US20200287892A1 - Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity - Google Patents

Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity Download PDF

Info

Publication number
US20200287892A1
US20200287892A1 US16/790,394 US202016790394A US2020287892A1 US 20200287892 A1 US20200287892 A1 US 20200287892A1 US 202016790394 A US202016790394 A US 202016790394A US 2020287892 A1 US2020287892 A1 US 2020287892A1
Authority
US
United States
Prior art keywords
user
server
user device
transaction
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/790,394
Inventor
Ravi Ganesan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Prove Identity Inc
Original Assignee
Early Warning Services LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/938,245 external-priority patent/US8341236B1/en
Priority claimed from US13/011,739 external-priority patent/US8806592B2/en
Priority claimed from US13/011,587 external-priority patent/US8789153B2/en
Priority claimed from US13/736,944 external-priority patent/US10587683B1/en
Application filed by Early Warning Services LLC filed Critical Early Warning Services LLC
Priority to US16/790,394 priority Critical patent/US20200287892A1/en
Assigned to EARLY WARNING SERVICES, LLC reassignment EARLY WARNING SERVICES, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GANESAN, RAVI
Assigned to PAYFONE, INC. reassignment PAYFONE, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EARLY WARNING SERVICES, LLC
Publication of US20200287892A1 publication Critical patent/US20200287892A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Definitions

  • Embodiments of the invention relate to security and privacy, and specifically to the determination of the physical location and proximity of Internet users and devices in a way that enhances security and privacy.
  • geolocation information is useful for purposes such as marketing (e.g. to better target offers or advertisements) as well as fraud detection (e.g. if a user who normally checks their bank account from Wichita, Kans. is found to be logging in from East Europe, it might be reason enough for the bank to track the user's activities on the web site carefully).
  • IP geolocation When a user accesses a web site the only piece of information the web site knows is the user's origin IP address. To get from an IP address to a physical address requires the use of a technology known as IP geolocation. Ranges of IP addresses are assigned to Internet Service Providers who then make them available to end customers in different locales. For instance, the range 149.141.x.x might currently be in use by a particular ISP who is using that range in Alexandria, Va. IP geolocation technology essentially provides a reverse lookup on a database of a physical location given an IP address. The database is maintained by determining which ranges are in use in which locales and then updating the database as changes occur.
  • IP geolocation has two significant shortcomings. First, the database underlying the reverse look-up is largely static and has to be manually updated which can result in errors. Perhaps more critical is the second shortcoming in that IP geolocation identifies a user very precisely and ties them to a particular PC. For most uses of IP geolocation it is usually sufficient for a web site to know that the user is currently located, for example, in Alexandria, Va. Knowing that they are precisely at IP address 141.149.1.1, and storing that information, is a needless violation of the user's privacy and in general storing personally identifiable data, especially when not required, is a needless increase in costs and potential liability to the web site.
  • Embodiments of the invention combine privacy enhanced geolocation and proximity with transaction authentication.
  • a method comprises receiving from a web server a request for a transaction initiated at a user device.
  • the method further comprises transmitting to the user device a one-time password derived from a secret shared with the web server and details of the transaction.
  • the method further comprises receiving from one or more slave servers one or more messages originating from the user device and passing respectively through the one or more slave servers. Each of the messages indicates a time of travel of the respective message from the user device to the respective one slave servers.
  • the method further comprises, based on the times indicated in the one or more messages, estimating a location of the user device. In some embodiments, all of the steps are performed by a single master server.
  • the content of the one or more messages includes or is derived from the one-time password.
  • estimating the location of the user device comprises estimating an absolute geographic location of the user device.
  • estimating the location of the user device comprises estimating a relative location of the user device, in relation to at least one of the slave servers.
  • a method comprises receiving from a web server a request for a transaction initiated at a first user device, and transmitting to a second user device a one-time password derived from a secret shared with the web server and details of the transaction.
  • the method further comprises receiving from one or more slave servers a first set of one or more messages originating from the first user device and passing respectively through the one or more slave servers. Each of the messages indicates a time of travel of the respective message from the first user device to the respective one of the slave servers.
  • the method further comprises, based on the times indicated in the first set of one or more messages, estimating a location of the first user device. In some embodiments, all of the steps are performed by a single master server.
  • the content of the one or more messages includes or is derived from the one-time password.
  • estimating the location of the user device comprises estimating an absolute geographic location of the user device. In some embodiments, estimating the location of the user device comprises estimating a relative location of the user device, in relation to at least one of the slave servers.
  • the set of one or more messages is a first set of one or more messages
  • the method further comprises receiving from the one or more slave servers a second set of one or more messages originating from the second user device and passing respectively through the one or more slave servers, each of the messages indicating a time of travel of the respective message from the second user device to the respective one of the slave servers; and based on the times indicated in the first and second sets of one or more messages, estimating the geographic proximity of the first and second user devices.
  • all of the steps are performed by a single master server.
  • the first and second user devices are reciprocal slaves.
  • the content of the one or more messages in the second set includes or is derived from the one-time password.
  • a computerized system comprises a processor and memory.
  • the memory holds instructions that, when executed by the processor, cause the system to receive from a web server a request for a transaction initiated at a user device, and transmit to the user device or to a second user device a one-time password derived from a secret shared with the web server and details of the transaction.
  • the instructions further cause the system to receive from one or more slave servers one or more messages originating from the user device and passing respectively through the one or more slave servers, each of the messages indicating a time of travel of the respective message from the user device to the respective one of the slave servers.
  • the instructions further cause the system to, based on the times indicated in the one or more messages, estimate a location of the user device.
  • the content of the one or more messages includes or is derived from the one-time password.
  • the instructions, when executed by the processor cause the system to estimate an absolute geographic location of the user device.
  • the instructions, when executed by the processor cause the system to send the one-time password to the second user device.
  • the set of one or more messages is a first set of one or more messages
  • the instructions when executed by the processor, cause the system to receive from the one or more slave servers a second set of one or more messages originating from the second user device and passing respectively through the one or more slave servers, each of the messages indicating a time of travel of the respective message from the second user device to the respective one of the slave servers; and based on the times indicated in the first and second sets of one or more messages, estimate the geographic proximity of the first and second user devices.
  • the first and second user devices are reciprocal slaves.
  • FIG. 2 illustrates a system for implementing transaction authentication, according to embodiments of the invention.
  • FIG. 3 illustrates another system for implementing transaction authentication, according to embodiments of the invention.
  • FIG. 4 illustrates a log in accordance with embodiments of the invention.
  • FIG. 5 illustrates transaction authentication in accordance with embodiments of the invention.
  • FIG. 7 describes components for combining transaction authentication with privacy enhanced proximity and geolocation, in accordance with embodiments of the invention.
  • a more robust and less intrusive geolocation mechanism for IP geolocation than those described above uses a series of ‘slave’ servers sending traffic to a ‘master’ server via the user's browser or app, and then computing appropriate statistics to triangulate on location.
  • This technique also provides a solution to the ‘proximity’ problem. Namely, how can a web service, such as an on-line banking site tell if a user at a computer or ATM machine is in possession of a particular smartphone.
  • One approach, prone to technical difficulties is to have the smartphone and computer/ATM communicate.
  • a more robust mechanism is to use the triangulation scheme mentioned earlier but with reciprocal ‘slave’ servers located on the two devices.
  • the problem of transaction authentication we refer to is one of getting confirmation from an on-line user that they indeed placed the transaction that the web service receives.
  • One approach to achieving this in a convenient fashion uses a quasi out of band authentication system.
  • the user has an always on connection from a separate device to a security server.
  • the user starts this connection using regular out of band authentication using SMS or voice calls or email.
  • the web service sends the transaction to the security server which sends it to the separate device and the user can confirm or deny the transaction.
  • Our preferred embodiment includes the following components as shown in FIG. 1 :
  • Geolocation using an N-4Tk system is described in more detail in U.S. Pat. Nos. 8,341,236 and 8,589,459 both previously incorporated by reference, and measures the time taken to travel at a particular time for a message of size k among a number of devices over a network.
  • the process is initiated by the user browsing to a page at a web site that contains the N-4Tk client code.
  • This client code will typically be embedded behind the scenes of a page into which the user types in a UserID, or perhaps a CAPTCHA.
  • Several variations are possible here, but the general idea is to invoke the N-4Tk code at some point where the user is typing in characters. For simplicity of exposition we will assume here that the user is typing in their UserID.
  • each character in the UserID As the user types in each character in the UserID, the character is padded with k ⁇ 1 characters (say 0s) and sent to the web site, the Master, and the Slaves (the addresses of which are available to the client code). Subsequent characters are sent after receipt of an acknowledgement from the Master. Each character is time stamped at the last possible instant before being sent, and again time stamped at the first possible instant after being received. The difference between the two time stamps is a measure of the time taken for the message to travel from the user to the particular server (either Master or Slave). Each Slave forwards the message (with the time stamps) to the Master. The client sends a special “End of Transaction” character to indicate that the user has finished typing in the UserID.
  • the Master having received all the messages from the Slaves, as well as the messages sent to it directly, now has all the data needed to compute the N-4Tk location of the User. If the Master has not encountered this UserID (from this Web Site) before it, it records it, else, it might look up the historical record of N-4Tk locations for this user. It then returns its estimate of the locale of the user to the web site, or a risk score indicating the variance from the previously measured locale.
  • the Master computes the mean and standard deviation of the message time to each server for all the characters in the UserID. For instance, for a 15 character UserID, the Master in effect has a sample size of 15 measurements to each server. This allows it to get a better estimate than were it doing a single measurement.
  • An alternate metric that can be calculated is for the client code to request a message of size k from each Slave and then forward it to the Master. This measures the N-4Tk distance from each Slave to the Master via the User.
  • Alice and Bob are typing on respective smart devices. Perhaps Bob is a checkout clerk and Alice is a shopper. An identical process plays out, except that in case different users are doing the typing.
  • the two clients prefferably at a synchronized or at least similar point start sending padded characters to each other with or without any keystrokes actually being typed by either user, e.g. Alice and Bob press GO to start the process.
  • the same innovation can be used for more than two entities, perhaps taking advantage of the fact that if it is known that A is in proximity to B and B to C, then A and C are in proximity.
  • proximity may also be determined in an approximate or relative way, and the designation of a server as a master or a slave may be arbitrary in some embodiments.
  • the web server can be assured that the security server saw the same transaction it sent (i.e. not a transaction manipulated en route to the security server), and since the security server is showing the user the transaction in an independent channel, user confirmation of the transaction is obtained.
  • the pop-up or its substitute has the ability to store a history or log of these events. Such data can then be fed to risk management engines which today only have access to patterns of user activity which they observe from one or more web sites.
  • the security server calculates a one-time password as a function of (i) the secret it shares with the web site and (ii) the applicable transaction details displayed in the pop-up window, and displays the one-time password to the user in the pop-up window.
  • the user enters (perhaps by cutting and pasting) this one-time password onto the web page, which serves as the user's signature on the transaction, which is thereby transmitted to the web site.
  • the website confirms the authenticity of the signature by re-computing the one-time password from the secret it shares with the security server and the transaction details.
  • this system has all the security properties of one-time passwords, yet has the tremendous advantage that it does not require a shared secret with each user, and it is only the security server and the web sites that need shared secrets for the purpose of generating one-time passwords used as signatures on transactions.
  • the actual one-time password can, if desired, also be constructed based on a time stamp or a counter based OTP algorithm (in the way we use these algorithms the time or counter value needs to be communicated by the security server to the web site; or potentially computed deterministically using some agreed upon formula).
  • a further extension provides an application which allows the pop-up-window itself to reside on the user's smart phone, smart card or other small personal intelligent mobile network device, rather than on the network device, e.g. a desktop computer, being used to access the applicable website via its browser. For example, this is easily accomplished on a smart phone because the phone is already personalized and, in accordance with the techniques described above, does not need to store a special secret or execute one-time password software. Rather, only the website and the security server share the necessary secret and only the security server generates the one-time passwords required for user authentication and user signature.
  • embodiments allow us to provide augmented risk intelligence analysis.
  • conventional risk analysis relies on data from websites.
  • a log of data such as one of the type shown in FIG. 4 , capturing the user's activities while the pop-up window was active can be easily maintained.
  • the log could, for example, be maintained by the security server website, and the user can access this log. If desired the user or the security server can compute the user's risk profile.
  • the logged data can be forwarded to a third party risk engine, where it can be married with data received from websites visited by the user so that the risk engine can provide the user with an augmented risk intelligence analysis.
  • a further preferred embodiment allows for direct communications of authentication requests and transaction information between the website and the security server.
  • the user will first go through a set up and personalization phase which is a one-time process, and will then start up or activate the pop up using a technique such as out of band authentication.
  • the security server will have an active communication channel or session open to the user which it identifies by some user identifier, for instance the phone number used for out of band authentication. Further, the web site at which the user is transacting and the security server would have previously agreed on a shared secret.
  • the user using the browser selects a transaction, e.g. “Pay Alice $100”, which is transmitted by the user's browser) to the web server.
  • the web server transmits this transaction to the security server via a direct link that has been established between the web site and the security server (rather than via the user's browser).
  • the security server computes a one-time transaction signature as a function of (i) the transaction details and (ii) the secret it shares with that particular web site.
  • the security server then transmits this one-time transaction signature to the user's pop-up window.
  • the user cuts and pastes or otherwise copies this one-time transaction signature into the web browser and the signature is transmitted back to the web site.
  • the web site independently computes the transaction signature using (i) the transaction details and (ii) the secret it shares with the security server, and compares it with the one received from the user. If the two signatures match then the web server can be assured that the security server saw the same transaction it sent (i.e. not a transaction manipulated en route to the security server), and since the security server is showing the user the transaction in an independent channel or session, user confirmation of the transaction is obtained.
  • the pop-up can be implemented in one of a variety of different form factors.
  • One variety contemplates the pop-up window being on an application on a mobile device, another contemplates the window using a dedicated part of the display area of a personal mobile network device, such as a smart phone, and the last contemplates the pop-up window being embodied in dedicated hardware similar to that of a smartcard, which has communication capabilities.
  • all functionality will work in exactly the same fashion, except that the user can no longer cut and paste the one-time passwords used for authentication and would instead have to type them into the web browser operating on a different network device.
  • These form factors provide additional layers of security simply by being independent of the user's desktop computer running the browser.
  • the master server may receive messages of a predefined message size sent from a user network device. Each message includes a user input character. The master server also receives a time stamp associated with each message and corresponding to the time that message was sent by the user network device to the master server. The master server stamps each of the received messages with a time stamp corresponding to the time of receipt of that message at the master server. The master server further receives the same messages sent from a first slave server, and a time stamp associated with each message and corresponding to the time that message was sent by the user network device to the first slave server. The master server further receives a time stamp corresponding to the time of receipt of that message at the first slave server.
  • slave servers While the above examples are described using two slave servers, it will be recognized that any number of slave servers may be used, for example three, four, five, or more slave servers.
  • the master server receives a request from a network site to have a user of the user network device authenticated and first information.
  • the master server calculates a one-time password based on the first information and transmits the one-time password to another user network device.
  • the first user network device may be a desktop computer on which the user is initiating a transaction
  • the second user network device may be the user's cellular telephone.
  • the user may enter the one-time password into the desktop computer, authenticating the user.
  • the one-time password may not be shared with the user or with either of the user network devices.
  • the request to have the user authenticated may be received directly from the network site, as shown in FIG. 5 , or may be received indirectly from the network site via the first user network device, as shown in FIG. 3 .
  • the master server may also receive messages from each of the network devices sent via the other of the network devices. That is, the two network devices may act as reciprocal slaves. These message may be helpful to the master server to estimate whether the two network devices are in close proximity.
  • the master server may receive messages of a predefined message length sent from the second network device via the first network device, along with a time stamp corresponding to the time that each message was sent by the second network device to the first network device.
  • the master server also receives a time stamp corresponding to the time of receipt of each message at the first network device.
  • the master server receives the same messages sent from the first network device via the second network device, and a time stamp corresponding to the time that each message was sent by the first network device to the second network device.
  • the master server also receives a time stamp corresponding to the time that each message at the second network device.
  • the one-time password may be transmitted to the user of the network device from which a transaction was initiated, for entry by the user of the user network device onto a network page associated with the network site and displayed on the user network device.
  • the network site may then subsequently verify the one-time password to authenticate the user.
  • the direction of message transmission may be reversed from that described above.
  • the master server receives messages sent from the user network device through two slave servers, and uses the sending and receipt times to geolocate the user network device.
  • the messages may originate at the slave servers and may be sent through the user network device to the master server.
  • Time stamps corresponding to the times of sending the messages from the slave servers and the times of receipt of the messages by the user network device are forwarded to the master server, which can geolocate the user network device based transmission times computed from the time stamps.
  • the authentication steps may be performed similarly to the authentication steps described above.
  • a security server receives transaction information representing a transaction between a network user and a network site.
  • the security server calculates a one-time password based on (i) the received transaction information and (ii) a secret shared by the security server and the network site, but not by the user.
  • the one-time password is independently calculable by the network site based on the shared secret and the transaction information.
  • the security server then transmits the calculated one-time password to a first user network device, for presentation on a window displayed by the first user network device and entry by the user onto a network page associated with the network site and displayed on a second user network device.
  • the security server further receives messages of a predefined message size sent from one of the user network devices. Each message includes a user input character.
  • the security server also receives a time stamp corresponding to the time that each message was sent by the one of the user network devices to the security server.
  • the security server stamps each of the received messages with a time stamp corresponding to the time of receipt of that message at the security server.
  • the security server computes the time taken to communicate the messages (i) from the one of the user network devices to the master server, (ii) from the one of the user network devices to the first slave server, and (iii) from the one of the user network devices to the second slave server. Based on the computed times, the security server can determine a geographic location of the one of the user network devices.
  • the security server also receives a time stamp corresponding to the time of receipt of each message at the other of the user network devices. Based on the time stamps, the security server can compute the time taken to communicate the messages (i) from the one of the user network devices to the other of the user network devices, and (ii) from the other of the user network devices to the one of the user network devices. Based on the computed times, the security server can determine a proximity of the two user network devices to each other.
  • different servers may be used for the transaction security server and the geolocation/proximity master server.
  • out of band or quasi out of band transaction authentication may be practiced with geolocation, proximity determination, or both.
  • geolocation or proximity location or both may be practiced with out of band or quasi out of band transaction authentication involving two user network devices or a single user network device. Other combinations are possible.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Transaction authentication with techniques and geolocation are combined to provide privacy and security enhanced geolocation. In an example implementation, a user initiates a transaction at a web service which in turns triggers a security server. The security server uses its always on connection with the combined client on user security device to perform geolocation, proximity and transaction authentication. These results may be used by the web service to make a decision on whether to proceed with the transaction.

Description

  • This application is a continuation application of pending U.S. patent application Ser. No. 15/422,137, filed Feb. 1, 2017, which is a continuation-in-part of pending U.S. patent application Ser. No. 13/736,944, filed Jan. 9, 2013, which is a continuation-in-part of U.S. patent application Ser. No. 13/669,123, filed Nov. 5, 2012, (now U.S. Pat. No. 8,589,459), which is a continuation of U.S. patent application Ser. No. 12/938,245, filed Nov. 2, 2010, (now U.S. Pat. No. 8,341,236), which claims the benefit of Provisional U.S. Application No. 61/257,190, filed Nov. 2, 2009 and entitled “Project Hawk”, and this application is a continuation-in-part of pending U.S. patent application Ser. No. 15/015,592, filed Feb. 4, 2016 and published Jun. 2, 2016 as U.S. Patent Application Publication No. 2016/0156620, which is a continuation of U.S. patent application Ser. No. 14/330,025, filed Jul. 14, 2014, (now U.S. Pat. No. 9,325,702), which is a continuation of U.S. patent application Ser. No. 13/011,739, filed Jan. 21, 2011 (now U.S. Pat. No. 8,806,592), which is a continuation-in-part of U.S. patent application Ser. No. 13/011,587, filed Jan. 21, 2011 (now U.S. Pat. No. 8,789,153), which claims the benefit of Provisional U.S. Application No. 61/298,551, filed Jan. 27, 2010, and the contents of all of the above-identified applications are hereby incorporated by reference herein in their entirety.
  • FIELD OF THE INVENTION
  • Embodiments of the invention relate to security and privacy, and specifically to the determination of the physical location and proximity of Internet users and devices in a way that enhances security and privacy.
  • BACKGROUND OF THE INVENTION
  • Companies running web sites often have good reason to try to ascertain the physical location (or geolocation) of the user accessing their sites. Such geolocation information is useful for purposes such as marketing (e.g. to better target offers or advertisements) as well as fraud detection (e.g. if a user who normally checks their bank account from Wichita, Kans. is found to be logging in from East Europe, it might be reason enough for the bank to track the user's activities on the web site carefully).
  • When a user accesses a web site the only piece of information the web site knows is the user's origin IP address. To get from an IP address to a physical address requires the use of a technology known as IP geolocation. Ranges of IP addresses are assigned to Internet Service Providers who then make them available to end customers in different locales. For instance, the range 149.141.x.x might currently be in use by a particular ISP who is using that range in Alexandria, Va. IP geolocation technology essentially provides a reverse lookup on a database of a physical location given an IP address. The database is maintained by determining which ranges are in use in which locales and then updating the database as changes occur.
  • IP geolocation has two significant shortcomings. First, the database underlying the reverse look-up is largely static and has to be manually updated which can result in errors. Perhaps more critical is the second shortcoming in that IP geolocation identifies a user very precisely and ties them to a particular PC. For most uses of IP geolocation it is usually sufficient for a web site to know that the user is currently located, for example, in Alexandria, Va. Knowing that they are precisely at IP address 141.149.1.1, and storing that information, is a needless violation of the user's privacy and in general storing personally identifiable data, especially when not required, is a needless increase in costs and potential liability to the web site.
  • An alternate method already prevalent in smartphones, and some computers, is to have a program on the phone to report the GPS coordinates of the user. Such GPS systems also provide more precise location data than is needed in most cases, and moreover cannot necessarily be used for fraud detection. This is because the GPS coordinates are self-reported by the software on the smartphone and consequently can fairly easily be thwarted by an attacker.
  • SUMMARY DISCLOSURE OF THE INVENTION
  • Embodiments of the invention combine privacy enhanced geolocation and proximity with transaction authentication.
  • According to one aspect, a method comprises receiving from a web server a request for a transaction initiated at a user device. The method further comprises transmitting to the user device a one-time password derived from a secret shared with the web server and details of the transaction. The method further comprises receiving from one or more slave servers one or more messages originating from the user device and passing respectively through the one or more slave servers. Each of the messages indicates a time of travel of the respective message from the user device to the respective one slave servers. The method further comprises, based on the times indicated in the one or more messages, estimating a location of the user device. In some embodiments, all of the steps are performed by a single master server. In some embodiments, the content of the one or more messages includes or is derived from the one-time password. In some embodiments, estimating the location of the user device comprises estimating an absolute geographic location of the user device. In some embodiments, estimating the location of the user device comprises estimating a relative location of the user device, in relation to at least one of the slave servers.
  • According to another aspect, a method comprises receiving from a web server a request for a transaction initiated at a first user device, and transmitting to a second user device a one-time password derived from a secret shared with the web server and details of the transaction. The method further comprises receiving from one or more slave servers a first set of one or more messages originating from the first user device and passing respectively through the one or more slave servers. Each of the messages indicates a time of travel of the respective message from the first user device to the respective one of the slave servers. The method further comprises, based on the times indicated in the first set of one or more messages, estimating a location of the first user device. In some embodiments, all of the steps are performed by a single master server. In some embodiments, the content of the one or more messages includes or is derived from the one-time password. In some embodiments, estimating the location of the user device comprises estimating an absolute geographic location of the user device. In some embodiments, estimating the location of the user device comprises estimating a relative location of the user device, in relation to at least one of the slave servers. In some embodiments, the set of one or more messages is a first set of one or more messages, and the method further comprises receiving from the one or more slave servers a second set of one or more messages originating from the second user device and passing respectively through the one or more slave servers, each of the messages indicating a time of travel of the respective message from the second user device to the respective one of the slave servers; and based on the times indicated in the first and second sets of one or more messages, estimating the geographic proximity of the first and second user devices. In some embodiments, all of the steps are performed by a single master server. In some embodiments, the first and second user devices are reciprocal slaves. In some embodiments, the content of the one or more messages in the second set includes or is derived from the one-time password.
  • According to another aspect, a computerized system comprises a processor and memory. The memory holds instructions that, when executed by the processor, cause the system to receive from a web server a request for a transaction initiated at a user device, and transmit to the user device or to a second user device a one-time password derived from a secret shared with the web server and details of the transaction. The instructions further cause the system to receive from one or more slave servers one or more messages originating from the user device and passing respectively through the one or more slave servers, each of the messages indicating a time of travel of the respective message from the user device to the respective one of the slave servers. The instructions further cause the system to, based on the times indicated in the one or more messages, estimate a location of the user device. In some embodiments, the content of the one or more messages includes or is derived from the one-time password. In some embodiments, the instructions, when executed by the processor, cause the system to estimate an absolute geographic location of the user device. In some embodiments, the instructions, when executed by the processor, cause the system to send the one-time password to the second user device. In some embodiments, the set of one or more messages is a first set of one or more messages, and the instructions, when executed by the processor, cause the system to receive from the one or more slave servers a second set of one or more messages originating from the second user device and passing respectively through the one or more slave servers, each of the messages indicating a time of travel of the respective message from the second user device to the respective one of the slave servers; and based on the times indicated in the first and second sets of one or more messages, estimate the geographic proximity of the first and second user devices. In some embodiments, the first and second user devices are reciprocal slaves.
  • Additional aspects, advantages, and novel features of the present invention will become apparent to those skilled in the art from this disclosure, including the following detailed description, as well as by practice of the invention. While the invention is described below with reference to preferred embodiment(s), it should be understood that the invention is not limited thereto. Those of ordinary skill in the art having access to the teachings herein will recognize additional implementations, modifications, and embodiments, as well as other fields of use, which are within the scope of the invention as disclosed and claimed herein and with respect to which the invention could be of significant utility.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 describes the components for privacy enhanced geolocation, according to embodiments of the invention.
  • FIG. 2 illustrates a system for implementing transaction authentication, according to embodiments of the invention.
  • FIG. 3 illustrates another system for implementing transaction authentication, according to embodiments of the invention.
  • FIG. 4 illustrates a log in accordance with embodiments of the invention.
  • FIG. 5 illustrates transaction authentication in accordance with embodiments of the invention.
  • FIG. 6 illustrates transaction authentication in accordance with embodiments of the invention.
  • FIG. 7 describes components for combining transaction authentication with privacy enhanced proximity and geolocation, in accordance with embodiments of the invention.
  • PREFERRED EMBODIMENTS OF THE INVENTION
  • A more robust and less intrusive geolocation mechanism for IP geolocation than those described above uses a series of ‘slave’ servers sending traffic to a ‘master’ server via the user's browser or app, and then computing appropriate statistics to triangulate on location. This technique also provides a solution to the ‘proximity’ problem. Namely, how can a web service, such as an on-line banking site tell if a user at a computer or ATM machine is in possession of a particular smartphone. One approach, prone to technical difficulties is to have the smartphone and computer/ATM communicate. A more robust mechanism is to use the triangulation scheme mentioned earlier but with reciprocal ‘slave’ servers located on the two devices.
  • The problem of transaction authentication we refer to is one of getting confirmation from an on-line user that they indeed placed the transaction that the web service receives. One approach to achieving this in a convenient fashion uses a quasi out of band authentication system. Here the user has an always on connection from a separate device to a security server. The user starts this connection using regular out of band authentication using SMS or voice calls or email. When the user initiates a transaction at say their computer, the web service sends the transaction to the security server which sends it to the separate device and the user can confirm or deny the transaction.
  • In this disclosure we show how the geolocation of a user based on an analysis of traffic to and from their device to a series of external servers can be married to a quasi out of band architecture to further enhance the security of transaction authentication.
  • Geolocation
  • Our preferred embodiment includes the following components as shown in FIG. 1:
      • a web site which is using the N-4Tk system which serves up the page containing the N-4Tk code to the user's browser or smartphone app;
      • a user's PC that is being geolocated and on which the N-4Tk client code runs;
      • a Master server which will compute the geolocation and report back to the web server; and
      • N-1 geographically distributed Slaves in the system.
  • Geolocation using an N-4Tk system is described in more detail in U.S. Pat. Nos. 8,341,236 and 8,589,459 both previously incorporated by reference, and measures the time taken to travel at a particular time for a message of size k among a number of devices over a network. The process is initiated by the user browsing to a page at a web site that contains the N-4Tk client code. This client code will typically be embedded behind the scenes of a page into which the user types in a UserID, or perhaps a CAPTCHA. Several variations are possible here, but the general idea is to invoke the N-4Tk code at some point where the user is typing in characters. For simplicity of exposition we will assume here that the user is typing in their UserID.
  • As the user types in each character in the UserID, the character is padded with k−1 characters (say 0s) and sent to the web site, the Master, and the Slaves (the addresses of which are available to the client code). Subsequent characters are sent after receipt of an acknowledgement from the Master. Each character is time stamped at the last possible instant before being sent, and again time stamped at the first possible instant after being received. The difference between the two time stamps is a measure of the time taken for the message to travel from the user to the particular server (either Master or Slave). Each Slave forwards the message (with the time stamps) to the Master. The client sends a special “End of Transaction” character to indicate that the user has finished typing in the UserID.
  • The Master having received all the messages from the Slaves, as well as the messages sent to it directly, now has all the data needed to compute the N-4Tk location of the User. If the Master has not encountered this UserID (from this Web Site) before it, it records it, else, it might look up the historical record of N-4Tk locations for this user. It then returns its estimate of the locale of the user to the web site, or a risk score indicating the variance from the previously measured locale.
  • To account for processing delays on the User's PC or local network, which would uniformly delay all the messages, the Master can be set up to take note of unusual delays affecting messages to all the servers and adjust the metric accordingly. The Master can also examine the delays between keystrokes to look for unusual patterns.
  • In all these calculations the Master computes the mean and standard deviation of the message time to each server for all the characters in the UserID. For instance, for a 15 character UserID, the Master in effect has a sample size of 15 measurements to each server. This allows it to get a better estimate than were it doing a single measurement.
  • An alternate metric that can be calculated is for the client code to request a message of size k from each Slave and then forward it to the Master. This measures the N-4Tk distance from each Slave to the Master via the User.
  • The Master can additionally require the Slaves to periodically directly send it messages so that it can compute a 4Tk direct distance from itself to the Slaves, and use that information to refine the metrics calculated above.
  • The accuracy of all of the above metrics improve as the number of Slaves increases, however, this brings additional costs and latency. One approach is to iteratively “close in” on the user by using a different set of Slaves in each iteration. For instance the system could first hone in on the country of origin, next the major metro area and then close in on the specific locale.
  • Finally, such a system that is making calculations for a large number of users (perhaps for multiple web sites) is in effect calculating a ‘time of day’ sensitive bandwidth map of the Internet as a side effect. This information can be used for intelligent placement of caches or routing of traffic.
  • In some embodiments, the system may determine the absolute geographic location of the user's device as precisely as possible. In other embodiments, the system may not determine a precise or absolute geographic location of the user's device, but may instead provide approximate or even relative geographic information. For example, rather than determining that a user's smart phone is in Alexandria, Va., it may be sufficient to simply determine that the device is west of the Atlantic Ocean. In another example, it may be sufficient to determine that a user's device is simply north of a particular one of the slave servers.
  • And while certain servers have been referred to as being either a master or slave, these designations may be arbitrary in some embodiments. Any one of the servers may act as the master or as a slave at different times. For example, the servers may share the computational burden of the geolocation process by designating a different one of the servers as the master for different transactions.
  • Proximity
  • Our preferred embodiment includes the following components:
      • a web site which is using the N-4Tk system which serves up the page containing the N-4Tk code to the user's browser or smartphone app;
      • each user's device that is being geolocated running the N-4Tk client code and running an instance of the N-4Tk slave;
      • a Master server which will compute the geolocation and report back to the web server; and
      • N-1 geographically distributed Slaves in the system.
  • Proximity determination is described in more detail in U.S. patent application Ser. No. 13/736,944, filed Jan. 9, 2013 and previously incorporated by reference. We first consider the two entity proximity case. In our first example Alice is at an ATM machine performing a transaction. During the course of this transaction she is performing key entry into the ATM machine. The back end system, which is aware that Alice has a smartphone with an appropriate client installed, sends a confirmation message to Alice. Alice is asked to enter a few characters she reads off the ATM machine into the client. As Alice is performing data entry at two devices that are in close proximity it might appear that it is immediately possible to use the 4Tk statistics to determine that Alice and the ATM are in close proximity. However, this may not take into account that the ATM might have a high speed connection to the Internet, whereas Alice's smartphone might have a much slower speed 3G connection traveling along a different path.
  • The key innovation to solve this problem is to make both the ATM machine and the client on Alice's smartphone reciprocal slaves. i.e. when Alice types into the ATM machine some of the characters are making their way to her smartphone from the ATM, and conversely when she is typing into the smartphone, some of the characters are making their way into the ATM machine. Now these messages are travelling the same distance over equivalent networks in both directions, and it is consequently possible to get a far more accurate reading of the proximity of the ATM machine and Alice. While messages passing through the various other slaves are also considered, the system may pay special attention to the timing of the message sent between the reciprocal slaves. For example, the travel times of messages between the reciprocal slaves may be given higher weightings than the travel times of other messages in a statistical estimation of the proximity of the two slave servers.
  • In our next example Alice and Bob are typing on respective smart devices. Perhaps Bob is a checkout clerk and Alice is a shopper. An identical process plays out, except that in case different users are doing the typing.
  • It is possible for the two clients to at a synchronized or at least similar point start sending padded characters to each other with or without any keystrokes actually being typed by either user, e.g. Alice and Bob press GO to start the process.
  • The same innovation can be used for more than two entities, perhaps taking advantage of the fact that if it is known that A is in proximity to B and B to C, then A and C are in proximity.
  • As in the geolocation technique described above, proximity may also be determined in an approximate or relative way, and the designation of a server as a master or a slave may be arbitrary in some embodiments.
  • Transaction Authentication
  • Transaction authentication according to embodiments of the invention is described in more detail in U.S. Pat. Nos. 8,789,153, 8,806,592, and 9,325,702 and U.S. Patent Application Publication No. 2016/0156620, all previously incorporated by reference. In our preferred embodiment the user has a transaction authentication application, which preferably (but not necessarily) runs on a separate device from the device from which the user is initiating the transaction. For instance, the user is at a computer browsing the web, and has the transaction application running on their smartphone. The user authenticates themselves to the transaction authentication application using some method of strong authentication, preferably out of band authentication, at periodic intervals (e.g. once a month). When the user initiates a transaction at a web service, the web service forwards the transaction to a security server which communicates the transaction to the user via the transaction authentication application. The user then confirms or denies the transaction (or enters details about the transaction) at which point the security server lets the web service know the result.
  • A system for implementing a preferred embodiment of transaction authentication is shown in FIGS. 2 and 3, and comprises
      • a security server;
      • a pop-up window on the user's desktop;
      • a browser on the user's desktop; and
      • the web site at which the user is performing the transaction.
  • The user will first go through a set up and personalization phase which is a one-time process, and will then start up or activate the pop up using a technique such as out of band authentication. At this point the security server will have an active communication channel open to the user which it identifies by some user identifier, for instance the phone number used for out for band authentication. Further, the web site at which the user is transacting and the security server would have previously agreed on a shared secret.
  • The user using the browser selects a transaction, e.g. “Pay Alice $100”, which is transmitted by the browser to the web server. The web server transmits this transaction to the security server via the user's browser. The security server computes a one-time transaction signature as a function of (i) the transaction details and (ii) the secret it shares with that particular web site. The security server then transmits this one-time transaction signature to the user's pop-up window. The user cuts and pastes or otherwise copies this one-time transaction signature into the web browser and the signature is transmitted back to the web site. The web site independently computes the transaction signature using (i) the transaction details and (ii) the secret it shares with the security server, and compares it with the one received from the user. If the two signatures match then the web server can be assured that the security server saw the same transaction it sent (i.e. not a transaction manipulated en route to the security server), and since the security server is showing the user the transaction in an independent channel, user confirmation of the transaction is obtained.
  • In a second preferred transaction authentication embodiment, the pop-up is implemented in one of a variety of different form factors. One variety contemplates the pop-up window being on an application on a mobile device, another contemplates the window using a dedicated part of the display area of a personal mobile network device, such as a smart phone, and the last contemplates the pop-up window being embodied in dedicated hardware similar to that of a smartcard, which has communication capabilities. In all cases all functionality will work in exactly the same fashion, except that the user can no longer cut and paste the one-time passwords used for authentication and would instead have to type them into the web browser operating on a different network device. These form factors provide additional layers of security simply by being independent of the user's desktop computer running the browser.
  • In either the first or second preferred embodiment as a user performs multiple logins and transactions the pop-up or its substitute has the ability to store a history or log of these events. Such data can then be fed to risk management engines which today only have access to patterns of user activity which they observe from one or more web sites.
  • In summary, the binding is significantly strengthened between the user, the security server acting as an Identity Provider and the website which is the Relying Party in the case of transactions made over a network, such as the purchase of a product by a user at the website. Here, we assume that the security server and the web site have a priori agreed on a shared secret (the system is easily extended to use public key cryptography). Additionally, as shown in FIG. 3, we also assume that the user has used some method, for instance out-of-band authentication, to authenticate to the security server. When the user wishes to enter into a transaction at a website, such as the purchase of a product offered at the website or the transfer of funds from a bank account, the web site communicates transaction details (such as the type and amount of the transaction), which are presented both on a web page displayed to the user via the user's browser and on a pop-up window. Before proceeding with the transaction, the website requires authentication and confirmation of the transaction, or what is commonly referred to as a signature of the user on the transaction. Therefore, the web page additionally displays a blank for entry of the user's signature. Furthermore, the website also communicates a request for the user's signature on the identified transaction to the security server. The security server calculates a one-time password as a function of (i) the secret it shares with the web site and (ii) the applicable transaction details displayed in the pop-up window, and displays the one-time password to the user in the pop-up window. The user enters (perhaps by cutting and pasting) this one-time password onto the web page, which serves as the user's signature on the transaction, which is thereby transmitted to the web site. The website confirms the authenticity of the signature by re-computing the one-time password from the secret it shares with the security server and the transaction details. Here again, this system has all the security properties of one-time passwords, yet has the tremendous advantage that it does not require a shared secret with each user, and it is only the security server and the web sites that need shared secrets for the purpose of generating one-time passwords used as signatures on transactions. The actual one-time password can, if desired, also be constructed based on a time stamp or a counter based OTP algorithm (in the way we use these algorithms the time or counter value needs to be communicated by the security server to the web site; or potentially computed deterministically using some agreed upon formula).
  • A further extension provides an application which allows the pop-up-window itself to reside on the user's smart phone, smart card or other small personal intelligent mobile network device, rather than on the network device, e.g. a desktop computer, being used to access the applicable website via its browser. For example, this is easily accomplished on a smart phone because the phone is already personalized and, in accordance with the techniques described above, does not need to store a special secret or execute one-time password software. Rather, only the website and the security server share the necessary secret and only the security server generates the one-time passwords required for user authentication and user signature.
  • Finally, embodiments allow us to provide augmented risk intelligence analysis. In this regard, conventional risk analysis relies on data from websites. However, because of the flow of information, a log of data, such as one of the type shown in FIG. 4, capturing the user's activities while the pop-up window was active can be easily maintained. The log could, for example, be maintained by the security server website, and the user can access this log. If desired the user or the security server can compute the user's risk profile. Additionally, or alternatively, the logged data can be forwarded to a third party risk engine, where it can be married with data received from websites visited by the user so that the risk engine can provide the user with an augmented risk intelligence analysis.
  • A further preferred embodiment allows for direct communications of authentication requests and transaction information between the website and the security server.
  • As described with reference to FIGS. 5 and 6, the user will first go through a set up and personalization phase which is a one-time process, and will then start up or activate the pop up using a technique such as out of band authentication. At this point the security server will have an active communication channel or session open to the user which it identifies by some user identifier, for instance the phone number used for out of band authentication. Further, the web site at which the user is transacting and the security server would have previously agreed on a shared secret.
  • The user using the browser selects a transaction, e.g. “Pay Alice $100”, which is transmitted by the user's browser) to the web server. The web server transmits this transaction to the security server via a direct link that has been established between the web site and the security server (rather than via the user's browser). The security server computes a one-time transaction signature as a function of (i) the transaction details and (ii) the secret it shares with that particular web site. The security server then transmits this one-time transaction signature to the user's pop-up window. The user cuts and pastes or otherwise copies this one-time transaction signature into the web browser and the signature is transmitted back to the web site. The web site independently computes the transaction signature using (i) the transaction details and (ii) the secret it shares with the security server, and compares it with the one received from the user. If the two signatures match then the web server can be assured that the security server saw the same transaction it sent (i.e. not a transaction manipulated en route to the security server), and since the security server is showing the user the transaction in an independent channel or session, user confirmation of the transaction is obtained.
