14 | 2007-12-21 | Fronde Anywhere Limited | Authentication methods and systems |
WO2007145540A3 (en) * | 2006-06-14 | 2008-03-06 | Fronde Anywhere Ltd | Authentication methods and systems |
GB2440358A (en) * | 2006-06-30 | 2008-01-30 | G3 Vision Ltd | Authentication system and method using One Time Passwords (OTPs) |
GB2440358B (en) * | 2006-06-30 | 2009-04-08 | G3 Vision Ltd | Authentication system and method |
US9119076B1 (en) | 2009-12-11 | 2015-08-25 | Emc Corporation | System and method for authentication using a mobile communication device |
Also Published As
Publication number | Publication date |
---|---|
GB0422381D0 (en) | 2004-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2346396C2 (en) | Protection marker | |
US10402797B2 (en) | Secured authentication and transaction authorization for mobile and internet-of-things devices | |
US9740849B2 (en) | Registration and authentication of computing devices using a digital skeleton key | |
US7921455B2 (en) | Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions | |
US9306954B2 (en) | Apparatus, systems and method for virtual desktop access and management | |
US20160262013A1 (en) | Soft token system | |
CN111199045A (en) | Method and system for encrypted private key management for secure multiparty storage and delivery of information | |
CN109768865A (en) | Block chain upper body part under credible performing environment digitizes realization method and system | |
EP2731043A1 (en) | Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method | |
CN108989346A (en) | The effective identity trustship agility of third party based on account concealment authenticates access module | |
CN103561034A (en) | Secure file sharing system | |
WO2015188424A1 (en) | Key storage device and method for using same | |
US9154304B1 (en) | Using a token code to control access to data and applications in a mobile platform | |
CN103929306A (en) | Intelligent secret key device and information management method of intelligent secret key device | |
US8619978B2 (en) | Multiple account authentication | |
CN109711834B (en) | Address management method for block chain cold wallet | |
US20190340264A1 (en) | Data exchange group system and a method thereof | |
CN107733936B (en) | Encryption method for mobile data | |
CN107104792B (en) | Portable mobile password management system and management method thereof | |
NO340355B1 (en) | 2-factor authentication for network connected storage device | |
Karim et al. | Choosing the right MFA method for online systems: A comparative analysis | |
CN110909336B (en) | Password management method and device based on fingerprint USB flash disk | |
CN105279453A (en) | Separate storage management-supporting file partition hiding system and method thereof | |
GB2419016A (en) | Cellular authentication token | |
WO2017092507A1 (en) | Application encryption method and device, and application access method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |