GB2435533A - Integrated systems for simultaneous mutual authentication of a database and a user - Google Patents
Integrated systems for simultaneous mutual authentication of a database and a user Download PDFInfo
- Publication number
- GB2435533A GB2435533A GB0623445A GB0623445A GB2435533A GB 2435533 A GB2435533 A GB 2435533A GB 0623445 A GB0623445 A GB 0623445A GB 0623445 A GB0623445 A GB 0623445A GB 2435533 A GB2435533 A GB 2435533A
- Authority
- GB
- United Kingdom
- Prior art keywords
- data
- code
- user
- biometric
- codes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Collating Specific Patterns (AREA)
Abstract
A system for user authentication and the prevention of "phishing" or 'man in-the-middle" attacks. The present invention provides for the authentication of a system database to a registered user with a data carrying device (eg USB token or DataCard) at a remote terminal, by means of a e.g. variable Code computed at both the database from fixed data recorded for that user and at the terminal from replicate data on the, resulting in simultaneous mutual authentication of the Database and the user by various alternative means including a match of variable codes without user input, Fixed PIN input, Image reproduction at the terminal for operator verification with or without other personal data and by biometric data capture (eg. face or signature) and match with a template, all such authentication codes being stored as the differential between two variable codes. A system may be authenticated to a device by considering the differential between a first code from the system and a second code from the device. The differential may relate to eg a biometric template, a PIN.
Description
<p>INTEGRATED SYSTEMS FOR SIMULTANEOUS MUTUAL</p>
<p>AUTHENTICATION OF DATABASE AND USER</p>
<p>FIELD OF THE INVENTION</p>
<p>The present invention concerns improvements in the field of the authentication of a system user (hereafter a "User") to that system including a means of combating the two related but different attacks on authentication systems of "phishing" and of the "man-in-the-middle" attack, the former involving the obtaining of personal data from a system User by fraudulent means by posing as the relevant system Database or Internet Website (hereafter called for the sake of brevity and clarity but not by way of limitation a "Database") and the latter involving the interception of single-use authentication Codes "in-the-middle" between a User and the Database for replay, in both cases using the personal data or Codes to fraudulently access the system Database.</p>
<p>The claimed improvements are derived from a simple system of authentication which in alternative embodiments provide for a complete system, for a means of significantly improving existing systems and as a means of enhancing and protecting any form of Biometric authentication without any reference to or effect on any proprietary Biometric algorithms.</p>
<p>In this Application, the word "Database" means both the actual system to which authentication is sought but also where the context admits the Master System and those operational functions of the system which computes Codes, receives and sends Codes and which allows or rejects access from an authentication attempt.</p>
<p>BACKGROUND TO THE INVENTION</p>
<p>There is a considerable range of different methods of authentication with a wide range of claimed security, attributes, complexity, and cost, but by far the most used in practice is a system in which subsequent to identifying him or her self (with "userllY'), the User inputs a Password or Personal Identification Number (hereafter called for the sake of brevity and clarity but not by way of limitation a "PIN"), which, being recognised by the Database, is taken as authentication of the User. This system is the most widely used because of its simplicity, famtliarity and effectiveness.</p>
<p>However, such a system does have significant security flaws and its suitability for systems requiring a higher level of security is questionable, partly because of the ease with which most fixed PIN's (or at least Passwords) may be discovered and partly because of the increase in phishing and man-in-the-middle attacks whereby a User's personal data and authentication codes are obtained or intercepted and used to gain fraudulent access.</p>
<p>Various attempts have been made to increase the security of the useriD PIN system -for example, by changing the PIN regularly, having longer PIN's, alpha-numeric PIN's, or only using a part of the PIN -but the danger of phishing and man-in-the-middle attacks remain and indeed is perceptibly increasing.</p>
<p>Another widespread and supposedly more secure (and certainly many times as expensive) system for the authentication of a remote User is that whereby a variable Code, generated by a token or device usually (but not necessarily) after the entry by the User of a conventional fixed PIN, is entered into a Terminal and sent to the Database where it may be matched by a similar Code generated by an identical process and algorithm. There is normally a time window for this system, but that does not necessarily prevent a real-time man-in-the-middle attack whereby the interceptor gains access to the Database in place of the User. V 3</p>
<p>At present, there is no protection available against phishing attacks except to warn the User not to be so gullible and to protest that an actual Database would not ask such questions: and there is little protection against the man-in-the-middle attack since it is concerned with taking over the Database access (in a manner not readily ascertained by the user) rather than stealing data.</p>
<p>In fact, a man-in-the-middle attack is not especially common as yet, is certainly no simple matter to arrange and has been aimed to date only at "higher value" systems. Perhaps for these reasons, most systems entirely ignore the possibility and would be vulnerable to such an attack, but the incidence is slowly widening and increasing.</p>
<p>The present invention provides for a regime which is immune to both phishing and man-in-the-middle attacks since no Codes (other than userlD) are sent to the Database at all. This is to be achieved by means of a variable Code to be produced by the Database and sent to the User at a remote Terminal, where it could be compared with Codes produced at the Terminal from a data carrying device or Card (hereafter called for the sake of brevity and clarity but not by way of limitation a "DataCard"), and it is a principal objective of the present invention to provide simultaneous mutual authentication by such means, which is not provided at present by UseriD + PIN, a single use Code-generating device system or indeed any other presently available method.</p>
<p>DETAILS OF THE INVENTION</p>
<p>Configuration of Codes and means of authentication The present invention therefore proposes a simple and integrated system whereby simultaneous mutual authentication may be achieved, by the sending of a variable Code from the Database to the Terminal where it may be compared on one of several alternative methods against Codes generated at the Terminal from the DataCard and from data input by the User. t 4</p>