  • As will be recognized by those skilled in the art, the pop-up can be implemented in one of a variety of different form factors. One variety contemplates the pop-up window being on an application on a mobile device, another contemplates the window using a dedicated part of the display area of a personal mobile network device, such as a smart phone, and the last contemplates the pop-up window being embodied in dedicated hardware similar to that of a smartcard, which has communication capabilities. In all cases all functionality will work in exactly the same fashion, except that the user can no longer cut and paste the one-time passwords used for authentication and would instead have to type them into the web browser operating on a different network device. These form factors provide additional layers of security simply by being independent of the user's desktop computer running the browser.
  • While in the examples described above the user initiates a transaction using a browser, other techniques are possible. For example, a user may initiate a transaction using a software application specially installed on his or her device, rather than using browser.
  • Combining Transaction Authentication with Privacy Enhanced Proximity/Geolocation
  • In our preferred embodiment the following components described above are combined (see FIG. 7):
      • the security server also acting as the geolocation/proximity master server; and
      • the user has one application that contains the logic for geolocation, a ‘slave’ server for ‘proximity’ calculations, and the requisite code for transaction authentication.
  • One way in which the process could play out is as follows:
      • 1. User downloads combined client and performs bootstrap out of band authentication to establish always-on connection to the security server. As part of this process the user's geolocation is determined using the 4Tk techniques described earlier.
      • 2. User initiates transaction at a web service.
      • 3. Code embedded in the web service application initiates a connection to the security server to perform geolocation of the user during transaction initiation.
      • 4. Web service sends transaction to security server.
      • 5. Security server sends transaction to user security device.
      • 6. The security server initiates a connection to the combined application on the user's security device.
      • 7. The security service performs geolocation on the security device, and compares it to the device from which the transaction was initiated and checks the results.
      • 8. Coincident with above the security server runs the proximity process between the user transaction initiation device and the user security device and checks the results.
      • 9. Coincident with above the security server obtains user input on transaction confirmation.
  • In one specific implementation, the master server may receive messages of a predefined message size sent from a user network device. Each message includes a user input character. The master server also receives a time stamp associated with each message and corresponding to the time that message was sent by the user network device to the master server. The master server stamps each of the received messages with a time stamp corresponding to the time of receipt of that message at the master server. The master server further receives the same messages sent from a first slave server, and a time stamp associated with each message and corresponding to the time that message was sent by the user network device to the first slave server. The master server further receives a time stamp corresponding to the time of receipt of that message at the first slave server.
  • Similarly, the master server also receives another set of the same messages from a second slave server, along with time stamps corresponding to the time that each message was sent by the user network device to the second slave server, and the time that each message was received at the second slave server. The master server computes, based on the time stamps, the time taken to communicate the messages (i) from the user network device to the master server, (ii) from the user network device to the first slave server, and (iii) from the user network device to the second slave serve. Based on these computed times, the master server determines a geographic location of the user network device.
  • While the above examples are described using two slave servers, it will be recognized that any number of slave servers may be used, for example three, four, five, or more slave servers.
  • In addition, the master server receives a request from a network site to have a user of the user network device authenticated and first information. The master server calculates a one-time password based on the first information and transmits the one-time password to another user network device. For example, the first user network device may be a desktop computer on which the user is initiating a transaction, and the second user network device may be the user's cellular telephone. The user may enter the one-time password into the desktop computer, authenticating the user. As is explained above, the one-time password may not be shared with the user or with either of the user network devices.
  • In some embodiments, the one-time password may be used as or to generate the messages used in the geolocation. This technique may be particularly advantageous as the master server may generate the one-time password and may therefore know its length or other characteristics.
  • The request to have the user authenticated may be received directly from the network site, as shown in FIG. 5, or may be received indirectly from the network site via the first user network device, as shown in FIG. 3.
  • For further authentication, the master server may also receive messages from each of the network devices sent via the other of the network devices. That is, the two network devices may act as reciprocal slaves. These message may be helpful to the master server to estimate whether the two network devices are in close proximity.
  • For example, the master server may receive messages of a predefined message length sent from the second network device via the first network device, along with a time stamp corresponding to the time that each message was sent by the second network device to the first network device. The master server also receives a time stamp corresponding to the time of receipt of each message at the first network device.
  • Similarly, the master server receives the same messages sent from the first network device via the second network device, and a time stamp corresponding to the time that each message was sent by the first network device to the second network device. The master server also receives a time stamp corresponding to the time that each message at the second network device.
  • Based on the time stamps, the master server can compute the time taken to communicate the messages (i) from the second network device to the first network device, and (ii) from the first network device to the second network device. Based on the computed times, the master server can determine a geographic proximity of the first and second network devices to each other. The slaves on the user devices can receive messages using various technologies such as TCP/IP services or PUSH technology. For example, a slave on a user device may receive a message pushed to it, and may activate, in response to the receipt of the message, application software for time stamping and forwarding of the message to the geolocation master server. Other variants will be obvious to one skilled in the art. While messages passing through the various other slaves are also considered, the system may pay special attention to the timing of the message sent between reciprocal slaves. For example, the travel times of messages between the reciprocal slaves may be given higher weightings than the travel times of other messages in a statistical estimation of the proximity of the two slave servers.
  • In other embodiments, there may not be two user network devices involved in a transaction. For example, the one-time password may be transmitted to the user of the network device from which a transaction was initiated, for entry by the user of the user network device onto a network page associated with the network site and displayed on the user network device. The network site may then subsequently verify the one-time password to authenticate the user.
  • In the embodiments described above, the master server performs both the geolocation calculations, and calculates and transmits the one-time password. In other embodiments, these two functions may be performed by different servers. For example, one server may perform the geolocation at the behest of the network site, and another server may calculate and transmit the one-time password, also at the behest of the network site.
  • In other embodiments, the direction of message transmission may be reversed from that described above. For example, in the embodiments described above, the master server receives messages sent from the user network device through two slave servers, and uses the sending and receipt times to geolocate the user network device. In other embodiments, the messages may originate at the slave servers and may be sent through the user network device to the master server. Time stamps corresponding to the times of sending the messages from the slave servers and the times of receipt of the messages by the user network device are forwarded to the master server, which can geolocate the user network device based transmission times computed from the time stamps. The authentication steps may be performed similarly to the authentication steps described above.
  • Regardless of the direction of message transmission, it will be recognized that more than two slave servers may be used, for example three, four, five, or more slave servers.
  • In another specific implementation, a security server receives transaction information representing a transaction between a network user and a network site. The security server calculates a one-time password based on (i) the received transaction information and (ii) a secret shared by the security server and the network site, but not by the user. The one-time password is independently calculable by the network site based on the shared secret and the transaction information. The security server then transmits the calculated one-time password to a first user network device, for presentation on a window displayed by the first user network device and entry by the user onto a network page associated with the network site and displayed on a second user network device.
  • The security server further receives messages of a predefined message size sent from one of the user network devices. Each message includes a user input character. The security server also receives a time stamp corresponding to the time that each message was sent by the one of the user network devices to the security server. The security server stamps each of the received messages with a time stamp corresponding to the time of receipt of that message at the security server.
  • The security server also receives (i) the same messages from a first slave server, (ii) a time stamp associated with each message and corresponding to the time that message was sent by one of the user network devices to the first slave server, and (iii) a time stamp corresponding to the time of receipt of that message at the first slave server. Similarly, the security server also receives (i) the same messages from a second slave server, (ii) a time stamp associated with each message and corresponding to the time that message was sent by the one of the user network devices to the second slave server, and (iii) a time stamp corresponding to the time of receipt of that message at the second slave server. The security server computes the time taken to communicate the messages (i) from the one of the user network devices to the master server, (ii) from the one of the user network devices to the first slave server, and (iii) from the one of the user network devices to the second slave server. Based on the computed times, the security server can determine a geographic location of the one of the user network devices.
  • In another specific implementation, a security server receives transaction information representing a transaction between a network user and a network site. The security server calculates a one-time password based on (i) the received transaction information and (ii) a secret shared by the security server and the network site, but not by the user. The one-time password is independently calculable by the network site based on the shared secret and the transaction information. The security server then transmits the calculated one-time password to a first user network device, for presentation on a window displayed by the first user network device and entry by the user onto a network page associated with the network site and displayed on a second user network device.
  • The security server further receives, from one of the user network devices via a network, messages of a predefined message size sent from the other of the user network devices via the one of the user network devices, and a time stamp associated with each message and corresponding to the time that each message was sent by the other of the user network devices to the one of the user network devices. The security server also receives a time stamp corresponding to the time of receipt of each message at the one of the user network devices. Similarly, the security server receives, from the other of the user network devices, the same messages sent from the one of the user network devices via the other of the user network devices, and a time stamp associated with each message and corresponding to the time that each message was sent by the one of the user network devices to the other of the user network devices. The security server also receives a time stamp corresponding to the time of receipt of each message at the other of the user network devices. Based on the time stamps, the security server can compute the time taken to communicate the messages (i) from the one of the user network devices to the other of the user network devices, and (ii) from the other of the user network devices to the one of the user network devices. Based on the computed times, the security server can determine a proximity of the two user network devices to each other.
  • In other embodiments, different servers may be used for the transaction security server and the geolocation/proximity master server.
  • It should be noted that while three separate mechanisms are described above, the user input can be minimized if desired to a single transaction confirmation.
  • While preferred embodiments have been described, it is to be understood that any workable combination of the techniques and features discussed above is considered to be disclosed. For example, out of band or quasi out of band transaction authentication may be practiced with geolocation, proximity determination, or both. In another example, geolocation or proximity location or both may be practiced with out of band or quasi out of band transaction authentication involving two user network devices or a single user network device. Other combinations are possible.
  • While a detailed description of presently preferred embodiments of the invention has been given above, various alternatives, modifications, and equivalents will be apparent to those skilled in the art without varying from the spirit of the invention. Therefore, the above description should not be taken as limiting the scope of the invention, which is defined by the appended claims.