<p>Such a system may be used to enhance the simplest UseriD and PIN system, to provide for a simple and inexpensive means of providing a variable access Code to be generated to replace a 6 digit variable Code produced by a device, and also at the other end of the scale to provide a means of enhanced security and protection for a biometric authentication system. Each of these alternative configurations may be achieved from the same DataCard and using the same system, the difference being merely in the Codes received from the Database. By this means both phishing and man-in-the-middle attacks are simply impossible since no data other than useriD is sent over insecure networks at all.</p>
<p>The result of the comparison of the variable Codes -that generated at the Terminal from the DataCard and that received from the Database -will depend upon various factors, including required level of security, terminal facilities and Code length, but simultaneous mutual authentication would be achieved by any one of the following alternatives:- [1] the Codes match without input from the User, providing verification of the DataCard (and of the Database) but not of the User -single factor authentication for very low security or to verify the DataCard itself [2] the Codes match after the input of a Fixed PIN by the User, providing 2 factor userlD/PIN authentication, but with very greatly increased security over a conventional system [3] the differential between the Codes after a User PIN input generates onscreen a facial image representation of the User (which specifically is not recorded on the DataCard or Databse) for Terminal operator manual verification, providing 3 factor authentication [4] as an alternative to [3] without using a PIN, the differential between the Codes generates the same facial image onscreen together with other data such as a representation of the User's signature (again, not otherwise recorded on the DataCard), the User's Postcode, date of birth or other data, which is then compared with data supplied by the User (specimen a 5 signature, Postcode etc) prior to the receipt of the Code from the Database, thereby providing 3 factor authentication without a PIN and enabling PIN reset after authentication without a Helpdesk intervention (since the Database does not know the Fixed PIN, with the avoidance of Helpdesk PIN re-set facilities representing a significant potential reduction in running costs) [5] the differential between the Codes after the input of a Fixed PIN generates the Template of a Biometric Verification system which may be compared with an actual Biometric image of the User captured at the Terminal, after such actual image has been subjected to the relevant algorithm to provide comparable data, thereby providing strong 3 factor Biometric authentication As a variation of [5], the Biometric data capture may be a photograph of the User which is then subjected to the appropriate algorithm to provide automated comparison for Accept/Reject rather than by the Terminal operator manual comparison envisaged at [3] and [4].</p>
<p>Variable Code system for authentication The main elements of the invention are all in common use (as explained in more detail at Fig. 1) and consist of a network of remote computer Terminals at which data is read from a User presented DataCard, and effectively compared (or in fact "amalgamated" as described below) with data held at the Database.</p>
<p>The DataCard would record user identification codes and other authentication codes: R (random), V (variable), C (access Code) and F (fixed), together with the algorithm required to compute the variable Codes.</p>
<p>The Codes functions are as follows:-R Random -this is a Code recorded on the DataCard and Database and either rotated on each occasion of use as shown below if not updated on any occasion: otherwise it is a new entirely random value generated at the Ternunal, sent to the database (in clear) with useriD and recorded on both the DataCard and Database by XOR logic gate against the previous R value. Code R is used on every occasion, either as XOR'd with the new R or rotated if none is generated.</p>
<p>V Variable -this Code is in fact fixed and recorded on the Datacard and Database, the variation being the time base rotation, and used on every occasion C Code -this is recorded on one of the DataCard or Database and its rotational value after PIN application recorded on the other: Code C is used only when a PIN is required F Fixed -this is again a Fixed Code, recorded on the DataCard and as a base for carrying the Biometric templates and facial image values, by XOR function at the Database: thus, the XOR of Code F on the DataCard and a Code Fl derived from the Database will generate a value I which would be the representation of the facial image of the User. Code F is used when Image or Biometric authentication is required.</p>
<p>The Random Code R would be generated on each occasion of use given the ability at the Terminal to generate a sufficiently "random" random and to write the result to the DataCard (and of course to the Database although this capacity would be undoubted: if the randomness was in doubt, or a write facility to the DataCard not available, then the Code R would be rotated.</p>
<p>The User would at some stage and in secure circumstances record a Fixed PIN which would then be used to rotate the elements of the Code C making a recorded Code called Cp, and having the characteristic that when the correct PIN were applied to Cp, the value C (then equalling (again) the value at the 7r Database) would result: thus, the Fixed PIN is solely a matter for the user, and is unknown by the Database.</p>
<p>The Codes would thus be at inception:-</p>
<p>DATABASE DATACARD</p>
<p>RVCpF I RVCFIFIdFb The term "rotating" and "rotation" mean the rearrangement of the elements of the Code to start at a point indicated by the adjusted time-based value: for example, in a Code with elements: 1,2,3,4 n,n+1,n+2,n+3 z-3,z-2,z-1,z a rotation by "n" would give the new sequence of elements as: n,n+1,n+2,n+3 z-3,z-2,z-1,z,1,2,3.,. .n-2,n-1 The term "amalgamation" means the application of the XOR logic gate to the individual binary bits of each element of the Code to provide a new binary value and therefore Code element, as under, whereby (with" " meaning the application of the XOR logic gate): 11 or0"O resultinO but IAO or0'l resultini The rotations envisaged for the Codes would be: Code R by a time-based factor (unless a new random were available) Code V by a time based factor Code C by the value of the Fixed PIN and a time based factor would be a value derived from the particular time of the authentication attempt as illustrated at Fig. 2.</p>
<p>Thus, the principal embodiment present invention is of a method and apparatus for the authentication of a system to the holder of a data carrying device recording identification data and other data related to a registered user of that system, wherein subsequent to the introduction of the data carrying device at a device reading apparatus connected to the system and the sending of said identification data to the system, the system sends, from recorded data related to the registered system user, a first code to the device reading apparatus which may be compared with a second code derived from the data carrying device, thereby providing for the authentication of the system by reference to a preset differential between the two codes.</p>