Claims (21)

1. (canceled)
2. A computerized system, comprising:
a processor; and
memory, the memory holding instructions that, when executed by the processor, cause the system to perform operations including:
receiving, from a web server, a request for a transaction initiated at a first user device;
transmitting, to a second user device, a one-time password derived at least in part from 1) a secret shared with the web server, and 2) details of the transaction;
receiving, from a first slave server, a first message originating from the first user device and passing through the first slave server, the message indicating a travel time of the first message from the first user device to the first slave server; and
receiving, from a second slave server, a second message originating from the second user device and passing through the second slave server, the second message indicating a travel time of the second message from the second user device to the second slave server; and
based on the travel times indicated in the first and second messages, estimating the geographic proximity of the first and second user devices.
3. The system of claim 2, wherein the first and second user devices are reciprocal slaves.
4. The system of claim 2, wherein the first slave server and the second slave server are different slave servers.
5. The system of claim 2, wherein estimating the location of the user device comprises estimating an absolute geographic location of the user device.
6. The system of claim 2, wherein the computerized system further comprises a master server, and the operations are performed by a processor at the master server.
7. The system of claim 6, wherein estimating the geographic proximity of the first and second user devices is further based on a travel time of a third message transmitted between the user device to the master server.
8. The system of claim 2, wherein estimating the geographic proximity of the first user device includes estimating a relative location of the first user device to the first slave server, and wherein estimating the geographic proximity of the second user device includes estimating a relative location of the second user device to the second slave server.
9. The system of claim 2, wherein estimating the geographic proximity of the first and second user devices includes estimating the geographic proximity of the first and second user devices with respect to each other.
10. The system of claim 2, wherein the content of the first message is derived from the one-time password.
11. The system of claim 2, wherein the one-time password is derived in part from one or more details of the transaction details including a type of the transaction and an amount of the transaction.
12. A method, comprising:
receiving, from a web server, a request for a transaction initiated at a first user device;
transmitting, to a second user device, a one-time password derived at least in part from 1) a secret shared with the web server, and 2) details of the transaction;
receiving, from a first slave server, a first message originating from the first user device and passing through the first slave server, the message indicating a travel time of the first message from the first user device to the first slave server; and
receiving, from a second slave server, a second message originating from the second user device and passing through the second slave server, the second message indicating a travel time of the second message from the second user device to the second slave server; and
based on the travel times indicated in the first and second messages, estimating the geographic proximity of the first and second user devices.
13. The method of claim 12, wherein the first and second user devices are reciprocal slaves.
14. The method of claim 12, wherein the first slave server and the second slave server are different slave servers.
15. The method of claim 12, wherein estimating the location of the user device comprises estimating an absolute geographic location of the user device.
16. The method of claim 12, wherein the computerized system further comprises a master server, and the operations are performed by a processor at the master server.
17. The method of claim 16, wherein estimating the geographic proximity of the first and second user devices is further based on a travel time of a third message transmitted between the user device to the master server.
18. The method of claim 12, wherein estimating the geographic proximity of the first user device includes estimating a relative location of the first user device to the first slave server, and wherein estimating the geographic proximity of the second user device includes estimating a relative location of the second user device to the second slave server.
19. The method of claim 12, wherein estimating the geographic proximity of the first and second user devices includes estimating the geographic proximity of the first and second user devices with respect to each other.
20. The method of claim 12, wherein the content of the first message is derived from the one-time password.
21. The method of claim 12, wherein the one-time password is derived in part from one or more details of the transaction details including a type of the transaction and an amount of the transaction.
US16/790,394 2009-11-02 2020-02-13 Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity Abandoned US20200287892A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/790,394 US20200287892A1 (en) 2009-11-02 2020-02-13 Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity

Applications Claiming Priority (11)

Application Number Priority Date Filing Date Title
US25719009P 2009-11-02 2009-11-02
US29855110P 2010-01-27 2010-01-27
US12/938,245 US8341236B1 (en) 2009-11-02 2010-11-02 Privacy and security enhanced internet geolocation
US13/011,739 US8806592B2 (en) 2011-01-21 2011-01-21 Method for secure user and transaction authentication and risk management
US13/011,587 US8789153B2 (en) 2010-01-27 2011-01-21 Method for secure user and transaction authentication and risk management
US13/669,123 US8589459B1 (en) 2009-11-02 2012-11-05 Privacy and security enhanced internet geolocation
US13/736,944 US10587683B1 (en) 2012-11-05 2013-01-09 Proximity in privacy and security enhanced internet geolocation
US14/330,025 US9325702B2 (en) 2010-01-27 2014-07-14 Method for secure user and transaction authentication and risk management
US15/015,592 US10284549B2 (en) 2010-01-27 2016-02-04 Method for secure user and transaction authentication and risk management
US15/422,137 US10581834B2 (en) 2009-11-02 2017-02-01 Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity
US16/790,394 US20200287892A1 (en) 2009-11-02 2020-02-13 Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US15/422,137 Continuation US10581834B2 (en) 2009-11-02 2017-02-01 Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity

Publications (1)

Publication Number Publication Date
US20200287892A1 true US20200287892A1 (en) 2020-09-10

Family

ID=58719692

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/422,137 Active 2031-02-15 US10581834B2 (en) 2009-11-02 2017-02-01 Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity
US16/790,394 Abandoned US20200287892A1 (en) 2009-11-02 2020-02-13 Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US15/422,137 Active 2031-02-15 US10581834B2 (en) 2009-11-02 2017-02-01 Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity

Country Status (1)

Country Link
US (2) US10581834B2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11470037B2 (en) 2020-09-09 2022-10-11 Self Financial, Inc. Navigation pathway generation
US11475010B2 (en) 2020-09-09 2022-10-18 Self Financial, Inc. Asynchronous database caching
US11630822B2 (en) * 2020-09-09 2023-04-18 Self Financial, Inc. Multiple devices for updating repositories
US11641665B2 (en) 2020-09-09 2023-05-02 Self Financial, Inc. Resource utilization retrieval and modification

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12058528B2 (en) 2020-12-31 2024-08-06 Prove Identity, Inc. Identity network representation of communications device subscriber in a digital domain

Family Cites Families (146)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5930474A (en) 1996-01-31 1999-07-27 Z Land Llc Internet organizer for accessing geographically and topically based information
US6249252B1 (en) 1996-09-09 2001-06-19 Tracbeam Llc Wireless location using multiple location estimators
US5874918A (en) 1996-10-07 1999-02-23 Lockheed Martin Corporation Doppler triangulation transmitter location system
JPH11338933A (en) 1998-05-21 1999-12-10 Micro Cabin:Kk Authentication system for transaction applicant in communication transaction
US6151631A (en) 1998-10-15 2000-11-21 Liquid Audio Inc. Territorial determination of remote computer location in a wide area network for conditional delivery of digitized products
IL128720A (en) 1999-02-25 2009-06-15 Cidway Technologies Ltd Method for certification of over the phone transactions
US6757740B1 (en) 1999-05-03 2004-06-29 Digital Envoy, Inc. Systems and methods for determining collecting and using geographic locations of internet users
US6748367B1 (en) 1999-09-24 2004-06-08 Joonho John Lee Method and system for effecting financial transactions over a public network without submission of sensitive information
US20050018611A1 (en) 1999-12-01 2005-01-27 International Business Machines Corporation System and method for monitoring performance, analyzing capacity and utilization, and planning capacity for networks and intelligent, network connected processes
JP2001175599A (en) 1999-12-15 2001-06-29 Metro Inc Authentication system
US6769030B1 (en) 2000-02-07 2004-07-27 International Business Machines Corporation Method and apparatus to evaluate and measure the optimal network packet size for file transfer in high-speed networks
US6684250B2 (en) 2000-04-03 2004-01-27 Quova, Inc. Method and apparatus for estimating a geographic location of a networked entity
WO2001090861A2 (en) 2000-05-25 2001-11-29 Echarge Corporation Secure transaction protocol
US6754470B2 (en) 2000-09-01 2004-06-22 Telephia, Inc. System and method for measuring wireless device and network usage and performance metrics
AU2002213430A1 (en) * 2000-09-28 2002-04-08 Ipdev Co. Method for simplified one-touch ordering of goods and services from a wired or wireless phone or terminal
US7296088B1 (en) 2000-11-17 2007-11-13 Microsoft Corporation System and method for determining the geographic location of internet hosts
US6947978B2 (en) 2000-12-29 2005-09-20 The United States Of America As Represented By The Director, National Security Agency Method for geolocating logical network addresses
US6983381B2 (en) 2001-01-17 2006-01-03 Arcot Systems, Inc. Methods for pre-authentication of users using one-time passwords
JP2002259344A (en) 2001-02-28 2002-09-13 Mitsubishi Electric Corp One-time password authentication system, portable telephone and user identification server
US6665611B1 (en) 2001-06-19 2003-12-16 Cisco Technology, Inc. System for discovering and maintaining geographic location information in a computer network to enable emergency services
WO2003014867A2 (en) 2001-08-03 2003-02-20 John Allen Ananian Personalized interactive digital catalog profiling
US20040030934A1 (en) 2001-10-19 2004-02-12 Fumio Mizoguchi User selectable authentication interface and universal password oracle
GB2382266B (en) 2001-11-14 2004-03-17 Toshiba Res Europ Ltd Data transmission system
US8301521B2 (en) 2001-11-14 2012-10-30 International Business Machines Corporation Mechanism for tracking traffic statistics on a per packet basis to enable variable price billing
JP2003186838A (en) 2001-12-20 2003-07-04 Sony Ericsson Mobilecommunications Japan Inc Password issuing system and authentication system
GB2387254B (en) 2002-04-05 2005-11-23 Armoursoft Ltd User authentication for computer systems
US7100204B1 (en) 2002-04-05 2006-08-29 International Business Machines Corporation System and method for determining network users' physical locations
US7606560B2 (en) 2002-08-08 2009-10-20 Fujitsu Limited Authentication services using mobile device
US20040203870A1 (en) 2002-08-20 2004-10-14 Daniel Aljadeff Method and system for location finding in a wireless local area network
US20040210536A1 (en) 2002-12-18 2004-10-21 Tino Gudelj Cross-domain transactions through simulated pop-ups
US8023958B2 (en) 2003-03-05 2011-09-20 Qualcomm Incorporated User plane-based location services (LCS) system, method and apparatus
US7421732B2 (en) 2003-05-05 2008-09-02 Nokia Corporation System, apparatus, and method for providing generic internet protocol authentication
US20050071417A1 (en) 2003-09-29 2005-03-31 Jeffrey Taylor Method and apparatus for geolocation of a network user
TW200522598A (en) 2003-12-19 2005-07-01 Iwics Inc Data transport protocol for a multi-station network
JP2005209083A (en) 2004-01-26 2005-08-04 Japan Telecom Co Ltd Service system, and communication system and communication method using the same
US20050172229A1 (en) 2004-01-29 2005-08-04 Arcot Systems, Inc. Browser user-interface security application
US20050254653A1 (en) 2004-05-14 2005-11-17 Proxim Corporation Pre-authentication of mobile clients by sharing a master key among secured authenticators
EP1761861A4 (en) 2004-06-28 2009-12-16 Nds Ltd System for proximity determination
US8296562B2 (en) 2004-07-15 2012-10-23 Anakam, Inc. Out of band system and method for authentication
US20080137554A1 (en) * 2004-12-17 2008-06-12 Findbase Llc Method Of Geographicallly Locating Network Addresses Incorporating Probabilities, Inference And Sets
US20060168259A1 (en) 2005-01-27 2006-07-27 Iknowware, Lp System and method for accessing data via Internet, wireless PDA, smartphone, text to voice and voice to text
JP2006221440A (en) 2005-02-10 2006-08-24 Hitachi Software Eng Co Ltd Authentication method
US8756099B2 (en) 2005-04-11 2014-06-17 Bill Me Later, Inc. Consumer processing system and method
US20060235795A1 (en) 2005-04-19 2006-10-19 Microsoft Corporation Secure network commercial transactions
US7619982B2 (en) 2005-04-25 2009-11-17 Cisco Technology, Inc. Active probe path management
US7961717B2 (en) 2005-05-12 2011-06-14 Iposi, Inc. System and methods for IP and VoIP device location determination
JP4794910B2 (en) 2005-05-30 2011-10-19 キヤノン株式会社 System having an electronic device having a plurality of interfaces and a host device, information processing device, electronic device, setup method for the system, control method for the electronic device, setup program, and control program
US7734912B2 (en) 2005-05-31 2010-06-08 Tricipher, Inc. Secure login using single factor split key asymmetric cryptography and an augmenting factor
GB0519842D0 (en) 2005-09-29 2005-11-09 Hewlett Packard Development Co Methods and apparatus for managing and using one-time pads
US8589532B2 (en) 2005-06-24 2013-11-19 Qualcomm Incorporated Apparatus and method for determining WLAN access point position
US7743409B2 (en) 2005-07-08 2010-06-22 Sandisk Corporation Methods used in a mass storage device with automated credentials loading
WO2007017878A2 (en) 2005-08-11 2007-02-15 Sandisk Il Ltd. Extended one-time password method and apparatus
ES2472273T3 (en) 2005-08-30 2014-06-30 Passlogy Co., Ltd Site Determination Procedure
JP2007102778A (en) 2005-10-04 2007-04-19 Forval Technology Inc User authentication system and method therefor
JP2007102777A (en) 2005-10-04 2007-04-19 Forval Technology Inc User authentication system and method therefor
US8447700B2 (en) 2005-10-11 2013-05-21 Amazon Technologies, Inc. Transaction authorization service
US8490168B1 (en) 2005-10-12 2013-07-16 At&T Intellectual Property I, L.P. Method for authenticating a user within a multiple website environment to provide secure access
US20070283273A1 (en) 2005-10-24 2007-12-06 Woods Michael E System, Method, and Computer Program Product for Internet Tool
CA2631763A1 (en) 2005-12-01 2007-06-07 Firestar Software, Inc. System and method for exchanging information among exchange applications
CN100545852C (en) 2005-12-09 2009-09-30 日立软件工程株式会社 Verification System and authentication method
US20070167171A1 (en) 2005-12-30 2007-07-19 Mediacell Licensing Corp Determining the Location of a Device Having Two Communications Connections
US20070157304A1 (en) 2006-01-05 2007-07-05 International Business Machines Corporation Method, apparatus and computer program product for automatic cookie synchronization between distinct web browsers
US7657522B1 (en) 2006-01-12 2010-02-02 Recommind, Inc. System and method for providing information navigation and filtration
KR20070077569A (en) 2006-01-24 2007-07-27 삼성전자주식회사 One time password service system using portable phone and certificating method using the same
US9137012B2 (en) 2006-02-03 2015-09-15 Emc Corporation Wireless authentication methods and apparatus
DK1987627T3 (en) 2006-02-03 2017-02-20 Mideye Ab A SYSTEM, DEVICE AND PROCEDURE FOR END-USER AUTHENTICATION
US8234696B2 (en) 2006-02-10 2012-07-31 Emc Corporation Method and system for providing a one time password to work in conjunction with a browser
EP1821487B1 (en) 2006-02-21 2010-04-07 Microsoft Corporation Topology management in peer-to-peer content distribution clouds
RU2438172C2 (en) 2006-03-02 2011-12-27 Виза Интернешнл Сервис Ассошиэйшн Method and system for performing two-factor authentication in mail order and telephone order transactions
EP1997293A2 (en) 2006-03-22 2008-12-03 Axalto SA A method of securely login to remote servers
US7552467B2 (en) * 2006-04-24 2009-06-23 Jeffrey Dean Lindsay Security systems for protecting an asset
JP2007328381A (en) 2006-05-09 2007-12-20 Ids:Kk Authentication system and method in internet banking
US20080034216A1 (en) 2006-08-03 2008-02-07 Eric Chun Wah Law Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords
US7818216B2 (en) 2006-08-28 2010-10-19 Seraphim Lawhorn Transaction system with centralized data storage and authentication
KR100786551B1 (en) 2006-09-15 2007-12-21 이니텍(주) Method for registering and certificating user of one time password by a plurality of mode and computer-readable recording medium where program executing the same method is recorded
US8112817B2 (en) 2006-10-30 2012-02-07 Girish Chiruvolu User-centric authentication system and method
US8060916B2 (en) 2006-11-06 2011-11-15 Symantec Corporation System and method for website authentication using a shared secret
JP4911595B2 (en) 2006-11-15 2012-04-04 株式会社三菱東京Ufj銀行 Identification device, identification system and identification method
US20080120707A1 (en) 2006-11-22 2008-05-22 Alexander Ramia Systems and methods for authenticating a device by a centralized data server
US9600959B2 (en) 2007-01-09 2017-03-21 Cfph, Llp System for managing promotions
US8468244B2 (en) 2007-01-05 2013-06-18 Digital Doors, Inc. Digital information infrastructure and method for security designated data and with granular data stores
US8332921B2 (en) 2007-01-12 2012-12-11 Wmware, Inc. Enhanced security for user instructions
US8996045B2 (en) 2007-01-29 2015-03-31 Blackberry Limited Method of e-mailing a map location using predefined context-sensitive messages
US8413221B2 (en) 2007-03-23 2013-04-02 Emc Corporation Methods and apparatus for delegated authentication
IL190839A0 (en) 2007-04-15 2008-12-29 Ari Eliaz Method and system for monetary billing for the use of content services in internet sites, by sending sms messages from cellular phones
WO2009001020A1 (en) * 2007-06-26 2008-12-31 G3-Vision Limited Authentication system and method
WO2009019672A1 (en) 2007-08-09 2009-02-12 Mapflow Limited A transport management system
US20090093300A1 (en) 2007-10-05 2009-04-09 Lutnick Howard W Game of chance processing apparatus
US8145769B2 (en) * 2007-09-26 2012-03-27 Qualcomm Incorporated Method for secure user plane (SUPL) version negotiation
GB0718817D0 (en) 2007-09-26 2007-11-07 British Telecomm Password management
US20090106138A1 (en) 2007-10-22 2009-04-23 Smith Steven E Transaction authentication over independent network
US8032939B2 (en) 2007-11-06 2011-10-04 Airtight Networks, Inc. Method and system for providing wireless vulnerability management for local area computer networks
US20090132813A1 (en) 2007-11-08 2009-05-21 Suridx, Inc. Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones
WO2009081576A1 (en) 2007-12-25 2009-07-02 Panasonic Corporation Communication device, communication method, and program
US8270839B2 (en) 2008-03-11 2012-09-18 Vasco Data Security, Inc. Method and an apparatus to convert a light signal emitted by a display into digital signals
US8302167B2 (en) * 2008-03-11 2012-10-30 Vasco Data Security, Inc. Strong authentication token generating one-time passwords and signatures upon server credential verification
US8024576B2 (en) 2008-03-31 2011-09-20 International Business Machines Corporation Method and system for authenticating users with a one time password using an image reader
CA2632793A1 (en) 2008-04-01 2009-10-01 Allone Health Group, Inc. Information server and mobile delivery system and method
US7966652B2 (en) 2008-04-07 2011-06-21 Safemashups Inc. Mashauth: using mashssl for efficient delegated authentication
US8136148B1 (en) 2008-04-09 2012-03-13 Bank Of America Corporation Reusable authentication experience tool
WO2009127984A1 (en) * 2008-04-18 2009-10-22 International Business Machines Corporation Authentication of data communications
US8272038B2 (en) 2008-05-19 2012-09-18 International Business Machines Corporation Method and apparatus for secure authorization
JP2010015541A (en) 2008-06-04 2010-01-21 Fujitsu Ltd Authentication system, terminal device, password issuing apparatus, and authentication method
WO2010011731A2 (en) 2008-07-22 2010-01-28 Next Access Technologies, Llc Methods and systems for secure key entry via communication networks
US8438382B2 (en) 2008-08-06 2013-05-07 Symantec Corporation Credential management system and method
US20100041391A1 (en) 2008-08-12 2010-02-18 Anthony Wayne Spivey Embedded mobile analytics in a mobile device
US11231289B2 (en) 2008-09-10 2022-01-25 Dominic M. Kotab Systems, methods and computer program products for sharing geographical data
US9113345B2 (en) 2008-10-06 2015-08-18 Root Wireless, Inc. Web server and method for hosting a web page for presenting location based user quality data related to a communication network
US8180887B2 (en) 2008-12-16 2012-05-15 Microsoft Corporation Geolocation mapping of network devices
US20110273551A1 (en) 2009-01-21 2011-11-10 Thomson Licensing Method to control media with face detection and hot spot motion
US20100242104A1 (en) * 2009-03-23 2010-09-23 Wankmueller John R Methods and systems for secure authentication
US20120005483A1 (en) 2009-04-09 2012-01-05 Hydrabyte, Inc. Method for Image-Based Authentication
US8230231B2 (en) 2009-04-14 2012-07-24 Microsoft Corporation One time password key ring for mobile computing device
US20100268831A1 (en) 2009-04-16 2010-10-21 Microsoft Corporation Thin Client Session Management
US8621203B2 (en) 2009-06-22 2013-12-31 Nokia Corporation Method and apparatus for authenticating a mobile device
US8018972B2 (en) 2009-06-30 2011-09-13 Alcatel Lucent Timing over packet performance
US8549594B2 (en) 2009-09-18 2013-10-01 Chung-Yu Lin Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password
US8806592B2 (en) 2011-01-21 2014-08-12 Authentify, Inc. Method for secure user and transaction authentication and risk management
US8549601B2 (en) 2009-11-02 2013-10-01 Authentify Inc. Method for secure user and site authentication
US8719905B2 (en) 2010-04-26 2014-05-06 Authentify Inc. Secure and efficient login and transaction authentication using IPhones™ and other smart mobile communication devices
US8769784B2 (en) 2009-11-02 2014-07-08 Authentify, Inc. Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iPhones
US8458774B2 (en) 2009-11-02 2013-06-04 Authentify Inc. Method for secure site and user authentication
US8341236B1 (en) 2009-11-02 2012-12-25 Ravi Ganesan Privacy and security enhanced internet geolocation
US8713325B2 (en) 2011-04-19 2014-04-29 Authentify Inc. Key management using quasi out of band authentication architecture
US8789153B2 (en) 2010-01-27 2014-07-22 Authentify, Inc. Method for secure user and transaction authentication and risk management
US10049356B2 (en) 2009-12-18 2018-08-14 First Data Corporation Authentication of card-not-present transactions
US9021507B2 (en) 2009-12-29 2015-04-28 International Business Machines Corporation Dynamic use of data across multiple programs
US8606234B2 (en) 2009-12-31 2013-12-10 Symantec Corporation Methods and apparatus for provisioning devices with secrets
US20110208801A1 (en) 2010-02-19 2011-08-25 Nokia Corporation Method and apparatus for suggesting alternate actions to access service content
FR2959896B1 (en) * 2010-05-06 2014-03-21 4G Secure METHOD FOR AUTHENTICATING A USER REQUIRING A TRANSACTION WITH A SERVICE PROVIDER
US8825813B2 (en) 2010-12-28 2014-09-02 Microsoft Corporation Distributed network coordinate system based on network performance
US8738027B2 (en) * 2011-02-07 2014-05-27 Qualcomm Incorporated Methods and apparatus for identifying and authorizing location servers and location services
US20130165040A1 (en) 2011-12-21 2013-06-27 Broadcom Corporation Secure Media Application Setup Using NFC
US20130254417A1 (en) * 2012-03-21 2013-09-26 Jason Nicholls System method device for streaming video
US10025920B2 (en) * 2012-06-07 2018-07-17 Early Warning Services, Llc Enterprise triggered 2CHK association
US9053304B2 (en) * 2012-07-13 2015-06-09 Securekey Technologies Inc. Methods and systems for using derived credentials to authenticate a device across multiple platforms
US9729504B2 (en) * 2014-07-29 2017-08-08 Aaa Internet Publishing Inc. Method of near real-time automated global geographical IP address discovery and lookup by executing computer-executable instructions stored on a non-transitory computer-readable medium
GB2509895A (en) * 2012-11-22 2014-07-23 Visa Europe Ltd Activation and Use of a Digital Wallet via Online Banking
US9413837B2 (en) 2013-02-06 2016-08-09 Facebook, Inc. Routine deviation notification
US20140287779A1 (en) * 2013-03-22 2014-09-25 aDesignedPath for UsabilitySolutions, LLC System, method and device for providing personalized mobile experiences at multiple locations
US9565181B2 (en) 2013-03-28 2017-02-07 Wendell D. Brown Method and apparatus for automated password entry
CN104426972B (en) * 2013-09-02 2019-07-05 腾讯科技(深圳)有限公司 Terminal location sharing method and device
AU2015204913B2 (en) * 2014-01-07 2020-06-04 Visa International Service Association Encrypted payment transactions
US9866388B2 (en) * 2014-11-20 2018-01-09 BluInk Ltd. Portable device interface methods and systems
MX2017008651A (en) * 2014-12-29 2018-04-26 Vasco Data Security Inc Method and apparatus for securing a mobile application.
US20170289172A1 (en) * 2016-03-29 2017-10-05 Zeta (Better World Technology Pvt. Ltd.) Request authentication from message content