<p>Alternative configurations Alternative modes of operation provide for improvements to several distinct types of system: [a) a conventional UseriD + PIN system -by providing for random and rotated variable Codes to hide the underlying Fixed Codes in a simplified integrated form of encryption [bJ a variable Code system such as the token generated random number, by providing for a significantly longer variable Code and by making the expensive token or device redundant [ci a Biometric system, by providing for the actual data reading at the Ternunal (there subjected to the particular algorithm to produce a session Template) to be compared with the actual Template value revealed as the differential between the two Codes, without either the DataCard or the Database recording any identifiable Biometric data at all.</p>
<p>The particular algorithm would require to be stored on the DataCard or at the Terminal: and if this were not acceptable, the system could be reconfigured so that the actual Biometric capture data would be sent to the Database as raw data (implying longer Codes to carry the values) for conversion to a Session Template and comparison at the Database.</p>
<p>Length of output Codes sent to the Database The length of the Codes will determine the number of different combinations possible, which amounts to the square of the length: thus for example 10 element Codes would produce 100 combinations, 100 element Codes would produce 10,000 different combinations and Codes of say 50,000 elements could produce 2.5Bn combmations.</p>
<p>Since the DataCard could not be used without the PIN to authenticate the User, merely itself and the Database, and carries no meaningful data at all, the loss of the card would present no security risk at all whilst its replacement would be at less cost than most similar DataCards or Smartcards (not itself very dramatic) and at a very significantly reduced cost than existing code-generating tokens, and with none of the same administrative costs involved in its handling and distribution.</p>
<p>The Codes used in the present invention tends towards (in the mathematical sense) a Vernam Cipher or One Time Pad ("OTP"), becoming increasingly similar to a OTP the longer the Codes and eventually approaching (if not reaching) that state for which Claude Shannon in 1949 proved that because of the randomness involved, the value of any one element of a OTP gave no clue at all as to the value of any other element, and therefore a Code based upon a OTP used only once was absolutely secure against decryption.</p>
<p>Although the OTP concerned the field of secure messages, the principles involved are the same.</p>
<p>Biometric authentication Authentication by Biometric verification of an actual reading reduced by the appropriate algorithm to a Session Template being compared against the revealed Template, would entail the following: [a] the initial registration of Biometric data under controlled and secure Circumstances [b] the conversion of this data to a Template format by means of an (possibly proprietary or secret) algorithm (not of itself a part of the claimed invention) [c] the XOR of the Template values with Code F [d] the capture of an actual Biometric reading at a Terminal [e] the application to it of the same algorithm as employed at [b) above to provide a Session Template [f] the comparison of the Session Template with the actual Template (as revealed by the Code differential, but not otherwise stored anywhere) to provide the basis for an Accept! Reject decision.</p>
<p>None of the steps listed immediately above involves an inventive step except perhaps Ed, and is merely a restatement of conventional Biometric matching where a match-on-card is not allowed ie. where actual data captured at a Terminal needs comparison with a Template value.</p>
<p>The particular and unique advantage of Bioxnethc authentication is the ability to conduct, in respect of a proposed registrant or an actual user, a search against a database of persons already registered, and this would be available with the present invention just as in any other Biometric system. However the recorded Biometric data requfred for such a search would be kept separately and not be routinely accessed or available for authentication as such.</p>
<p>A proposed registrant would therefore be checked against a separate Database of users for duplication or for a match against wanted or indicated persons, and similarly the check could also be performed with an actual Biomethc capture with the system in use, again precisely as with any other system but without the Biometric data being held on the DataCard or as above without it being routinely available.</p>
<p>Thus a further embodiment of the invention provides a method and apparatus for the simultaneous mutual biometric authentication of a system and a the registered user of that system by means of a data carrying device recording identification data and other data related to that system user comprising the following steps: [a] the allocation of random codes to a data cariying device issued to the registered system user and to the system [b] the capture of a biometric image of the system user [ci the reduction of such image by means of an algorithm to a biometric template value in a format suited to comparison with other values ui the same format [dJ the amalgamation of such biometric template value to a part of the code recorded on the system but not on the data carrying device [e] the subsequent introduction of the data carrying device at a device reading apparatus connected to the system [fi the sending of said identification data together with a new random code to the system [gJ the sending by the system of a first code derived from recorded data related to the system user to the device reading apparatus [h] the generation of a second code derived from the data carrying device both such codes being determined by variations of elements of the recorded data by reference to an algorithm and determinant recorded on the data carrying device and on the system referenced in part to a specified time and date for the attempted authentication and both incorporating the new random code by exclusive/or logic gate and thereby resulting in first and second codes which vary on every occasion of use [iJ the comparison of first and second codes by exclusive/or logic gate and thereby deriving a differential between the two codes being the biometric template value [11 the recording of a session biometric image capture [Ic] the reduction of such image to a session template by application of the same algorithm as at [cJ [1] the comparison of the biometric template value with the session template value [m] the evaluation of the difference between the two template values against preset criteria followed by acceptance as a biometric match or rejection as a non-match thereby providing for simultaneous mutual authentication by conventional biometric means at the device reading apparatus.</p>
<p>In a further embodiment of the present invention, wherein the details of the Biometric algorithm are to be retained at the Database, the present invention provides for a method and apparatus for the biometric authentication of a system and a the registered user of that system by means of a data carrying device recording identification data and other data related to that system user comprising the following steps: [a] the allocation of random codes to a data carrying device issued to the registered system user and to the system [b] the capture of a biometric image of the system user [cJ the reduction of such image by means of an algorithm to a biometric template value in a format suited to comparison with other values in the same format [dJ the amalgamation of such biometric template value to a part of the code recorded on the system but not on the data carrying device [e] the subsequent introduction of the data carrying device at a device reading apparatus connected to the system [f] the sending of said identification data together with a new random code to the system [g] the sending by the system of a first code derived from recorded data related to the system user to the device reading apparatus [h] the verification of such first code at the device reading apparatus from data recorded on the data carrying card to provide the authentication of the system to the system user prior to any input by the system user [h] the generation of a second code derived from the data carrying device to be sent to the system for comparison with the code on the system with the biometric template value [I] the extraction of the differential between the second code and code on the system to reveal the biometric template value [j] the recording of a session biometric image capture [kJ the reduction of such image to a session template value by application of the same algorithm as at [c} [k] the amalgamation of such session template value to a part of the code recorded on the data carrying device to provide a third code [1] the sending of the third code to the system Em] the extraction at the system of the session template value all three such codes being determined as described and additionally by variations of elements of the recorded data by reference to an algorithm and determinant recorded on the data carrying device and on the system referenced in part to a specified time and date for the attempted authentication and both incorporating the new random code by exclusive/or logic gate and thereby resulting in first, second and third codes which vary on every occasion of use [n] the comparison of the biometric template value with the session template value [o} the evaluation of the difference between the two template values against preset criteria followed by acceptance as a biometric match or rejection as a non-match thereby providing for prior authentication of the system followed by conventional biometric authentication.</p>
<p>Interoperability One embodiment of the present invention therefore provides an integrated system in which different means of authentication may be used for different purposes or for different categories of secunty transaction or indeed value. Each method requires, after identification of the User, the sending of a Code from the Database to the remote Terminal which then results, after and required user input and depending upon the system selected, in:- [a Code agreement with or without PIN [b] facial image reproduction and comparison with PIN [c] facial image and other data reproduction without PIN [dJ Biometric comparison and evaluation with PIN The proposed invention may be used for very simple 1 factor authentication (mere presentation of the DataCard) to full 3 factor authentication (DataCani, PIN and Biometric reading). Each would involve prior authentication and there could be no match-on-card facility as the DataCard would not carry any meaningful personal data at all: but this would mean that the DataCard may be of the cheapest sort without a CPU, ts loss would not be a security issue at all as none of the data for the PIN, Image and Biometric templates is recorded in any way on the DataCard, and provide different levels of security and interoperability to be uniquely available with the present invention.</p>
<p>Neither the DataCard nor the Database would retain any details of the fixed PIN, and accordingly the loss of a PIN could not be rectified by a Helpdesk, the abandonment of which in itself represents a significant cost reduction. Instead, the PIN could be self set again after authentication by Image recognition or Biometric authentication.</p>
<p>The present invention is therefore an integrated and interoperable method of authentication by different means for a wide variety of uses.</p>
<p>Moreover, the use of a DataCard is not essential: in a static situation for remote authentication, a programme on a user's computer would suffice in producing the necessary Codes, for example in internet site access, although a DataCard (meaning as above any data carrying device including a UBS token) might be preferable anyway.</p>
<p>DESCRIPTION OF THE DRAWINGS</p>
<p>Fig. 1 Description of the structural elements involved in the present invention Fig. 2 DataCard Data and Rotation of Codes R and V Fig. 3 Codes used for alternative means of authentication Fig. 4 Flow chart for Prior Authentication system Fig. 1 is a diagram of the structural elements of the present invention, with a system User (1) having a DataCard (2) with an IC Chip (3) and Data (4).</p>
<p>The User (1) and DataCard (2) are associated with both a personal computer and a number of remote Terminals (5), all equipped with a Card reader (6), linked via a link (8) to a Database (9) which has details of all Users and relevant Codes, shown as Data (10). The Link (8) may be internal, a telephone or a wireless connection and is assumed to be insecure. The system is therefore suited to both personal use at home or workplace, as means or authentication to remote sites or databases, or may be used as a means of authentication at remote sites whilst on business or personal travel.</p>
<p>Fig.2 shows the concept of Code Rotation based upon the time/date (12), recorded at the Terminal (5) and the Database (9) (and obviously to be synchronised at each authentication), here shown as 46 Minutes (14) past 7 o'clock (15) on 24th (16) of August (17), and using a fixed value 837 (13) generated for each User (1) at registration, the Multipliers (22) shown as Minutes 1, Flours 60, Dats 31 and Months 12 (18,19,20,21), values for the actual date of 46, 420, 744 and 96 are generated (23) giving a total value of 1306 (24).</p>
<p>When added to the Fixed value 837 (13), a final value of 2143 (25) for this authentication attempt is determined.</p>
<p>Depending upon the length of the Code, this value may be used as it is or may require to be reduced to fit the Code length: as illustrated, the Code length is 1,000so the value (25) may be reduced by the application of a Modulus, here shown as 999 (26), giving final rotations for Code R of 145 (27) and the inverse for Code V of 855 (28). In fact the relationship between Codes R and V would not be fixed, and a rotation of 145 for Code R would not always result in a rotation of 855 for Code V. Given very long Codes, the Multipliers (22) may be considerably larger, and the Modulus 999 (26) might instead be say 45,924 or some other indeterminate value, unknown other than to the Database and the DataCard.</p>
<p>The actual algorithm for the rotation is not fixed and is not a part of the invention claimed, which is for the principal of rotation in the context shown.</p>
<p>The Data (4) recorded on the DataCard (2) would consist of useriD and system verification data, Codes R, V, C and F and details of the algorithm and Multipliers (22) Fixed value (13) MOD value (26) attributable to the time-date (12).</p>
<p>The name of the User (1) is not an essential, and the DataCard (2) could be entirely anonymous both externally and internally, so that confirmation of the User's name after receipt of a Code from the Database would be an optional means of authentication at the Terminal.</p> <p>Fig. 3 shows the different Codes required for the alternative means of
authentication.</p>
<p>The Codes from the Database 9 are shown for Card only without input (31), with Fixed PIN input by the User (32), for PIN and the Image of the User reproduced onscreen at the Terminal 5 (33), the Image and other data to be verified by the User but without PIN input (34) and for Biometric authentication (35). Column (38) shows the differential between Column (9) Database and Column (5) Terminal (derived from the User (1) DataCard (2), and Column (39) Authentication.</p>
<p>Fig. 4 shows a flowchart for the authentication process, commencing with the User (1) presenting (41) the DataCard (2) at the Terminal (5), from which the userlD is read (42), Code V is rotated as shown in Fig 2 and either Code R is similarly rotated or a new random Code is generated, all being sent to the Database (43) including data identifying the Terminal (5) and the type of authentication required although this decision may be taken by the Database.</p>
<p>Provided the Terminal knows which authentication is being used, it can produce the required matching Codes at the terminal to produce the authentication differential.</p>
<p>At the Database (5), the Codes is received (44) and the correct Code rotations for the Code V and the value of Code R (rotated or recovered from the Received Codes (44) so that the required Code (45) is then sent (46) to the Terminal (5), where it is received (47).</p>
<p>On differentiating the Codes (48) the appropriate differential then provides for Simultaneous Mutual Authentication (49) or not (50) as the case may be, as previously explained.</p>
Claims (1)
- <p>CLAIMS</p><p>I claim: 1 A method and apparatus for the authentication of a system to the holder of a data carrying device recording identification data and other data related to a registered user of that system, wherein subsequent to the introduction of the data carrying device at a device reading apparatus connected to the system and the sending of said identification data to the system, the system sends, from recorded data related to the registered system user, a first code to the device reading apparatus which may be compared with a second code derived from the data carrying device, thereby providing for the authentication of the system by reference to a preset differential between the two codes.</p><p>2 The method and apparatus of Claim 1 wherein the codes comprise predetermined variations of elements of the recorded data such that both the first code and the second code vary on each occasion of use without affecting the resultant differential.</p><p>3 The method and apparatus of Claim 2 wherein the variations of the elements of the recorded data are determined by reference to an algorithm and determinant recorded on the data carrying device and the system.</p><p>4 The method and apparatus of Claim 3 wherein the algorithm and determinant provide for variations related to a spedfied time and date for the attempted authentication.</p><p>The method and apparatus of any preceding aaim wherein a new random code is sent from the device reading apparatus with the identification data to the system and amalgamated using an exclusive/or logic gate into both the first code and the second code without affecting the resultant differential.</p><p>6 A method and apparatus for the authentication of a system to the holder of a data carrying device recording identification data and other data related to a registered user of that system, wherein subsequent to the introduction of the data carrying device at a device reading apparatus connected to the system and the sending of said identification data together with a new random code to the system, the system sends, from recorded data related to the system user, a first code to the device reading apparatus which may be compared with a second code derived from the data carrying device, both such codes being determined by variations of elements of the recorded data by reference to an algorithm and determinant recorded on the data carrying device and on the system referenced in part to a specified time and date for the attempted authentication and both incorporating the new random code by exclusive/or logic gate, thereby resulting in first and second codes which vary on every occasion of use and providing for the authentication of the system by reference to a preset differential between the two codes.</p><p>7 The method and apparatus of Claim 6 wherein fixed personal identification data is entered by the system user at the device reading apparatus and applied by a predetermined algorithm to the second code derived from the data carrying device, thereby providing for simultaneous mutual authentication of system and system user by reference to a combination of the fixed personal identification data and to a preset differential between the first and second codes 8 The method and apparatus of Claim 6 wherein the differential comprises the binary value of a facial representation of the system user which is displayed at the device reading apparatus for comparison with the person presenting the data carrying device, thereby providing for simultaneous mutual authentication of system and system user.</p><p>9 The method and apparatus of Claim 8 wherein additionally the differential in addition comprises the binary value of a representation of the system user's signature, which is additionally displayed at the device reading apparatus for comparison with a specimen signature provided by that person.</p><p>The method and apparatus of Claim 8 wherein additionally the differential comprises the bmary value of a representation of other personal data related to the system user, which is displayed at the device reading apparatus for verification of a part of that personal data by input or disclosure by that person.</p><p>11 The method and apparatus of Claim 6 wherein the differential comprises the binary value of biometric data of the system user, previously captured and reduced by an appropriate algorithm to form a template for subsequent biometric data capttire matching and being amalgamated by exclusive/or logic gate onto a part of the first code, such template being recovered as the differential being compared with a temporary template derived from an actual biometric image reduced by the same algorithm after capture at the time of the attempted authentication by a biometric capture device linked to the device reading apparatus, thereby providing for simultaneous mutual authentication of system and system user by conventional biometric verification.</p><p>12 The method and apparatus of Claims 8, 9, 10 or 11 wherein a predetermined fixed personal identification data is entered by the system user at the device reading apparatus and applied by a predetermined algorithm to the second code derived from the data carrying device, thereby providing for simultaneous mutual authentication of system and system user by fixed personal identification data and the resultant differential between the two codes.</p><p>13 The method and apparatus of aaims 5 to 12 inclusive wherein the amalgamation by exclusive/or logic gate of the new random code with the existing random code is recorded on the system and on the data carrying device thereby replacing the existing random code and providing a linking sequential element with ensuing authentication attempts.</p><p>14 The method and apparatus of Claims 5, 6 or 7 wherein the differential relates to the binary value of data residing on the system database and specified by the system user together with the user's identification code, such binary value being amalgamated by the system with the first code by exclusive/or logic gate and thereafter being retheved by the system user by exdusive/or logic gate amalgamation between the first and second codes.</p><p>A method and apparatus for the simultaneous mutual biometric authentication of a system and a the registered user of that system by means of a data carrying device recording identification data and other data related to that system user comprising the following steps: [a] the allocation of random codes to a data carrying device issued to the registered system user and to the system [b] the capture of a biometric image of the system user [c] the reduction of such image by means of an algorithm to a biometric template value in a format suited to comparison with other values in the same format [d] the amalgamation of such biometric template value to a part of the code recorded on the system but not on the data carrying device [eJ the subsequent introduction of the data carrying device at a device reading apparatus connected to the system [f] the sending of said identification data together with a new random code to the system [g] the sending by the system of a first code derived from recorded data related to the system user to the device reading apparatus [h} the generation of a second code derived from the data carrying device both such codes being determined by variations of elements of the recorded data by reference to an algorithm and determinant recorded on the data carrying device and on the system referenced in part to a specified time and date for the attempted authentication and both incorporating the new random code by exclusive/or logic gate and thereby resulting in first and second codes which vary on every occasion of use [ii the comparison of first and second codes by exclusive/or logic gate and thereby deriving a differential between the two codes being the biometric template value [j] the recording of a session biometric image capture [kI the reduction of such image to a session template by application of the same algorithm as at [c] [1] the comparison of the biometric template value with the session template value [ml the evaluation of the difference between the two template values against preset criteria followed by acceptance as a biometric match or rejection as a non-match thereby providing for simultaneous mutual authentication by conventional biometric means at the device reading apparatus 16 A method and apparatus for the biometric authentication of a system and a the registered user of that system by means of a data carrying device recording identification data and other data related to that system user comprising the following steps: [a] the allocation of random codes to a data carrying device issued to the registered system user and to the system [b] the capture of a biometric image of the system user [c] the reduction of such image by means of an algorithm to a biometric template value in a format suited to comparison with other values in the same format [d] the amalgamation of such biometric template value to a part of the code recorded on the system but not on the data carlying device [e] the subsequent introduction of the data carrying device at a device reading apparatus connected to the system [f] the sending of said identification data together with a new random code to the system [g] the sending by the system of a first code derived from recorded data related to the system user to the device reading apparatus [h] the verification of such first code at the device reading apparatus from data recorded on the data carrying card to provide the authentication of the system to the system user prior to any input by the system user [h] the generation of a second code derived from the data carrying device to be sent to the system for comparison with the code on the system with the biometric template value [i] the extraction of the differential between the second code and code on the system to reveal the biometric template value U] the recording of a session biometric image capture [ic] the reduction of such image to a session template value by application of the same algorithm as at [c] [k] the amalgamation of such session template value to a part of the code recorded on the data carrying device to provide a third code [1] the sending of the third code to the system [mJ the extraction at the system of the session template value all three such codes being determined as described and additionally by variations of elements of the recorded data by reference to an algorithm and determinant recorded on the data carrying device and on the system referenced in part to a specified time and date for the attempted authentication and both incorporating the new random code by exclusive/or logic gate and thereby resulting in first, second and third codes which vary on every occasion of use [n] the comparison of the biometric template value with the session template value [oJ the evaluation of the difference between the two template values against preset criteria followed by acceptance as a biometric match or rejection as a non-match thereby providing for prior authentication of the system followed by conventional biometric authentication.</p><p>Amendments to the claims have been filed as follows 1 A method and apparatus for the authentication of a system to the holder of a data carrying device recording identification data and other data related to a registered user of that system, wherein subsequent to the introduction of the data carrying device at a device reading apparatus connected to the system and the sending of said identification data to the system, the system sends, from recorded data related to the registered system user, a first code to the device reading apparatus which is compared with a second code derived from the data carrying device, thereby providing for the authentication of the system by reference to a preset differential between the two codes.</p><p>2 The method and apparatus of Claim I wherein the codes comprise predetermined variations of elements of the recorded data such that both the first code and the second code vary on each occasion of use without affecting the resultant differential. * .</p><p>: ,2 3 The method and apparatus of Claim 2 wherein the variations of the S...</p><p>*:. elements of the recorded data are determined by reference to an algorithm and determinant recorded on the data carrying device and the system.</p><p>*...S. * .</p><p>* 4 The method and apparatus of Claim 3 wherein the algorithm and determinant provide for variations related to a specified time and date for the attempted authentication.</p><p>A method and apparatus for the authentication of a system to the holder of a data carrying device recording identification data and other data related to a registered user of that system, wherein subsequent to the introduction of the data carrying device at a device reading apparatus connected to the system and the sending of said identification data to the system, the system sends, from recorded data related to the system user, a first code to the device reading apparatus which is compared with a second code derived from the data carrying device, both such codes being determined by variations of elements of the recorded data by reference to an algorithm and determinant recorded on the data carrying device and on the system referenced in part to a specified time and date for the attempted authentication, thereby resulting in first and second codes which vary on every occasion of use and providing for the authentication of the system by reference to a preset differential between the two codes.</p><p>6 The method and apparatus of aain 5 wherein fixed personal identification data is entered by the system user at the device reading apparatus and applied by a predetermined algorithm to the second code derived from the data carrying device, thereby providing for simultaneous mutual authentication of system and system user by reference to a combination of the fixed personal identification data and to a preset differential between the first and second codes * I 7 The method and apparatus of Claim 5 wherein the differential comprises : * :: . the binary value of a facial representation of the system user which is displayed * =D at the device reading apparatus for comparison with the person presenting the *.: data carrying device, thereby providing for simultaneous mutual authentication of system and system user.</p><p>8 The method and apparatus of Claim 5 wherein additionally the differential in addition comprises the binary value of a representation of the system user's signature, which is additionally displayed at the device reading apparatus for comparison with a specimen signature provided by that person.</p><p>9 The method and apparatus of Claim 5 wherein additionally the differential comprises the binary value of a representation of other personal data related to the system user, which is displayed at the device reading apparatus for verification of a part of that personal data by input or disclosure by that person.</p><p>10 The method and apparatus of Claim 5 wherein the differential comprises the binary value of biometric data of the system user, previously captured and reduced by an appropriate algorithm to form a template for subsequent biometric data capture matching and being amalgamated by exclusive/or logic gate onto a part of the first code, such template being recovered as the differential being compared with a temporary template derived from an actual biometric image reduced by the same algoritlun after capture at the time of the attempted authentication by a biometric capture device linked to the device reading apparatus,. thereby providing for simultaneous mutual authentication of system and system user by conventional biometric verification.</p><p>:. 11 The method and apparatus of Claim I wherein a new random code is sent from the device reading apparatus with the identification data to the 0** system and amalgamated using an exclusive/or logic gate into both the first :.::: code and the second code without affecting the resultant differential. )</p><p>12 The method and apparatus of Claims 11 wherein a predetermined fixed : personal identification data is entered by the system user at the device reading apparatus and applied by a predetermined algorithm to the second code derived from the data carrying device, thereby providing for simultaneous mutual authentication of system and system user by fixed personal identification data and the resultant differential between the two codes.</p><p>13 The method and apparatus of Claim ii wherein the differential comprises the binary value of a facial representation of the system user which is displayed at the device reading apparatus for comparison with the person presenting the data carrying device, thereby providing for simultaneous mutual authentication of system and system user.</p><p>14 The method and apparatus of Claim 11 wherein additionally the differential in addition comprises the binary value of a representation of the system user's signature, which is additionally displayed at the device reading apparatus for comparison with a specimen signature provided by that person.</p><p>15 The method and apparatus of Claim 11 wherein additionally the differential comprises the binary value of a representation of other personal data related to the system user, which is displayed at the device reading apparatus for verification of a part of that personal data by input or disclosure by that person.</p><p>16 The method and apparatus of Claim 11 wherein the differential :..::: comprises the binary value of biometric data of the system user, previously captured and reduced by an appropriate algorithm to form a template for :.:::s subsequent biometric data capture matching and being amalgamated by 2O exclusive! or logic gate onto a part of the first code, such template being recovered as the differential being compared with a temporary template derived from an actual biometric image reduced by the same algorithm after capture at the time of the attempted authentication by a biometric capture device linked to the device reading apparatus, thereby providing for simultaneous mutual authentication of system and system user by conventional biometric verification.</p><p>17 A method and apparatus for the simultaneous mutual biometric authentication of a system and a the registered user of that system by means of a data carrying device recording identification data and other data related to that system user comprising the following steps: act [al the allocation of random codes to a data carrying device issued to the registered system user and to the system [b] the capture of a biometric image of the system user Ic] the reduction of such image by means of an algorithm to a biometric template value in a format suited to comparison with other values in the same format [d] the amalgamation of such biometric template value to a part of a code recorded on the system but not on the data carrying device [e] the subsequent introduction of the data carrying device at a device reading apparatus connected to the system [fJ the sending of said identification data together with a new random code to the system [g] the sending by the system of a first code derived from recorded data related to the system user to the device reading apparatus Eh] the generation of a second code derived from the data carrying device both such codes being determined by variations of elements of the recorded data by reference to an algorithm and determinant recorded on **S.</p><p>the data carrying device and on the system referenced in part to a specified time and date for the attempted authentication and both *) incorporating the new random code by exclusive/or logic gate and thereby resulting in first and second codes which vary on every occasion of use [ii the comparison of first and second codes by exclusive/or logic gate and thereby deriving a differential between the two codes being the biometric template value IJI the recording of a session biometric image capture [kJ the reduction of such image to a session template by application of the same algorithm as at Ic] [I] the comparison of the biometric template value with the session template value Em] the evaluation of the difference between the two template values against preset criteria followed by acceptance as a biometric match or rejection as a non-match thereby providing for simultaneous mutual authentication by conventional biometric means at the device reading apparatus 18 The method and apparatus of Claim I wherein the differential relates to the binary value of data residing on the system database and specified by the system user together with the user's identification code, such binary value being amalgamated by the system with the first code by exclusive/or logic gate arid thereafter being retrieved by the system user by exclusive/or logic gate amalgamation between the first and second codes.</p><p>19 The method and apparatus of Claim 5 wherein the differential relates to the binary value of data residing on the system database and specified by the :. system user together with the user's identification code, such binary value being amalgamated by the system with the first code by exclusive/or logic gate and thereafter being retrieved by the system user by exclusive/or logic gate :.::* amalgamation between the first and second codes. * t)</p><p>: 20 The method and apparatus of Claim 12 wherein the differential relates to the binary value of data residing on the system database and specified by the system user together with the user's identification code, such binary value being amalgamated by the system with the first code by exclusive/or logic gate and thereafter being retrieved by the system user by exclusive/or logic gate amalgamation between the first and second codes.</p>
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0623445A GB2435533B (en) | 2006-11-23 | 2006-11-23 | Integrated systems for simultaneous mutual authentication of database and user |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0623445A GB2435533B (en) | 2006-11-23 | 2006-11-23 | Integrated systems for simultaneous mutual authentication of database and user |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0623445D0 GB0623445D0 (en) | 2007-01-03 |
GB2435533A true GB2435533A (en) | 2007-08-29 |
GB2435533B GB2435533B (en) | 2008-03-05 |
Family
ID=37636431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0623445A Expired - Fee Related GB2435533B (en) | 2006-11-23 | 2006-11-23 | Integrated systems for simultaneous mutual authentication of database and user |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2435533B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009130340A1 (en) * | 2008-04-26 | 2009-10-29 | Editores Asociados Sc | Two-factor security system and method for access to, and operation of, telematic banking or electronic commerce services by generating a different floating code for each transaction |
CN108833359A (en) * | 2018-05-22 | 2018-11-16 | 深圳市商汤科技有限公司 | Auth method, device, equipment, storage medium and program |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1992007436A1 (en) * | 1990-10-19 | 1992-04-30 | Security Dynamics Technologies, Inc. | Method and apparatus for personal identification |
EP1571525A1 (en) * | 2004-02-27 | 2005-09-07 | International Business Machines Corporation | A method, a hardware token, and a computer program for authentication |
US20060200855A1 (en) * | 2005-03-07 | 2006-09-07 | Willis Taun E | Electronic verification systems |
-
2006
- 2006-11-23 GB GB0623445A patent/GB2435533B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1992007436A1 (en) * | 1990-10-19 | 1992-04-30 | Security Dynamics Technologies, Inc. | Method and apparatus for personal identification |
EP1571525A1 (en) * | 2004-02-27 | 2005-09-07 | International Business Machines Corporation | A method, a hardware token, and a computer program for authentication |
US20060200855A1 (en) * | 2005-03-07 | 2006-09-07 | Willis Taun E | Electronic verification systems |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009130340A1 (en) * | 2008-04-26 | 2009-10-29 | Editores Asociados Sc | Two-factor security system and method for access to, and operation of, telematic banking or electronic commerce services by generating a different floating code for each transaction |
CN108833359A (en) * | 2018-05-22 | 2018-11-16 | 深圳市商汤科技有限公司 | Auth method, device, equipment, storage medium and program |
Also Published As
Publication number | Publication date |
---|---|
GB0623445D0 (en) | 2007-01-03 |
GB2435533B (en) | 2008-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080313726A1 (en) | Integrated systems for simultaneous mutual authentication of database and user | |
O'Gorman | Comparing passwords, tokens, and biometrics for user authentication | |
US7522751B2 (en) | System and method for protecting the privacy and security of stored biometric data | |
US8788837B2 (en) | Authenticated transmission of data | |
US6845453B2 (en) | Multiple factor-based user identification and authentication | |
US7024562B1 (en) | Method for carrying out secure digital signature and a system therefor | |
RU2263407C2 (en) | Data protection method | |
US20030101348A1 (en) | Method and system for determining confidence in a digital transaction | |
EP2513834B1 (en) | System and method for verifying the identity of an individual by employing biometric data features associated with the individual as well as a computer program product for performing said method | |
US20150188913A1 (en) | Method and apparatus for providing client-side score-based authentication | |
JP2009543176A (en) | Traceless biometric identification system and method | |
AU2008255382B2 (en) | Secure login protocol | |
WO2023036143A1 (en) | Decentralized zero-trust identity verification and authentication system and method | |
US7272245B1 (en) | Method of biometric authentication | |
US20070106903A1 (en) | Multiple Factor-Based User Identification and Authentication | |
EP2003590A1 (en) | Integrated systems for simultaneous mutual authentification of database and user | |
Mark et al. | A secured online voting system by using blockchain as the medium | |
GB2435533A (en) | Integrated systems for simultaneous mutual authentication of a database and a user | |
CA2608254C (en) | A system and method for protecting the privacy and security of stored biometric data | |
CN113191778A (en) | Identity authentication method and identity authentication device | |
KR20090046635A (en) | Method for aligning concealed fingerprint data using partial geometric hashing, method for authenticating fingerprint data using partial geometric hashing, apparatus and system thereof | |
Tams et al. | Current challenges for IT security with focus on Biometry | |
CN115150164A (en) | Request verification method and device, electronic equipment and computer-readable storage medium | |
JP2003122722A (en) | Generation/storage system of complex infinite one-time password by using file synchronization, and authentication system thereof | |
Hameed et al. | An Enhanced Framework of Hybrid Secure ATM Banking System for Developing Countries |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) | ||
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20101123 |