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11470037B2 (en) 2020-09-09 2022-10-11 Self Financial, Inc. Navigation pathway generation
US11475010B2 (en) 2020-09-09 2022-10-18 Self Financial, Inc. Asynchronous database caching
US11630822B2 (en) * 2020-09-09 2023-04-18 Self Financial, Inc. Multiple devices for updating repositories
US11641665B2 (en) 2020-09-09 2023-05-02 Self Financial, Inc. Resource utilization retrieval and modification

Also Published As

Publication number Publication date
US20170149769A1 (en) 2017-05-25
US10581834B2 (en) 2020-03-03

Similar Documents

Publication Publication Date Title
US20200287892A1 (en) Enhancing transaction authentication with privacy and security enhanced internet geolocation and proximity
US20210021590A1 (en) Method for secure user and transaction authentication and risk management
CN110635911B (en) Method, apparatus and medium for native single sign-on (SSO) for mobile applications
US8789153B2 (en) Method for secure user and transaction authentication and risk management
US9900312B2 (en) Using clock drift, clock skew, and network latency to enhance machine identification
JP5719871B2 (en) Method and apparatus for preventing phishing attacks
US8869245B2 (en) Device reputation
Harini et al. 2CAuth: A new two factor authentication scheme using QR-code
US20210051138A1 (en) Carrier encryption system
CN104636392B (en) Carry out method, system, server and browser that recommendation information issues
US8341236B1 (en) Privacy and security enhanced internet geolocation
US20110173230A1 (en) Method and system for providing location information of target device
US10587683B1 (en) Proximity in privacy and security enhanced internet geolocation
Konidala et al. A secure and privacy enhanced protocol for location-based services in ubiquitous society
KR102364479B1 (en) Bypass connection sevice provision system and method thereof
KR20200091758A (en) A trust index provision apparatus for an IoT device, a trust index provision method for an IoT device, a trust information management apparatus for an IoT device, a a trust information management method for an IoT device, a cooperation system of IoT devices based on trust index, a cooperation method of IoT devices based on trust index
Pokherl Secure Web System in a Cloud Environment

Legal Events

Date Code Title Description
AS Assignment

Owner name: EARLY WARNING SERVICES, LLC, ARIZONA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GANESAN, RAVI;REEL/FRAME:052070/0518

Effective date: 20170630

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: PAYFONE, INC., NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EARLY WARNING SERVICES, LLC;REEL/FRAME:053148/0191

Effective date: 20200603

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION