US20230196357A9 - Secure authentication and transaction system and method - Google Patents

Secure authentication and transaction system and method Download PDF

Info

Publication number
US20230196357A9
US20230196357A9 US15/967,377 US201815967377A US2023196357A9 US 20230196357 A9 US20230196357 A9 US 20230196357A9 US 201815967377 A US201815967377 A US 201815967377A US 2023196357 A9 US2023196357 A9 US 2023196357A9
Authority
US
United States
Prior art keywords
client
authentication
server
authentication server
token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US15/967,377
Other versions
US20190333062A1 (en
Inventor
Raymond J. Gallagher, III
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Multiple Shift Key Inc
Original Assignee
Multiple Shift Key Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/544,302 external-priority patent/US7861077B1/en
Application filed by Multiple Shift Key Inc filed Critical Multiple Shift Key Inc
Priority to US15/967,377 priority Critical patent/US20230196357A9/en
Publication of US20190333062A1 publication Critical patent/US20190333062A1/en
Assigned to MULTIPLE SHIFT KEY, INC. reassignment MULTIPLE SHIFT KEY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GALLAGHER, RAYMOND J., III
Publication of US20230196357A9 publication Critical patent/US20230196357A9/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Definitions

  • This invention relates generally to security systems and methods, and more particularly, to a secure authentication and transaction system and method.
  • Encryption techniques utilized to provide security include symmetric key encryption, where the same key encrypts and decrypts, and asymmetric key encryption, where one key encrypts and a different key decrypts. With a good asymmetric key encryption, it is difficult to get the decryption key even if the encryption key is known.
  • Public Key Encryption is used to establish a secure connection. Assurance messages or images are m attempt at 2-way authentication such that users not only have to authenticate themselves to the site but the site authenticates itself to the users.
  • OTP Time Passwords
  • a Client Token is directly connected to an Authentication Server, for enabling authentication of the Client and secure logins and transactions, in the background, while the Client Browser is connected to the Website.
  • fraudsters and hackers use techniques to acquire confidential information by launching effective malicious attacks, such as phishing, pharming, key-loggers, encryption-breaking, pass code-guessing, man-in-the-middle, SQL injection, and/or denial-of-service, all of which are attacks which are inhibited by the system and method herein.
  • An Authentication Server provides a means for secure web browsing and payment transaction between client and E-merchant.
  • the authentication server acts as a trusted third party for storing client data such as log-on and credit card information.
  • client data such as log-on and credit card information.
  • the system eliminates the need for a client to maintain numerous log-in parameters and to provide financial information directly to a web merchant.
  • Attacks on servers include SQL Injections, Brute Force
  • Attacks on Users include Phishing, Pharming, Key Loggers, and Cross-site scripting.
  • Hybrid Attacks include Man In the Middle.
  • Application or Application Server The application whereby users are logging into or the system is executing a transaction or transactions.
  • Authentication Server The trusted system who authenticates both the Client and the Application (Web Site).
  • Client Token Token issued to the users.
  • API Application Programming Interface
  • Integration or Integration server software Instructions and commands that the Authentication Server will recognize and or respond to. Usually accomplished through an SDK or APL
  • AD Active Directory
  • LDAP LDAP
  • Connector An architectural element that models interactions among components and provides rules that govern those interactions typically through an SOK or API.
  • Phishing is e-mail fraud.
  • a fraudulent e-mail is sent as bait for a scam. It can be anything from a request to login to your account to buy an item at a wonderful low price, to a notification that you have won a free gift where you just have to pay for shipping. Reality is they just want your card numbers or login information or some other piece of information that can be used for profit.
  • Phishing scams are one of the most rapidly growing forms of fraud on the Internet, and are the latest addition to the global identity theft epidemic.
  • Phished is where a phony server displays a page that looks like the real one. Users can be easily fooled by this server and unwittingly give their (user name) and (token) to the wrong server. The wrong server or fraudsters can then login to the real site and take control. It is one time use only, because there is a time interval (attackers can only gain access to the accounts as they are Phished, not whenever they want).
  • DNS Domain Name Server
  • DNS Domain Name Server
  • These servers are basically large directories of common names such as Amazon, Google, and Microsoft, and IP-specific addresses that you never see. For example, if you type www.cnet.com, this request goes to your nearest DNS server, which then locates the registered Internet address for the Web server at CNET Networks. It's much more convenient than always remembering 222.123.0.0 or something similar. However, this translation is also a weak link in the Internet's infrastructure.
  • Key-loggers are small programs that run in the background on your computer and capture every key stroke you make. With this kind of an attack a user can go to legitimate sites like their bank and/or merchant sites and the key-logger will record all of the user names, passwords, and card numbers used to login and make purchases. Verification services like Verified by VISA are rendered useless because everything that a user must type to verify themselves can be recorded by the key-logger.
  • Encryption braking Fraudsters have generally taken the path of least resistance, and with all of the easy ways to get card numbers and or identity information, encryption braking is still a threat. Fraudsters have tools that can break outdated encryption algorithms. It only takes one clever hacker to write a program to break an encryption algorithm and then share it online. That is when an encryption algorithm becomes outdated.
  • Trojan horse Malignant horse attacks pose one of the most serious threats to computer security. According to legend, the Greeks won the Trojan War by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy.
  • a Trojan horse is defined as a malicious, security-breaking program that is disguised as something benign. For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks.
  • users may be sending unencrypted data, which means a man-in-the-middle can easily obtain any unencrypted information.
  • an attacker may be able to obtain the encrypted information from the attack, but have to de-encrypt the information before it can be read.
  • a hacker can also be inline between B and C using a sniffing program to watch the conversation. This is known as a man-in-the-middle attack.
  • a common component of such an attack is to execute a denial-of-service (DoS) attack against one end-point to stop it from responding. This attack can be either against the machine to force it to crash, or against the network connection to force heavy packet loss.
  • DoS denial-of-service
  • TCP session hijacking is when a hacker takes over a TCP session between two machines. Since most authentications only occur at the start of a TCP session, this allows the hacker to gain access to a machine.
  • a popular method is using source-routed IP packets. This allows a hacker at point A on the network to participate in a conversation between B and C by encouraging the IP packets to pass through its machine. If source-routing is turned off, the hacker can use blind hijacking, whereby it guesses the responses of the two machines. Thus, the hacker can send a command, but can never see the response. However, a common command would be to set a password allowing access from somewhere else on the Internet.
  • the basic requirements for a cryptographic hash function are:—The input can be of any length. The output has a fixed length. H(x) is relatively easy to compute for any given x. H(x) is one-way. H(x) is collision-free.
  • Salt is a term used when talking about Hash Functions. Salt is a random string added to the message string before it is hashed. Although Hash Functions are one way and can't be reversed, an attacker can hash guessed messages and compare the hashed numbers to captured hashed number to get useful information. This kind of an attack is not feasible when salt is added. In the SuperCash system, the “Salt” is different for every transaction, making the hashed number unique for every transaction, making an attack useless anyway.
  • the Large Key is a standard MSR Key,—It includes random sets of replacement cipher text characters for each plain text character and a random set for the encoding Matrix and a random set for null or place holders so that the message will be in matrix sized chunks.
  • the Small Key is a password that only the user should know. The Small Key affects the whole encryption process.
  • Token system A current device that produces a predictable pseudo-random number in given intervals and the authenticating server produces the same pseudo-random number in the same intervals.
  • a user is asked to give a (user name) and (the token) or pseudo-random number.
  • the authenticating server compares the numbers to authenticate.
  • the token device is expensive.
  • the token device can be USB device.
  • the USB device should have its own processor like a smart card so that the Disk can't be copied or tampered with.
  • a standard medium can be used.
  • Cash files or one time cash files Client information double encrypted, once using a hidden key on the Disk or PC, again using a password or PIN number known only to the user.
  • Disk Refers to any removable media.
  • Client Person or entity that wants to initiate a transaction.
  • Fraudster Person attempting to commit a fraud.
  • Gateway The system/server that is used to process transactions for merchants or other institutions like e-trade, check free, bill paying services, and the like. It also refers to system/server that is used for remote logins
  • SuperCash A version of a secure payment transaction system and method herein is referred to as “SuperCash,” which is a system that can handle transactions from Credit, Debit or Prepaid accounts like VISA, MasterCard, American Express, Discover, check cards, gift cards, ATM cards basically customer to business or business to business.
  • SuperCheck Another version of a secure check transaction system and method herein is referred to as “SuperCheck,” which is a system that can handle transactions that are normally done with personal check, business checks, payroll, travelers checks, money orders, cashers checks, rebate checks or the like, with the ease of an e-mail.
  • SuperID A further version of a secure authentication system and method herein is referred to as “SuperID,” which is a system that allows a remote client to login securely.
  • the present invention in a preferred embodiment, by way of example, is directed to a secure user authentication system, operable over a client-server communications network to authenticate a system user.
  • the system includes an application server, in the client-server communications network.
  • the application server includes a site, wherein the site is able to be enabled to comprise an enabled application server site.
  • the system further includes an authentication server, in the client-server communications network.
  • the authentication server is able to enable the application server site to comprise the enabled application server site.
  • the authentication server includes a core database, and which receives and stores user authentication-enabling data in the core database.
  • the system includes an authentication server, client tokens, and a means for the application to integrate to the authentication server. It includes a client, in the client-server communications network, and a client token, wherein the client token may comprise a program or an element which achieves the same or comparable results, which is able to be actuated in the client.
  • the client token includes the user authentication-enabling data, and, upon actuation thereof, automatically directly connects to the authentication server, and sends the client authentication-enabling data to the authentication server, for secure user authentication by the authentication server.
  • the client token does not send the user authentication-enabling data to the enabled application server site.
  • a party may provide the API and another party may do the integration.
  • the API dictates how things are communicated. If the application provides an SDK or API, then the system can integrate the authentication server to the application. This would add code to the authentication server so that it would communicate with the application. In such case the application provides the APL. This can be achieved if the application is big, is used by many companies, or issued by many users or developed by a big company.
  • Parameters of a version of the secure authentication and transaction system and method herein are as follows: with one way Hash Functions, the string to be Hashed includes information from the disk, the password or PIN, and Salt from authentication server.
  • the encryption is unbreakable or as close to unbreakable as possible (MSR encryption and SHA-2 Hash Functions have this ability). An attacker is not able to get the plain text from the cipher text.
  • the encryption is implemented so that each cipher text created is unique.
  • the cipher text messages are one use only (MSR encryption has this ability). The only thing to distinguish cipher text produced by a particular key is the key serial number. An attacker who has collected many cash files is not be able to calculate or somehow get the encrypting Key.
  • the encryption is implemented so that if a cash file is manipulated in any way the authentication is rejected.
  • One-way Hash Functions will also work in place of encryption.
  • the media is removable (e.g. a CD-ROM, USB device or Memory Stick).
  • the media may be compatible with legacy systems like magnetic strips and compatible with Personal Computers for e-commerce.
  • the media should be upgradeable to accommodate future systems like RF-proximity.
  • the secure payment transaction system and method includes New Disk designs which include: CD-ROM—as a payment device instead of standard credit card. Debit cards used online were only good for home use because full sized CD-ROM requires an install procedure.
  • Magnetic strip combination a credit card sized CD-ROM required a carriage to fit in a standard CD-ROM Drive.
  • the system herein uses a Card CD-ROM with a magnetic strip on the side.
  • Advantage no carriage needed to fit in a standard CD-ROM Drive.
  • RF proximity chip combination put a chip on a CD ROM.
  • RF proximity chip combination a chip and a magnetic strip on a CD ROM.
  • USB device as a payment device instead of a card—for a payment system.
  • Magnetic strip combination a magnetic strip and USB device together.
  • RF proximity chip combination an RF proximity chip in a USB device.
  • RF proximity chip combination a Magnetic strip, USB device and RF proximity chip together.
  • USB devices are compatible with personal computers so online usage is easy.
  • Advantage with a magnetic strip is backwards compatible with magnetic swipe machines.
  • PC refers to any non-removable media like a hard drive. Based on one time cash files and direct communication it employs. Something you have (Disk) plus something you know (PIN). One time use only cash files. The cash files are sent directly to the authenticating server (fraudsters don't even get to see the one time cash file, let alone use it to get information or use it for anything).
  • the secure check transaction system and method creates a cash file that can be saved to the hard drive or other media.
  • the client can then upload the file to a merchant or e-mail to a friend or family member.
  • the receiver can then login to their online banking and upload the received cash file.
  • Merchants can automate this process and deposit the cash files received through a Gateway in real time.
  • This system can be used with Check 21 or ACH systems.
  • This system can be used instead of Check 21 or ACH . . . basically (customer to business) or (business to customer), or (business to business) or (customer to customer). Based on one time cash files it employs. Something you have (Disk) plus something you know (PIN). One time use only cash files.
  • the cash files are made out to the receiver, and either uploaded to a site or e-mailed to the receiver.
  • the one time cash file from SuperChecks will be deposited fast, so if anyone got it, it would have been too late. Even if the fraudsters got the cash file before the receiver made the deposit they can't make the deposit because it was not made out to them.
  • the secure authentication system and method by using a SuperID system, is cheaper and more secure than a Token system.
  • Token systems can be Phished, SuperID can't be Phished.
  • Token systems can be Phished, SuperID can't be Phished.
  • the cash files are sent directly to the authenticating server (fraudsters don't even get to see the one time cash file).
  • the MSR Login System is a replacement for Tokens.
  • Tokens are used for secure remote Logins.
  • the user is given a device that gives a predetermined set of random numbers. A new random number is displayed every 60 seconds on the device.
  • the user goes to the site he/she wants to login to and enters a user name and the random number displayed on their token. (Something you know plus something you have) (This system is vulnerable to a Phishing or Pharming attack. An attacker can make a site look like the real one and for example send an email to the victim with a link to the phony site.
  • the phony server will then capture the password and the one time 60 second random number and then login to the real site. Maybe the phony site will say to the victim that the site is down right now an to try back latter).
  • the SuperID Login System With the SuperID Login System the user goes to the site and the site writes a Cookie to the users PC. The SuperID program will then read the information in the cookie along with data on the disk and Password that only the user should know. The SuperID program will then encrypt the data and send a POST directly to the Server via an IP address not a URL. The SuperID Login System will authenticate the user. (SuperID is not vulnerable to a phishing attack. The user has to be on the real server in order to receive the cookies) What makes this system different from all of the other systems—It is easy to use (only a PIN to remember). No extra hardware (unlike smartcards). No extra software, Easy to implement. It can be implemented in JAVA making it cross platform compatible.
  • the secure authentication and transaction system and method addresses the divergent needs and issues of a variety of players—payment networks, end users, card issuers, merchants, and processors. No changes to the Visa/MC system. The solution works within the given boundaries and confines of the existing transaction systems. Minimized consumer-facing security solution. Certifying to the MSR solution makes business sense to gateway processors, who take their cues from the payment networks. Processors generally utilize and follow what the payment networks create. Most of the gateway-generated solutions are back office transaction analysis-oriented. Gateways generally will not attempt to force a consumer-facing solution (Other Solutions have failed when they tried a consumer-facing security solution. Example: Verified by VISA).
  • the secure authentication and transaction system and method prevents attacks, including Phony Phishing and Pharming sites are completely cut out of the loop for both the SuperCash and SuperID system. Phony sites are completely cut out of the loop for both the SuperCash and SuperID system even if the DNS servers have been compromised because SuperCash and SuperID systems use direct communication via an IP address bypassing the DNS servers. With the SuperCash and SuperID most of the information is never keyed in so a key-logger can only get a PIN. All of the authenticating information is completely hidden to a key-logger and to the user that is what makes it easy to use.
  • the SuperCash and SuperID system makes use of either unbreakable encryption or one way hash functions.
  • the SuperCash system makes user of one way hash functions in conjunction with salt. With one way hash functions there is simply not enough data transmitted to reverse the process it can't be broken. One way hash functions can have “guessed strings” that will hash to the same number but the “guessed string” will not have any useful data. With SuperCash and SuperID an attacker cant even start a password guessing attack. With the SuperCash and SuperID systems the authenticating information is not installed nor does it reside on the computer it is stored on the disk itself. It won't stop you from getting a Trojan or stop the Trojan from doing damage to your computer but it will prevent the Trojan from getting any information from the SuperCash or Super:ID disk. With SuperCash there is only an authentication. The process is done after that. With the SuperID a command to set a password doesn't exist and the user authenticates with unique information each time this also helps prevent a Denial-Of-Service (DOS) attack.
  • DOS Denial-Of-Service
  • FIG. 1 is a block diagram illustrating login in a secure authentication and transaction system
  • FIG. 2 is a block diagram illustrating redirection for authentication in the system
  • FIG. 3 is a block diagram illustrating checking an authentication
  • FIG. 4 is a block diagram illustrating secure connection
  • FIG. 5 is a flow chart of a request to the authentication server
  • FIG. 6 is a flow chart of user authorization by the authentication server
  • FIG. 7 is a flow chart of a response by the authentication server
  • FIG. 8 is a screen shot of an application server site, including a client token window in a version of the system
  • FIG. 9 is a screen shot of the client program window
  • FIG. 10 is a screen shot of the shopping cart page of the application server site including the client token window in a version of the system;
  • FIG. 11 is a screen shot of the checkout page of the application server site, including the client token window;
  • FIG. 12 is a screen shot of the client token window displaying a transaction amount and website owner
  • FIG. 13 is a screen shot of the client token window after clicking the submit button, where the transaction has been authorized;
  • FIG. 14 is a screen shot of the client token window upon completion of the transaction where the transaction has been authorized
  • FIG. 15 is a screen shot of the client token window, upon clicking the submit button, where authorization has failed;
  • FIG. 16 is a screen shot of the client token window, upon completion of the transaction, where authorization has failed
  • FIG. 17 is a flow chart of a version of a payment system in the secure authentication and transaction system
  • FIG. 18 is a flow chart of fraud failure in the payment system
  • FIG. 19 is a flow chart of a current authentication system
  • FIG. 20 is a flow chart of a fraud in the current system
  • FIG. 21 is a flow chart of a current token system
  • FIG. 22 is a flow chart of fraud in the current token system
  • FIG. 23 is a flow chart of a version of the secure authentication system
  • FIG. 24 is a flow chart of a fraud failure in the secure authentication system
  • FIG. 25 is a flow chart of a version of the secure transaction system
  • FIG. 26 is a flow chart of the version of the secure transaction system
  • FIG. 27 is an elevational view of a version of a device including a client program for a secure authorization and transaction system
  • FIG. 28 is an elevational view of another version of a device including a client token for the system
  • FIG. 29 is a screenshot of a client token window for entry of transaction data in the system.
  • FIG. 30 is a screenshot of the client token window after clicking the submit button where the transaction is complete;
  • FIG. 31 is a screenshot of a client token window for entry of transaction data in the system.
  • FIG. 32 is a screenshot of the client token window after clicking the submit button where the transaction is complete;
  • FIG. 33 is a screenshot of a client token window for entry of transaction data in the system.
  • FIG. 34 is a screenshot of the client token window after clicking the submit button where the transaction is complete;
  • FIG. 35 is a screenshot of a client token window for entry of transaction data in the system.
  • FIG. 36 is a screenshot of the client token window after clicking the submit button where the transaction is complete;
  • FIG. 37 is a screenshot of a client token window for entry of recurring charges transaction data in the system.
  • FIG. 38 is a screenshot of a client token window for entry of recurring charges transaction data in the system.
  • FIG. 39 is a flow chart of a current transaction system
  • FIG. 40 is a flow chart of a current transaction system
  • FIG. 41 is a flow chart of a payment system in the secure authorization and transaction system herein;
  • FIG. 42 is a screenshot of a client token window for entry of checking transaction data in the secure authentication and transaction system
  • FIG. 43 is a screenshot of a client token window for entry of checking transaction data in the system.
  • FIG. 44 is a screenshot of a client token window for entry of checking transaction data in the system.
  • the system according to the invention includes a system 10 , as illustrated in FIGS. 1 - 3 , for conducting secure authentication and secure transactions over a communications network such as the Internet.
  • the system 10 includes a Client Token 12 , wherein the Client Token 12 may comprise a program or an element which achieves the same or comparable results, which may be on media such as a CD-ROM, or may be downloadable, or may be otherwise provided, an Authentication Server 14 , a Client Pass Code, which is used in conjunction with the Client Token 12 , and an Enabled Website 16 .
  • the Client is the person to whom the Client Token 12 has been issued.
  • the Client Program 12 is directly linked to the Authentication Server 14 , and is issued by the implementer of the Authentication Server 14 .
  • the Client Program 12 has the following features: (1) it is designed to auto-run once opened on the computer or inserted into a disk reader; (2) it has a Serial Number embedded in it; (3) it includes an Account Number which is unique and identifies the Client; (4) it has a Label to enable the Website 16 and to enable the activity that the client is undertaking; (5) it has the Authentication Server IP address, which specifies the issuing Authentication Server for this specific Client Program.
  • the Authentication Server is a server which authenticates Clients and application servers (such as Websites) to each other. Through the Authentication Server, Clients authenticate themselves to the Authentication Server, servers authenticate themselves to the Authentication Server, and the Authentication Server authenticates each Client and server to each other.
  • the Authentication Server includes a core database which it uses to match up Clients and servers.
  • the Authentication Server core database has a series of attributes, including, for Clients, data regarding the client, (e.g. name and password) to which any client information can be attached (e.g. first name, last name, address etc.), and for servers, the Website signature, as registered by the Website with the Authentication Server, which can be attached (e.g. the Website name, and for transactions, where the money is going, to whom and for what).
  • the Authentication Server directly connects the Client Token thereto, automatically, in the background.
  • the Pass Code is selected by the Client, and is only known to the Client and the Authentication Server 14 . It has substantially no limits on the size (length) of the Pass Code, or on the type of characters that can be utilized, (e.g. “Mary had a little lamb,!@#$%”&*“( )”) except for operators such as the word “enter”.
  • the Website 16 is registered with the Authentication Server, and is enabled by being modified to provide a “Login” button in place of the traditional “username”/“password” fields.
  • the underlying Login function is modified to provide a secure request to the Authentication Server 14 , so as to confirm the validity of the Client credentials, which replaces the normal SQL access to the database.
  • the system runs, and the Client validates the web credentials in the system and enters the Client Pass Code.
  • the system validates the Client and allows access to the website once the Login button has been pressed.
  • the Client Browser 18 connects the Client to the Website 16 .
  • the Client Browser 18 is redirected to the Authentication Server 14 , as seen in FIG. 2 , and the Authentication Server 14 redirects back to the Login page on the Website 16 .
  • the Authentication Server 14 receives a server ID number field from the Website 16 , so that it knows where to redirect back to, which includes information about the type of transaction being performed (either Login or Payment).
  • the Authentication Server 14 writes a rookie to the Browser 18 , and the Client Token 12 reads the cookie of the Browser 18 , with a unique Certificate and Label embedded in it, and sets the status of the Login as “pending”.
  • the Authentication Server 14 redirects the Client back to the Login page on the Website 16 and POSTS the same Certificate to the Website 16 .
  • the Client Program 12 When the Client Program 12 is run, as shown in FIG. 2 , it reads the Cookie and extracts the Certificate. This is combined with the Serial Number and Pass Code, and run through a one-time Hash.
  • the Hash is a transformation function, which takes a variable-size input and returns a fixed-size string, a one-way function which is impossible to invert to find the underlying input, and which is collision-free in that it is computationally not feasible to find any two inputs with the same resulting Hash.
  • the inputs to be hashed herein are the Certificate, Serial Number, and Pass Code, resulting in the Hash output.
  • the Hash output, the Certificate, and the Account Number are sent directly from the Client Program 12 to the Authentication Server 14 using the embedded IP address of the Authentication Server 14 , which is hard coded in the Client Program 12 and cannot be changed.
  • the Authentication Server 14 Once the Authentication Server 14 has received the Hash, the Certificate, and the Account Number, it performs the same hash process, using the Pass Code it has in its database, the Serial Number, and the issued Certificate. If the Hash output at the Authentication Server 14 matches the Hash output sent to it from the Client Token 12 , the Client is authenticated, the Authentication Server 14 responds back to the Client, and the Certificate is set to “active”. The Client has now received an “authenticated” message back from the Authentication Server 14 . The Client is now free to click on the “Login” button on the Website 16 .
  • the Web site 16 asks the Authenticating Server 14 to check to see if the Client has been authenticated as either “active” or “failed”, and the Certificate expires.
  • the Website 16 and the Authentication Server 12 are connected to each other through a secure connection 20 , for example through a trusted Isolated Local Area Network (LAN), or alternatively through a Secure Socket Layer (SSL) or a Virtual Private Network (VPN), and are connected to the Web 22 for example through Firewalls 24 and a Proxy Server 26 . If the authentication is acknowledged as “active”, then the Website 16 lets the Client in. Once the Website 16 has received an authentication acknowledgement as “active”, any rights associated with the Client are assigned.
  • LAN trusted Isolated Local Area Network
  • SSL Secure Socket Layer
  • VPN Virtual Private Network
  • the Payment operation is the same as the above Login process, with the addition of fields that are transferred between the Website 16 and the Authentication Server 14 , as illustrated in FIGS. 1 - 3 .
  • the Client is identified by a similar mechanism to the login process, but in addition the Authenticating Server 14 passes stored credit card information to a Payment Gateway which leads to the banking payment transaction network and returns “active” or “failed” to the Website 16 .
  • the Client checks out by clicking the account type to pay with, e.g. Visa, Master Card, AMEX. A merchant will display only the types they accept.
  • the Website 16 will redirect to the Authentication Server 14 .
  • the Authentication Server 14 will write a Certificate and a Label to a Cookie and redirect to the Client to complete the transaction page on the Website 16 . On the redirect the Authentication Server 14 will POST the same Certificate to the Website 16 .
  • the information supplied by the Website 16 is customizable, for example as follows: name of the item being purchased—the short name; product ID—normally SKU number; quantity being purchased; description of the product—the long description; unit price; total amount; shipping address for this order; and address fields for: city; state; zip code; country.
  • the Authentication Server 14 responds in a similar manner to the login mechanism and issues a Certificate to the Client Program and the Website 16 . In addition, a tracking value is also returned.
  • the system extracts information from the Cookie to display (independent from the Website 16 ) the payment amount and who it is to be sent to. This allows the Client to know exactly what is going on. This process will be tailored to the requirements of individual merchants on a case-by-case basis
  • the system of the invention comprises a secure user authentication system, operable over a client-server communications network to authenticate a system user. It includes an application server, in the client-server communications network, which includes a site, wherein the site is able to be enabled to comprise an enabled application server site, and an authentication server, in the client-server communications network, which is able to enable the application server site to comprise the enabled application server site.
  • the authentication server includes a core database, and receives and stores user authentication-enabling data in the core database.
  • the system further includes a client, in the client-server communications network and a client token, wherein the client token may comprise a program or an element which achieves the same or comparable results, which is able to be actuated in the client, which includes the user authentication-enabling data, and which, upon actuation thereof, automatically directly connects to the authentication server and sends the client authentication-enabling data to the authentication server for secure user authentication by the authentication server, and which does not send the user authentication-enabling data to the enabled application server site.
  • the client token may comprise a program or an element which achieves the same or comparable results, which is able to be actuated in the client, which includes the user authentication-enabling data, and which, upon actuation thereof, automatically directly connects to the authentication server and sends the client authentication-enabling data to the authentication server for secure user authentication by the authentication server, and which does not send the user authentication-enabling data to the enabled application server site.
  • the application server is further able to redirect the user to the authentication server for secure user authentication by the authentication server.
  • the client-server communications network may comprise the Internet.
  • the authentication server includes an Internet Protocol address which specifies the authentication server which issued the client token
  • the client token includes the authentication server Internet Protocol address.
  • the Internet Protocol Address of the authentication server embedded in the client token is hard coded and unchangeable in the client token.
  • the application server site in such network comprises an Internet application server website.
  • the application server site includes a login button, the authentication server, independent of actuation of the login button, authenticates the user, for secure user authentication, and, upon actuation of the login button by the user, the application server checks with the authentication server for secure user authentication by the authentication server.
  • the enabled application server site does not provide for entry by the user of a username and password for user authentication.
  • the client token enables a passcode selected by the user to be entered thereinto, and the user authentication-enabling data, received and stored in the authentication server core database, includes the user-selected passcode.
  • the client token enables the passcode selected by the user to be of substantially any length and to include substantially any type of character.
  • the enabled application server site comprises an application server site which is registered with the authentication server.
  • the client further includes a client browser program.
  • the client browser program upon activation thereof, connects the user to the enabled application server site, and the authentication server securely authenticates the user while the client browser program is connected to the enabled application server site.
  • the application server site includes a server identification number field which the authentication server receives from the application server site accessed by the client browser program, so that the authentication server knows where to redirect back to, and which includes data regarding the type of transaction being performed.
  • the enabled application server site checks with the authentication server to determine secure use authentication.
  • the client token includes a serial number embedded therein, and the client authentication-enabling data includes the client token embedded serial number.
  • the client token includes an account number which is unique and which identifies the user, and the client authentication-enabling data includes the client program account number.
  • the client token includes a label which verifies the enabled application server site, and which enables the activity that the user in undertaking.
  • the client further includes a client browser program, and the authentication server is able to write a cookie to the client browser program, which cookie includes the label, and a unique certificate, embedded in the cookie.
  • the client token upon activation thereof, reads the authentication server cookie and extracts the certificate, and runs the combined certificate, serial number, and passcode through a one-time hash, generating a client token hash output.
  • the client token upon activation thereof, uses the embedded Internet Protocol address cookie of the authentication server to send the client token hash output directly to the authentication server.
  • the authentication server upon receipt of the client token hash output, the certificate and the account number from the client token, performs the same hash process as was performed by the client token, using the passcode in the authentication core database, the serial number, and the certificate to generate an authentication server hash output.
  • the authentication server upon the user actuating the login button, checks the client token hash output against the authentication server hash output, to determine whether the user has been authenticated, and, depending upon whether there is a match or there is no match, sets the certificate to either “active” or “failed” responsive thereto, the application server requests the authentication server to advise whether the certificate has been set to “active” or “failed”, and upon the request from the application server the certificate expires.
  • the authentication server se the certificate to “active”, any rights associated with the user are assigned to the user by the application server site
  • the authentication server is able to authenticate the client and the application server to each other.
  • the authentication server is able to authenticate the user, the application server, and the user to the application server.
  • the authentication server core database is able to authenticate the user, and pushes the user account number to the application server.
  • the authentication server site core database includes attributes for the user and for the application server.
  • the Website will redirect to the MSK Authentication Server (Auth Server).
  • Auth Server MSK Authentication Server
  • the Auth Server will write a Certificate and a Label to a cookie, and redirect to the user to the login page on the website.
  • the Auth Server will POST the same Certificate to the website.
  • Passcode is known only to the user and has substantially no limits on the kind of characters that can be entered (i.e. ⁇ “Mary had a little lamb!@#$%“&*”0)” ⁇ ).
  • the user will either hit the enter key or mouse click the Submit button and the MSK Client will respond with either Authorized or Failed.
  • the user can now login to the website by clicking the Login button on the website or complete the transaction by clicking the complete payment button on the site.
  • the website will connect MSK Authentication Server through either SSL, VPN or through a trusted Isolated LAN connection to check if the user has been authenticated.
  • Website will redirect to the MSK Authentication Server (Auth Server).
  • Auth Server MSK Authentication Server
  • the Auth Server will write a Certificate and a Label to a cookie and redirect to the user to complete transaction page on the website.
  • the Auth Server will POST the same Certificate to the website.
  • the client starts by shopping online. Once the client is finished shopping like normal he/she will be directed to either a payment Gateway or in house Checkout page. If the SuperCash system is used as a payment method, the merchant will POST its merchant ID, the client will be redirected to the SuperCash System, and back to the merchant. This process is seamless—the average user will not even notice that they had left the merchants site. Either the merchant or SuperCash system can give the client instructions to insert their SuperCash Disk. The program will read the “Tracking Number” and “Salt” written to cookies by the SuperCash server. The program will also read the card number and other card information from the disk. The SuperCash Program will also read the PIN entered by the client. (The only thing the client has to do is insert the disk and enter a PIN). The SuperCash Program will send the Cash File directly to the SuperCash Server via IP address, not URL. This will prevent Pharming attacks.
  • the first line in the Cash File starts with the card number, next line is the tracking number, last line is the Hashed number.
  • the Card number will fill the standard card number required by (VISA, Master Card, American Express, etc . . . ).
  • the tracking number and hashed number are on the Extra fields making the SuperCash system compatible with the current system.
  • the string that is hashed is the card information plus the “Salt” and the PIN.
  • the salt is random and unique every time, making the hash unique or one time only.
  • the user shop onsite normally. On checkout they are re-directed to the SuperCash Server and the merchant ID is Posted to the System. The merchant can also send an itemization of what was bought along with descriptions and prices. The user is re-directed right back to a page on your site with the “Complete Transaction” button on it. They click it and the merchant is sent either an approval or denial.
  • the Payment File includes the following: Card details—Label, Key file name, Card number (part of the string to be hashed), Card Type (VISA, Master Card, etc . . . ) (part of the string to be hashed), Expiration Date (part of the string to be hashed), Card number displayed in plain text, First Name, Last Name, Address 1, Address 2, City, State, Zip.
  • User Input PIN. Submit button. From Cookie information written by SuperCash Server—Tracking Number, Salt.
  • the Payment File includes the following herein: Cash File details for SuperID,—Label. Key file name. Extra field left over from SuperCash. Cookie name. Full address to send Cash File (IP not URL). This will prevent Pharming attacks.
  • User ID displayed in plain text. From Disk file cardinfo.data—First Name, Last Name, Address 1, Address 2, City, State, Zip. User Input—PIN, Submit button. From Cookie information written by Remote Server—Tracking Number, Salt (optional only if you use Hash Functions instead of encryption like MSR).
  • FIGS. 27 - 28 a first type of device for the secure authentication and transaction system is shown in FIG. 27
  • a second type of device for the secure authentication and transaction system is shown in FIG. 28 .
  • RF proximity chip device is shown, which is a first type of authentication and payment device for a secure authentication and transaction system as described herein.
  • RF proximity chip device is shown, which is a second type of authentication and payment device for a secure authentication and transaction system as described herein.
  • the first and second types of authentication and payment devices are also referred to herein as the authentication device and the payment device.
  • a second version of a secure authentication system as referred to in FIGS. 35 - 36 , input the payment device, enter your PIN, click the Submit button, the Complete window appears, and you are done.
  • This version is an example where the ID and Payment System (SuperCash/SuperID) are separated.
  • FIG. 37 there is shown a recurring charges capability
  • This capability will be good for services like AOL or Netflix.
  • the simple version is capable of having recurring charges, you just don't have the upfront control because it assumes how much, how many times and when you are going to be charged is disclosed properly.
  • the charges are $123.55 on the 15th of the month for 12 months or one year. Charges will be made to Bank of America VISA. What the gateway needs—Merchant ID issued by merchant bank, usually it's the account number, and Terminal ID—issued by merchant bank, similar to POS (Point Of Sale) station.
  • POS Point Of Sale
  • a current system different from the system herein in that the current system functions as follows to enable the user to shop online:
  • Merchant sends authorization request to Gateway.
  • Gateway sends authorization request to Merchant Bank.
  • Merchant Bank sends authorization request to their Clearing and Settling Service.
  • Clearing and Settling Service sends authorization to Issuer.
  • the Issuer approves or declines authorization, and forwards the authorization to the Clearing and Settling Service.
  • Clearing and Settling Service forwards the authorization to the Merchant Bank.
  • Merchant Bank forwards the authorization to the Gateway. Gateway forwards the authorization to the Merchant.
  • Merchant indicates to user that payment was approved or denied.
  • Fraudster web sites capture Card Numbers including security numbers like the Card Verification Value 2, by SPAM, Phishing, Pharming etc. Indicate to the user that the transaction did not go through, or that the system is down, or whatever they want, because they just stolen the Credit Card number.
  • SuperCash Program sends Cash File directly to SuperCash Gateway.
  • SuperCash Gateway sends authorization request to Merchant Bank.
  • Merchant Bank sends authorization request to their Clearing and Settling Service.
  • Clearing and Settling Service sends authorization to Issuer. The Issuer approves or declines authorization and forwards the authorization to the Clearing and Settling Service.
  • Clearing and Settling Service forwards the authorization to the Merchant Bank.
  • Merchant Bank forwards the authorization to the Gateway. Gateway forwards the authorization to the Merchant.
  • Merchant indicates to user that payment was approved or denied.
  • SuperCash Gateway In the second version of the payment system herein, as seen in FIG. 17 , input the payment device, and the user shops online. On checkout, user is redirected to the SuperCash Gateway.
  • SuperCash Program sends Cash File directly to SuperCash Gateway.
  • SuperCash Gateway sends authorization request to Merchant Bank.
  • Merchant Bank sends authorization request to their Clearing and Settling Service.
  • Clearing and Settling Service sends authorization to Issuer. The Issuer approves or declines authorization and forwards the authorization to the Clearing and Settling Service.
  • Clearing and Settling Service forwards the authorization to the Merchant Bank.
  • Merchant Bank forwards the authorization to the Gateway. Gateway forwards the authorization to the Merchant when the “Complete Transaction” is clicked.
  • Fraud fails in the payment system herein, as illustrated in FIG. 18 , wherein the client Browser goes on to fraudster site—The user goes onto the fraudster site because it looks like a legitimate site, there is no way to tell the difference.
  • Fraudster Sites Phony Merchants, Phished sites and Spammers. The Fraudsters never even gets the Card numbers or cash files, let alone do anything with it.—It's a Dead End.
  • a current authentication system operates to enable the function of the Client Browser, Remote Server, Username, Password.
  • Fraud is committed in the current system, as shown in FIG. 20 , wherein client Browser, Phished or Pharmed Remote Server—Username, Password. Fraudsters can login at will once they get the Username and Password.
  • a token system as shown in FIG. 21 , includes client Browser, Remote Server—Username, Token, Token Device—Only the user knows the Username. Only the Token Device knows the Token Number—The ever changing Token Number. The user goes online and the remote server asks the client to enter their Username and Token Number. The Token Number is changing every 60 seconds or so.
  • Fraud is committed in the token system, as seen in FIG. 22 , as client Browser, Phished or Pharmed Remote Server—The phony server will ask the user for his/her Username—The phony server will also ask for the Token number—Fraudsters can login to the real server and hijack the session but they can't login at will, Token Device.
  • the user goes to the Remote Server—There is no username. There is no password. There is no Token.
  • the SuperID Program A password or PIN is all that is required.
  • the SuperID program will authenticate the browser.
  • Gateways can add SuperCash to their system. Merchant can add SuperCash directly to their system. Merchants are not limited to what Gateways provide.
  • SuperCash hashes a string composed of—the Password, Card information, Tracking number, Salt, and the Hash, which is onetime use only. Card number with onetime hashed number and tracking number information will fit on current system.
  • the SuperCash system herein, referring to FIG. 26 , enables actions to be performed—input the payment device, and the Client shops online. When the user checks out he/she will be re-directed to SuperCash.
  • the SuperCash server writes the “Tracking number” and “Salt” Cookies.
  • Merchant wants to keep the user on their site to control the user experience—the user is instantly redirected back to the Merchants site.
  • the merchant will then display instructions to insert the Disk along with the “Complete Transaction” button.
  • the user inserts the disk and enters their PIN and clicks the Submit button.
  • the Cash File is sent directly to the SuperCash Server via an IP address, not a URL. This protects against a Phishing and Pharming attacks.
  • the Cash File is automatically sent to the Merchants Bank.
  • Merchants Bank process payment with its Clearing and Settling Service just like normal.
  • Clearing and Settling Service locates Issuer Bank and sends authorization request.
  • the Issuer authenticates the card number and Cash File (hashed number) and sends approved or denied just like normal.
  • Clearing and Settling Service sends the approved or denied to Merchants Bank as they would normally.
  • the Merchant Bank send authorization approved or denied to SuperCash Server
  • the SuperCash server will send the approved or denied message to the Merchant or Gateway just like normal. If the client is on the SuperCash Server with the “Complete Transaction” button then a POST will be sent to the merchant “approved or denied”. If the client is on the merchants site with the “Complete Transaction” button then a POST will be sent to the SuperCash Server requesting authorization status and will receive a POST back from the SuperCash Server “approved or denied”.
  • the user makes a Cash File that is double encrypted, Hash Functions will not work.
  • the Cash File is saved as a file and can be sent in an email attachment or uploaded during an online banking session.
  • the user makes the cash file payable to a person or entity. It will be important to make each file generated by SuperChecks unique so they can only be used once. Just fill out the SuperCheck and click the “Submit” button. Save the cash file and you are done. The cash file could be emailed to the receiving person or entity. That person can then upload this cash file to their bank while doing their online banking.

Abstract

A secure user authentication system, operable over a client-server communications network to authenticate a system user. The system includes an application server which includes a site which is able to be enabled, and an authentication server, which is able to enable the application server site. The authentication server includes a core database, and receives and stores user authentication-enabling data in the core database. The system further includes a client, and a client program which is able to be actuated in the client. The client program includes the user authentication-enabling data. Upon actuation, the client program automatically directly connects to the authentication server, and sends the client authentication-enabling data to the authentication server, for secure user authentication by the authentication server.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application is claiming the benefit of co-pending utility application Ser. No. 14/797,160 filed on Jul. 12, 2015, which claimed the benefit the benefit of co-pending utility application Ser. No. 12/978,105 filed on Dec. 23, 2010, which claimed the benefit of co-pending utility application Ser. No. 12/564,817 filed on Sep. 22, 2009, which claimed the benefit of co-pending provisional application Ser. No. 61/099,800 filed on Sep. 24, 2008.
  • COPYRIGHTABLE SUBJECT MATTER
  • A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
  • BACKGROUND OF THE INVENTION 1. Field of the Invention
  • This invention relates generally to security systems and methods, and more particularly, to a secure authentication and transaction system and method.
  • 2. General Background and State of the Art
  • In a communications network such as the Internet, security issues arise in connection with remote authentication of users to web sites. Remote authentication is a bi-directional problem manifesting itself in several well-known attack profiles such as Phishing (a direct attack on the user), and brute force (an attack on the web site). All attacks are designed to gain access to an account or accounts without authorization. The fundamental challenge can be summarized as a failure to determine with complete accuracy if either end of the communication channel is successfully communicating with the correct entity.
  • Encryption techniques utilized to provide security include symmetric key encryption, where the same key encrypts and decrypts, and asymmetric key encryption, where one key encrypts and a different key decrypts. With a good asymmetric key encryption, it is difficult to get the decryption key even if the encryption key is known. Public Key Encryption is used to establish a secure connection. Assurance messages or images are m attempt at 2-way authentication such that users not only have to authenticate themselves to the site but the site authenticates itself to the users.
  • In a common way to authenticate users to a system, the user's public key has to be known to the server so a challenge phrase can be encrypted by the server using the client's public key. Only the real user will have the private key able to decrypt the message and respond. One Time Passwords (OTP) is another way to authenticate users. OTP is a hardware device that uses a random number generator to generate password at given intervals.
  • In the secure authentication and transaction system and method herein, a Client Token is directly connected to an Authentication Server, for enabling authentication of the Client and secure logins and transactions, in the background, while the Client Browser is connected to the Website. This eliminates the need for the Client to provide confidential personal and credit information to the Website, where security of such confidential information is at risk of interception and fraudulent use by fraudsters (persons committing fraud) and hackers. These fraudsters and hackers use techniques to acquire confidential information by launching effective malicious attacks, such as phishing, pharming, key-loggers, encryption-breaking, pass code-guessing, man-in-the-middle, SQL injection, and/or denial-of-service, all of which are attacks which are inhibited by the system and method herein.
  • An Authentication Server provides a means for secure web browsing and payment transaction between client and E-merchant. The authentication server acts as a trusted third party for storing client data such as log-on and credit card information. The system eliminates the need for a client to maintain numerous log-in parameters and to provide financial information directly to a web merchant.
  • Attacks on servers include SQL Injections, Brute Force|Password Guessing, and DoS Attack. Attacks on Users include Phishing, Pharming, Key Loggers, and Cross-site scripting. Hybrid Attacks include Man In the Middle.
  • Terms Used in the Description of the Secure Authentication and Transaction System
  • Application or Application Server—The application whereby users are logging into or the system is executing a transaction or transactions.
  • Authentication Server—The trusted system who authenticates both the Client and the Application (Web Site).
  • Client—Browser or browser like program.
  • Client Token—Token issued to the users.
  • SDK—Software Development Kit.
  • API—Application Programming Interface.
  • Integration or Integration server software—Instructions and commands that the Authentication Server will recognize and or respond to. Usually accomplished through an SDK or APL
  • LDAP—Lightweight Directory Access Protocol
  • Active Directory (AD)—AD is a directory services database, and LDAP is one of the protocols that can be used to communicate with it.
  • Connector—An architectural element that models interactions among components and provides rules that govern those interactions typically through an SOK or API.
  • Phishing is e-mail fraud. A fraudulent e-mail is sent as bait for a scam. It can be anything from a request to login to your account to buy an item at a wonderful low price, to a notification that you have won a free gift where you just have to pay for shipping. Reality is they just want your card numbers or login information or some other piece of information that can be used for profit. In its most popular form, it occurs when numerous accountholders receive an e-mail, allegedly sent by a financial institution, persuading them to supply private identifying personal and account information online. Phishing scams are one of the most rapidly growing forms of fraud on the Internet, and are the latest addition to the global identity theft epidemic. Phished is where a phony server displays a page that looks like the real one. Users can be easily fooled by this server and unwittingly give their (user name) and (token) to the wrong server. The wrong server or fraudsters can then login to the real site and take control. It is one time use only, because there is a time interval (attackers can only gain access to the accounts as they are Phished, not whenever they want).
  • Pharming is an attack on the DNS (Domain Name Server). Throughout the Internet, a series of domain name servers (DNS) quietly resolve the familiar addresses you type into specific Internet addresses. These servers are basically large directories of common names such as Amazon, Google, and Microsoft, and IP-specific addresses that you never see. For example, if you type www.cnet.com, this request goes to your nearest DNS server, which then locates the registered Internet address for the Web server at CNET Networks. It's much more convenient than always remembering 222.123.0.0 or something similar. However, this translation is also a weak link in the Internet's infrastructure. With every Internet request first bouncing off a DNS server somewhere on the planet, criminal hackers realized (some time ago) that rather than flooding a specific domain and effectively hiding it from the rest of the world (in what's known as a denial-of-service attack), they can either change the DNS record or take down the DNS system altogether. By making a phony site and changing the DNS record, a fraudster will not only fool the user, he/she will also fool your browser. If this is done to a financial institution or merchant site, fraudsters can get credit card numbers and personal information that can be used later on for identity theft.
  • Key-loggers are small programs that run in the background on your computer and capture every key stroke you make. With this kind of an attack a user can go to legitimate sites like their bank and/or merchant sites and the key-logger will record all of the user names, passwords, and card numbers used to login and make purchases. Verification services like Verified by VISA are rendered useless because everything that a user must type to verify themselves can be recorded by the key-logger.
  • Encryption braking—Fraudsters have generally taken the path of least resistance, and with all of the easy ways to get card numbers and or identity information, encryption braking is still a threat. Fraudsters have tools that can break outdated encryption algorithms. It only takes one clever hacker to write a program to break an encryption algorithm and then share it online. That is when an encryption algorithm becomes outdated.
  • Password guessing—Some sites are vulnerable to password guessing. Attempted solutions include locking out a user with too many failed attempts.
  • Trojan horse—Trojan horse attacks pose one of the most serious threats to computer security. According to legend, the Greeks won the Trojan War by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. In today's computer world, a Trojan horse is defined as a malicious, security-breaking program that is disguised as something benign. For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks.
  • Man in the middle—In cryptography, a man in the middle attack (MITM) is a type of attack where a user gets between the sender and receiver of information and sniffs any information being sent. In some cases users may be sending unencrypted data, which means a man-in-the-middle can easily obtain any unencrypted information. In other cases an attacker may be able to obtain the encrypted information from the attack, but have to de-encrypt the information before it can be read. A hacker can also be inline between B and C using a sniffing program to watch the conversation. This is known as a man-in-the-middle attack. A common component of such an attack is to execute a denial-of-service (DoS) attack against one end-point to stop it from responding. This attack can be either against the machine to force it to crash, or against the network connection to force heavy packet loss.
  • Session hijacking—TCP session hijacking is when a hacker takes over a TCP session between two machines. Since most authentications only occur at the start of a TCP session, this allows the hacker to gain access to a machine. A popular method is using source-routed IP packets. This allows a hacker at point A on the network to participate in a conversation between B and C by encouraging the IP packets to pass through its machine. If source-routing is turned off, the hacker can use blind hijacking, whereby it guesses the responses of the two machines. Thus, the hacker can send a command, but can never see the response. However, a common command would be to set a password allowing access from somewhere else on the Internet.
  • Hash Function—A hash function H is a transformation that takes a variable-size input m and returns a fixed-size string, which is called the hash value h (that is, h=H(m)). Hash functions with just this property have a variety of general computational uses, but when employed in cryptography the hash functions are usually chosen to have some additional properties. The basic requirements for a cryptographic hash function are:—The input can be of any length. The output has a fixed length. H(x) is relatively easy to compute for any given x. H(x) is one-way. H(x) is collision-free. A hash function H is said to be one-way if it is hard to invert, where hard to invert means that given a hash value h, it is computationally unfeasible to find some input x such that H(x)=h. If, given a message x, it is computationally infeasible to find a message y not equal to x such that H(x)=H(y) then H is said to be a weakly collision-free hash function. A strongly collision-free hash function H is one for which it is computationally infeasible to find any two messages x and y such that H(x)=H(y). The hash value represents concisely the longer message or document from which it was computed.
  • Multiple Shiftkey Replacement (MSR) is an example of a patternless encryption and decryption system and method. Salt—Salt is a term used when talking about Hash Functions. Salt is a random string added to the message string before it is hashed. Although Hash Functions are one way and can't be reversed, an attacker can hash guessed messages and compare the hashed numbers to captured hashed number to get useful information. This kind of an attack is not feasible when salt is added. In the SuperCash system, the “Salt” is different for every transaction, making the hashed number unique for every transaction, making an attack useless anyway.
  • Small Key|Large Key Encryption—The Large Key is a standard MSR Key,—It includes random sets of replacement cipher text characters for each plain text character and a random set for the encoding Matrix and a random set for null or place holders so that the message will be in matrix sized chunks. The Small Key is a password that only the user should know. The Small Key affects the whole encryption process.
  • Token system—A current device that produces a predictable pseudo-random number in given intervals and the authenticating server produces the same pseudo-random number in the same intervals. A user is asked to give a (user name) and (the token) or pseudo-random number. The authenticating server compares the numbers to authenticate. The token device is expensive. The token device can be USB device. For a strong fraud preventing device the USB device should have its own processor like a smart card so that the Disk can't be copied or tampered with. For an economical device a standard medium can be used.
  • Cash files or one time cash files—Client information double encrypted, once using a hidden key on the Disk or PC, again using a password or PIN number known only to the user. Disk—Refers to any removable media. Client—Person or entity that wants to initiate a transaction. Fraudster—Person attempting to commit a fraud. Gateway—The system/server that is used to process transactions for merchants or other institutions like e-trade, check free, bill paying services, and the like. It also refers to system/server that is used for remote logins|authentication.
  • A version of a secure payment transaction system and method herein is referred to as “SuperCash,” which is a system that can handle transactions from Credit, Debit or Prepaid accounts like VISA, MasterCard, American Express, Discover, check cards, gift cards, ATM cards basically customer to business or business to business. Another version of a secure check transaction system and method herein is referred to as “SuperCheck,” which is a system that can handle transactions that are normally done with personal check, business checks, payroll, travelers checks, money orders, cashers checks, rebate checks or the like, with the ease of an e-mail. A further version of a secure authentication system and method herein is referred to as “SuperID,” which is a system that allows a remote client to login securely.
  • Therefore, there has been identified a continuing need to provide a secure authentication and transaction system and method.
  • Invention Summary
  • Briefly, and in general terms, the present invention, in a preferred embodiment, by way of example, is directed to a secure user authentication system, operable over a client-server communications network to authenticate a system user. The system includes an application server, in the client-server communications network. The application server includes a site, wherein the site is able to be enabled to comprise an enabled application server site. The system further includes an authentication server, in the client-server communications network. The authentication server is able to enable the application server site to comprise the enabled application server site. The authentication server includes a core database, and which receives and stores user authentication-enabling data in the core database.
  • The system includes an authentication server, client tokens, and a means for the application to integrate to the authentication server. It includes a client, in the client-server communications network, and a client token, wherein the client token may comprise a program or an element which achieves the same or comparable results, which is able to be actuated in the client. The client token includes the user authentication-enabling data, and, upon actuation thereof, automatically directly connects to the authentication server, and sends the client authentication-enabling data to the authentication server, for secure user authentication by the authentication server. The client token does not send the user authentication-enabling data to the enabled application server site.
  • In accordance with the system, with respect to an API integration, a party may provide the API and another party may do the integration. The API dictates how things are communicated. If the application provides an SDK or API, then the system can integrate the authentication server to the application. This would add code to the authentication server so that it would communicate with the application. In such case the application provides the APL. This can be achieved if the application is big, is used by many companies, or issued by many users or developed by a big company.
  • Parameters of a version of the secure authentication and transaction system and method herein are as follows: with one way Hash Functions, the string to be Hashed includes information from the disk, the password or PIN, and Salt from authentication server. The encryption is unbreakable or as close to unbreakable as possible (MSR encryption and SHA-2 Hash Functions have this ability). An attacker is not able to get the plain text from the cipher text. The encryption is implemented so that each cipher text created is unique. The cipher text messages are one use only (MSR encryption has this ability). The only thing to distinguish cipher text produced by a particular key is the key serial number. An attacker who has collected many cash files is not be able to calculate or somehow get the encrypting Key. The encryption is implemented so that if a cash file is manipulated in any way the authentication is rejected. One-way Hash Functions will also work in place of encryption. The media is removable (e.g. a CD-ROM, USB device or Memory Stick). For practicality, the media may be compatible with legacy systems like magnetic strips and compatible with Personal Computers for e-commerce. The media should be upgradeable to accommodate future systems like RF-proximity.
  • In aspects of a version of the system, the secure payment transaction system and method includes New Disk designs which include: CD-ROM—as a payment device instead of standard credit card. Debit cards used online were only good for home use because full sized CD-ROM requires an install procedure. CD-ROM|Magnetic strip combination—a credit card sized CD-ROM required a carriage to fit in a standard CD-ROM Drive. The system herein uses a Card CD-ROM with a magnetic strip on the side. Advantage—no carriage needed to fit in a standard CD-ROM Drive. CD ROM|RF proximity chip combination, put a chip on a CD ROM. Advantage—no swipe is needed for fast checkout at a Point of Sale Terminal (P.O.S.T.) Because it is on a CD-ROM, it is compatible for home use on line (e-commerce). CD ROM|Magnetic strip|RF proximity chip combination—a chip and a magnetic strip on a CD ROM. USB device—as a payment device instead of a card—for a payment system. USB device|Magnetic strip combination—a magnetic strip and USB device together. USB device|RF proximity chip combination—an RF proximity chip in a USB device. USB device|Magnetic strip|RF proximity chip combination—a Magnetic strip, USB device and RF proximity chip together. Advantages—USB devices are compatible with personal computers so online usage is easy. Advantage with a magnetic strip—it is backwards compatible with magnetic swipe machines. Advantage—RF—proximity doesn't need to be swiped, so it is easy and fast at checkout (P.O.S.T.). PC—refers to any non-removable media like a hard drive. Based on one time cash files and direct communication it employs. Something you have (Disk) plus something you know (PIN). One time use only cash files. The cash files are sent directly to the authenticating server (fraudsters don't even get to see the one time cash file, let alone use it to get information or use it for anything).
  • User experience using SuperCash to make a transaction will be improved over current standards. Currently the user must trust that the site he/she is going to give their account information to is—Not going to get hacked into, Not share this information with other companies that might get hacked into, Not have an employee steal their information, Not share this information with other companies that might have an employee steal their information. Once the trust is there the user must—Fill out a billing address—Address 1, Address 2, City, State, Zip, Country. Select an account type (Visa/Master card/American Express . . . ). Fill out a sixteen digit credit card account number. Fill out the verification code on the back of the card. This is a lot of information to type out every time you want to make a transaction. This takes about nine steps. With SuperCash trust is not an issue because you do not give your account information to any merchant. With SuperCash, the user must—Insert the disk. Enter a Password or PIN. That is it. The SuperCash system is a two step process versus the nine step process currently used.
  • In other aspects of a system version, the secure check transaction system and method creates a cash file that can be saved to the hard drive or other media. The client can then upload the file to a merchant or e-mail to a friend or family member. The receiver can then login to their online banking and upload the received cash file. Merchants can automate this process and deposit the cash files received through a Gateway in real time. This system can be used with Check 21 or ACH systems. This system can be used instead of Check 21 or ACH . . . basically (customer to business) or (business to customer), or (business to business) or (customer to customer). Based on one time cash files it employs. Something you have (Disk) plus something you know (PIN). One time use only cash files. The cash files are made out to the receiver, and either uploaded to a site or e-mailed to the receiver. Generally the one time cash file from SuperChecks will be deposited fast, so if anyone got it, it would have been too late. Even if the fraudsters got the cash file before the receiver made the deposit they can't make the deposit because it was not made out to them.
  • In still other aspects of a system version, the secure authentication system and method, by using a SuperID system, is cheaper and more secure than a Token system. Token systems can be Phished, SuperID can't be Phished. Based on one time cash files and direct communication it employs. Something you have (Disk) plus something you know (PIN). One time use only cash files. The cash files are sent directly to the authenticating server (fraudsters don't even get to see the one time cash file).
  • The MSR Login System is a replacement for Tokens. Currently Tokens are used for secure remote Logins. The user is given a device that gives a predetermined set of random numbers. A new random number is displayed every 60 seconds on the device. The user goes to the site he/she wants to login to and enters a user name and the random number displayed on their token. (Something you know plus something you have) (This system is vulnerable to a Phishing or Pharming attack. An attacker can make a site look like the real one and for example send an email to the victim with a link to the phony site. The phony server will then capture the password and the one time 60 second random number and then login to the real site. Maybe the phony site will say to the victim that the site is down right now an to try back latter).
  • With the SuperID Login System the user goes to the site and the site writes a Cookie to the users PC. The SuperID program will then read the information in the cookie along with data on the disk and Password that only the user should know. The SuperID program will then encrypt the data and send a POST directly to the Server via an IP address not a URL. The SuperID Login System will authenticate the user. (SuperID is not vulnerable to a phishing attack. The user has to be on the real server in order to receive the cookies) What makes this system different from all of the other systems—It is easy to use (only a PIN to remember). No extra hardware (unlike smartcards). No extra software, Easy to implement. It can be implemented in JAVA making it cross platform compatible. Security—It will protect against Phishing, Pharming (DNS hijack) and Spoofing of all kinds. It will protect against phony Merchant fraud. The Clients will not be compromised if the merchants gets hacked into. It will protect against merchants from giving your card numbers to third parties.
  • In another aspect of a system version, the secure authentication and transaction system and method addresses the divergent needs and issues of a variety of players—payment networks, end users, card issuers, merchants, and processors. No changes to the Visa/MC system. The solution works within the given boundaries and confines of the existing transaction systems. Minimized consumer-facing security solution. Certifying to the MSR solution makes business sense to gateway processors, who take their cues from the payment networks. Processors generally utilize and follow what the payment networks create. Most of the gateway-generated solutions are back office transaction analysis-oriented. Gateways generally will not attempt to force a consumer-facing solution (Other Solutions have failed when they tried a consumer-facing security solution. Example: Verified by VISA). Card issuing banks see immediate benefits to the program, at minimal cost. Merchants would not be limited in their choice of a gateway service provider. The solution works alongside the current system to allow for a migration to the new system. Simplicity. Prevents transaction abandonment on the part of consumers due to confusion surrounding a checkout process change. End users would have a strong, demonstrated preference for a given solution to gain adoption. There are a variety of examples from the past, demonstrating that regardless of how easy the technology provider believes it is to use, consumers have a much lower threshold for usage and adoption.
  • In still further aspects of a system version, the secure authentication and transaction system and method prevents attacks, including Phony Phishing and Pharming sites are completely cut out of the loop for both the SuperCash and SuperID system. Phony sites are completely cut out of the loop for both the SuperCash and SuperID system even if the DNS servers have been compromised because SuperCash and SuperID systems use direct communication via an IP address bypassing the DNS servers. With the SuperCash and SuperID most of the information is never keyed in so a key-logger can only get a PIN. All of the authenticating information is completely hidden to a key-logger and to the user that is what makes it easy to use. The SuperCash and SuperID system makes use of either unbreakable encryption or one way hash functions.
  • The SuperCash system makes user of one way hash functions in conjunction with salt. With one way hash functions there is simply not enough data transmitted to reverse the process it can't be broken. One way hash functions can have “guessed strings” that will hash to the same number but the “guessed string” will not have any useful data. With SuperCash and SuperID an attacker cant even start a password guessing attack. With the SuperCash and SuperID systems the authenticating information is not installed nor does it reside on the computer it is stored on the disk itself. It won't stop you from getting a Trojan or stop the Trojan from doing damage to your computer but it will prevent the Trojan from getting any information from the SuperCash or Super:ID disk. With SuperCash there is only an authentication. The process is done after that. With the SuperID a command to set a password doesn't exist and the user authenticates with unique information each time this also helps prevent a Denial-Of-Service (DOS) attack.
  • These and other aspects and advantages of the invention will become apparent from the following detailed description and the accompanying drawings, which illustrate by way of example the features of the invention.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram illustrating login in a secure authentication and transaction system;
  • FIG. 2 is a block diagram illustrating redirection for authentication in the system;
  • FIG. 3 is a block diagram illustrating checking an authentication;
  • FIG. 4 is a block diagram illustrating secure connection;
  • FIG. 5 is a flow chart of a request to the authentication server;
  • FIG. 6 is a flow chart of user authorization by the authentication server;
  • FIG. 7 is a flow chart of a response by the authentication server;
  • FIG. 8 is a screen shot of an application server site, including a client token window in a version of the system;
  • FIG. 9 is a screen shot of the client program window;
  • FIG. 10 is a screen shot of the shopping cart page of the application server site including the client token window in a version of the system;
  • FIG. 11 is a screen shot of the checkout page of the application server site, including the client token window;
  • FIG. 12 is a screen shot of the client token window displaying a transaction amount and website owner;
  • FIG. 13 is a screen shot of the client token window after clicking the submit button, where the transaction has been authorized;
  • FIG. 14 is a screen shot of the client token window upon completion of the transaction where the transaction has been authorized;
  • FIG. 15 is a screen shot of the client token window, upon clicking the submit button, where authorization has failed;
  • FIG. 16 is a screen shot of the client token window, upon completion of the transaction, where authorization has failed
  • FIG. 17 is a flow chart of a version of a payment system in the secure authentication and transaction system;
  • FIG. 18 is a flow chart of fraud failure in the payment system;
  • FIG. 19 is a flow chart of a current authentication system;
  • FIG. 20 is a flow chart of a fraud in the current system;
  • FIG. 21 is a flow chart of a current token system;
  • FIG. 22 is a flow chart of fraud in the current token system;
  • FIG. 23 is a flow chart of a version of the secure authentication system;
  • FIG. 24 is a flow chart of a fraud failure in the secure authentication system;
  • FIG. 25 is a flow chart of a version of the secure transaction system;
  • FIG. 26 is a flow chart of the version of the secure transaction system;
  • FIG. 27 is an elevational view of a version of a device including a client program for a secure authorization and transaction system;
  • FIG. 28 is an elevational view of another version of a device including a client token for the system;
  • FIG. 29 is a screenshot of a client token window for entry of transaction data in the system;
  • FIG. 30 is a screenshot of the client token window after clicking the submit button where the transaction is complete;
  • FIG. 31 is a screenshot of a client token window for entry of transaction data in the system;
  • FIG. 32 is a screenshot of the client token window after clicking the submit button where the transaction is complete;
  • FIG. 33 is a screenshot of a client token window for entry of transaction data in the system;
  • FIG. 34 is a screenshot of the client token window after clicking the submit button where the transaction is complete;
  • FIG. 35 is a screenshot of a client token window for entry of transaction data in the system;
  • FIG. 36 is a screenshot of the client token window after clicking the submit button where the transaction is complete;
  • FIG. 37 is a screenshot of a client token window for entry of recurring charges transaction data in the system;
  • FIG. 38 is a screenshot of a client token window for entry of recurring charges transaction data in the system;
  • FIG. 39 is a flow chart of a current transaction system;
  • FIG. 40 is a flow chart of a current transaction system;
  • FIG. 41 is a flow chart of a payment system in the secure authorization and transaction system herein;
  • FIG. 42 is a screenshot of a client token window for entry of checking transaction data in the secure authentication and transaction system;
  • FIG. 43 is a screenshot of a client token window for entry of checking transaction data in the system; and
  • FIG. 44 is a screenshot of a client token window for entry of checking transaction data in the system.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The system according to the invention includes a system 10, as illustrated in FIGS. 1-3 , for conducting secure authentication and secure transactions over a communications network such as the Internet.
  • The system 10, for example, includes a Client Token 12, wherein the Client Token 12 may comprise a program or an element which achieves the same or comparable results, which may be on media such as a CD-ROM, or may be downloadable, or may be otherwise provided, an Authentication Server 14, a Client Pass Code, which is used in conjunction with the Client Token 12, and an Enabled Website 16.
  • The Client is the person to whom the Client Token 12 has been issued.
  • The Client Program 12 is directly linked to the Authentication Server 14, and is issued by the implementer of the Authentication Server 14. The Client Program 12 has the following features: (1) it is designed to auto-run once opened on the computer or inserted into a disk reader; (2) it has a Serial Number embedded in it; (3) it includes an Account Number which is unique and identifies the Client; (4) it has a Label to enable the Website 16 and to enable the activity that the client is undertaking; (5) it has the Authentication Server IP address, which specifies the issuing Authentication Server for this specific Client Program.
  • The Authentication Server is a server which authenticates Clients and application servers (such as Websites) to each other. Through the Authentication Server, Clients authenticate themselves to the Authentication Server, servers authenticate themselves to the Authentication Server, and the Authentication Server authenticates each Client and server to each other. The Authentication Server includes a core database which it uses to match up Clients and servers. The Authentication Server core database has a series of attributes, including, for Clients, data regarding the client, (e.g. name and password) to which any client information can be attached (e.g. first name, last name, address etc.), and for servers, the Website signature, as registered by the Website with the Authentication Server, which can be attached (e.g. the Website name, and for transactions, where the money is going, to whom and for what). The Authentication Server directly connects the Client Token thereto, automatically, in the background.
  • The Pass Code is selected by the Client, and is only known to the Client and the Authentication Server 14. It has substantially no limits on the size (length) of the Pass Code, or on the type of characters that can be utilized, (e.g. “Mary had a little lamb,!@#$%”&*“( )”) except for operators such as the word “enter”.
  • The Website 16 is registered with the Authentication Server, and is enabled by being modified to provide a “Login” button in place of the traditional “username”/“password” fields. The underlying Login function is modified to provide a secure request to the Authentication Server 14, so as to confirm the validity of the Client credentials, which replaces the normal SQL access to the database.
  • In general, when the Client arrives at the Website 16, the system runs, and the Client validates the web credentials in the system and enters the Client Pass Code. The system validates the Client and allows access to the website once the Login button has been pressed.
  • For the Login process, as seen in FIG. 1 , when the Client wishes to Login to the Website 16, the Client Browser 18 connects the Client to the Website 16. In the background, hidden to the Client, when the Client Browser 18 is ready to go the login page of the Website 16, the Client Browser 18 is redirected to the Authentication Server 14, as seen in FIG. 2 , and the Authentication Server 14 redirects back to the Login page on the Website 16. The Authentication Server 14 receives a server ID number field from the Website 16, so that it knows where to redirect back to, which includes information about the type of transaction being performed (either Login or Payment). The Authentication Server 14 writes a rookie to the Browser 18, and the Client Token 12 reads the cookie of the Browser 18, with a unique Certificate and Label embedded in it, and sets the status of the Login as “pending”. The Authentication Server 14 redirects the Client back to the Login page on the Website 16 and POSTS the same Certificate to the Website 16.
  • At this point, nothing can happen until the Client Token 12, running on the Client's computer, reads the Cookie, and the Client enters the Pass Code by hitting a “submit” button which passes the Login request through.
  • When the Client Program 12 is run, as shown in FIG. 2 , it reads the Cookie and extracts the Certificate. This is combined with the Serial Number and Pass Code, and run through a one-time Hash. The Hash is a transformation function, which takes a variable-size input and returns a fixed-size string, a one-way function which is impossible to invert to find the underlying input, and which is collision-free in that it is computationally not feasible to find any two inputs with the same resulting Hash. The inputs to be hashed herein are the Certificate, Serial Number, and Pass Code, resulting in the Hash output. The Hash output, the Certificate, and the Account Number are sent directly from the Client Program 12 to the Authentication Server 14 using the embedded IP address of the Authentication Server 14, which is hard coded in the Client Program 12 and cannot be changed.
  • Once the Authentication Server 14 has received the Hash, the Certificate, and the Account Number, it performs the same hash process, using the Pass Code it has in its database, the Serial Number, and the issued Certificate. If the Hash output at the Authentication Server 14 matches the Hash output sent to it from the Client Token 12, the Client is authenticated, the Authentication Server 14 responds back to the Client, and the Certificate is set to “active”. The Client has now received an “authenticated” message back from the Authentication Server 14. The Client is now free to click on the “Login” button on the Website 16.
  • When the user hits the Login button, as in FIG. 3 , the Web site 16 asks the Authenticating Server 14 to check to see if the Client has been authenticated as either “active” or “failed”, and the Certificate expires.
  • The Website 16 and the Authentication Server 12, as illustrated in FIG. 4 , are connected to each other through a secure connection 20, for example through a trusted Isolated Local Area Network (LAN), or alternatively through a Secure Socket Layer (SSL) or a Virtual Private Network (VPN), and are connected to the Web 22 for example through Firewalls 24 and a Proxy Server 26. If the authentication is acknowledged as “active”, then the Website 16 lets the Client in. Once the Website 16 has received an authentication acknowledgement as “active”, any rights associated with the Client are assigned.
  • The Payment operation is the same as the above Login process, with the addition of fields that are transferred between the Website 16 and the Authentication Server 14, as illustrated in FIGS. 1-3 . The Client is identified by a similar mechanism to the login process, but in addition the Authenticating Server 14 passes stored credit card information to a Payment Gateway which leads to the banking payment transaction network and returns “active” or “failed” to the Website 16.
  • The Client checks out by clicking the account type to pay with, e.g. Visa, Master Card, AMEX. A merchant will display only the types they accept. The Website 16 will redirect to the Authentication Server 14. The Authentication Server 14 will write a Certificate and a Label to a Cookie and redirect to the Client to complete the transaction page on the Website 16. On the redirect the Authentication Server 14 will POST the same Certificate to the Website 16.
  • During the redirection, the information supplied by the Website 16 is customizable, for example as follows: name of the item being purchased—the short name; product ID—normally SKU number; quantity being purchased; description of the product—the long description; unit price; total amount; shipping address for this order; and address fields for: city; state; zip code; country.
  • The Authentication Server 14 responds in a similar manner to the login mechanism and issues a Certificate to the Client Program and the Website 16. In addition, a tracking value is also returned.
  • The system extracts information from the Cookie to display (independent from the Website 16) the payment amount and who it is to be sent to. This allows the Client to know exactly what is going on. This process will be tailored to the requirements of individual merchants on a case-by-case basis
  • The system of the invention, as seen in FIGS. 1-4 , comprises a secure user authentication system, operable over a client-server communications network to authenticate a system user. It includes an application server, in the client-server communications network, which includes a site, wherein the site is able to be enabled to comprise an enabled application server site, and an authentication server, in the client-server communications network, which is able to enable the application server site to comprise the enabled application server site. The authentication server includes a core database, and receives and stores user authentication-enabling data in the core database. The system further includes a client, in the client-server communications network and a client token, wherein the client token may comprise a program or an element which achieves the same or comparable results, which is able to be actuated in the client, which includes the user authentication-enabling data, and which, upon actuation thereof, automatically directly connects to the authentication server and sends the client authentication-enabling data to the authentication server for secure user authentication by the authentication server, and which does not send the user authentication-enabling data to the enabled application server site.
  • The application server is further able to redirect the user to the authentication server for secure user authentication by the authentication server.
  • The client-server communications network may comprise the Internet. In such a network, the authentication server includes an Internet Protocol address which specifies the authentication server which issued the client token, and the client token includes the authentication server Internet Protocol address. The Internet Protocol Address of the authentication server embedded in the client token is hard coded and unchangeable in the client token. The application server site in such network comprises an Internet application server website.
  • The application server site includes a login button, the authentication server, independent of actuation of the login button, authenticates the user, for secure user authentication, and, upon actuation of the login button by the user, the application server checks with the authentication server for secure user authentication by the authentication server. The enabled application server site does not provide for entry by the user of a username and password for user authentication.
  • The client token enables a passcode selected by the user to be entered thereinto, and the user authentication-enabling data, received and stored in the authentication server core database, includes the user-selected passcode. The client token enables the passcode selected by the user to be of substantially any length and to include substantially any type of character.
  • The enabled application server site comprises an application server site which is registered with the authentication server.
  • The client further includes a client browser program. The client browser program, upon activation thereof, connects the user to the enabled application server site, and the authentication server securely authenticates the user while the client browser program is connected to the enabled application server site. The application server site includes a server identification number field which the authentication server receives from the application server site accessed by the client browser program, so that the authentication server knows where to redirect back to, and which includes data regarding the type of transaction being performed.
  • The enabled application server site checks with the authentication server to determine secure use authentication.
  • The client token includes a serial number embedded therein, and the client authentication-enabling data includes the client token embedded serial number.
  • The client token includes an account number which is unique and which identifies the user, and the client authentication-enabling data includes the client program account number.
  • The client token includes a label which verifies the enabled application server site, and which enables the activity that the user in undertaking. The client further includes a client browser program, and the authentication server is able to write a cookie to the client browser program, which cookie includes the label, and a unique certificate, embedded in the cookie. The client token, upon activation thereof, reads the authentication server cookie and extracts the certificate, and runs the combined certificate, serial number, and passcode through a one-time hash, generating a client token hash output. The client token, upon activation thereof, uses the embedded Internet Protocol address cookie of the authentication server to send the client token hash output directly to the authentication server.
  • The authentication server, upon receipt of the client token hash output, the certificate and the account number from the client token, performs the same hash process as was performed by the client token, using the passcode in the authentication core database, the serial number, and the certificate to generate an authentication server hash output. The authentication server, upon the user actuating the login button, checks the client token hash output against the authentication server hash output, to determine whether the user has been authenticated, and, depending upon whether there is a match or there is no match, sets the certificate to either “active” or “failed” responsive thereto, the application server requests the authentication server to advise whether the certificate has been set to “active” or “failed”, and upon the request from the application server the certificate expires. The authentication server se the certificate to “active”, any rights associated with the user are assigned to the user by the application server site
  • The authentication server is able to authenticate the client and the application server to each other. The authentication server is able to authenticate the user, the application server, and the user to the application server.
  • The authentication server core database is able to authenticate the user, and pushes the user account number to the application server.
  • The authentication server site core database includes attributes for the user and for the application server.
  • As illustrated in FIGS. 1-4 , for logins or transactions, when a user attempts to navigate to the login page, the Website will redirect to the MSK Authentication Server (Auth Server). The Auth Server will write a Certificate and a Label to a cookie, and redirect to the user to the login page on the website. On the redirect the Auth Server will POST the same Certificate to the website.
  • The user will enter a Passcode (Passcode is known only to the user and has substantially no limits on the kind of characters that can be entered (i.e. {“Mary had a little lamb!@#$%“&*”0)”}). The user will either hit the enter key or mouse click the Submit button and the MSK Client will respond with either Authorized or Failed.
  • The user can now login to the website by clicking the Login button on the website or complete the transaction by clicking the complete payment button on the site. The website will connect MSK Authentication Server through either SSL, VPN or through a trusted Isolated LAN connection to check if the user has been authenticated.
  • For transactions, the user checks out by clicking on the account type he/she want to pay with i.e. Visa, Master Card, AMEX . . . Note: a merchant will display only the types they accept. Website will redirect to the MSK Authentication Server (Auth Server). The Auth Server will write a Certificate and a Label to a cookie and redirect to the user to complete transaction page on the website. On the redirect the Auth Server will POST the same Certificate to the website.
  • The client starts by shopping online. Once the client is finished shopping like normal he/she will be directed to either a payment Gateway or in house Checkout page. If the SuperCash system is used as a payment method, the merchant will POST its merchant ID, the client will be redirected to the SuperCash System, and back to the merchant. This process is seamless—the average user will not even notice that they had left the merchants site. Either the merchant or SuperCash system can give the client instructions to insert their SuperCash Disk. The program will read the “Tracking Number” and “Salt” written to cookies by the SuperCash server. The program will also read the card number and other card information from the disk. The SuperCash Program will also read the PIN entered by the client. (The only thing the client has to do is insert the disk and enter a PIN). The SuperCash Program will send the Cash File directly to the SuperCash Server via IP address, not URL. This will prevent Pharming attacks.
  • The first line in the Cash File starts with the card number, next line is the tracking number, last line is the Hashed number. The Card number will fill the standard card number required by (VISA, Master Card, American Express, etc . . . ). The tracking number and hashed number are on the Extra fields making the SuperCash system compatible with the current system. The string that is hashed is the card information plus the “Salt” and the PIN. The salt is random and unique every time, making the hash unique or one time only. Once the program sends the Cash File directly to the SuperCash server, the transaction is sent on to VISA, Master Card, etc . . . like normal to be completed. The client then clicks the Complete Transaction button to confirm that he/she has been approved.
  • What the client sees: The client shops online. On the checkout the client will be asked to insert the disk. The program on the disk will ask for the PIN. Once submitted the program will indicate when it's done. The “Complete Transaction” button is clicked to confirm that the client is done. The merchant will be sent either an approved or denied message for the client to see.
  • What the merchant sees: The user shop onsite normally. On checkout they are re-directed to the SuperCash Server and the merchant ID is Posted to the System. The merchant can also send an itemization of what was bought along with descriptions and prices. The user is re-directed right back to a page on your site with the “Complete Transaction” button on it. They click it and the merchant is sent either an approval or denial.
  • What (VISA, Master Card, etc . . . ) sees: Card numbers in the correct field, a tracking number, the Salt string and hash number in three of the extra fields. That's it.
  • What the banks see: New cards are issued to their customers. When customers use the disk, they will receive from (VISA, Master Card, etc . . . ) the card number, the tracking number, the salt string and the hash number. The string can then be put together and run a hash on it and compare to authenticate. The results are that they won't have the cost of online fraud or the inconvenience to their customers. Their customer will feel safe shopping online.
  • In the secure transaction system and method, the Payment File includes the following: Card details—Label, Key file name, Card number (part of the string to be hashed), Card Type (VISA, Master Card, etc . . . ) (part of the string to be hashed), Expiration Date (part of the string to be hashed), Card number displayed in plain text, First Name, Last Name, Address 1, Address 2, City, State, Zip. User Input—PIN. Submit button. From Cookie information written by SuperCash Server—Tracking Number, Salt.
  • In the secure authentication system and method, the Payment File includes the following herein: Cash File details for SuperID,—Label. Key file name. Extra field left over from SuperCash. Cookie name. Full address to send Cash File (IP not URL). This will prevent Pharming attacks. User ID displayed in plain text. From Disk file cardinfo.data—First Name, Last Name, Address 1, Address 2, City, State, Zip. User Input—PIN, Submit button. From Cookie information written by Remote Server—Tracking Number, Salt (optional only if you use Hash Functions instead of encryption like MSR).
  • Referring to FIGS. 27-28 , a first type of device for the secure authentication and transaction system is shown in FIG. 27 , and a second type of device for the secure authentication and transaction system is shown in FIG. 28 . In. FIG. 27 , a USB|Magnetic Strip|RF proximity chip device is shown, which is a first type of authentication and payment device for a secure authentication and transaction system as described herein. In FIG. 28 , a CD ROM|Magnetic Strip|RF proximity chip device is shown, which is a second type of authentication and payment device for a secure authentication and transaction system as described herein. The first and second types of authentication and payment devices are also referred to herein as the authentication device and the payment device.
  • To use the first version of a secure payment transaction system, as shown in FIGS. 29-30 , input the payment for device, select an account to pay from, enter the Dollar Amount, enter your PIN and confirm it, click the “Submit” button, click “ok” and you are done. This version is an example where the ID and Payment System (SuperCash/SuperID) are merged together in the same program.
  • For use of a first version of a secure authentication system, as seen in FIGS. 31-32 , input the payment device, select login, enter PIN and Confirm, click Submit, click “ok,” and you are done.
  • In a second version of a secure payment transaction system, as referred to in FIGS. 33-34 , input the payment device, enter your PIN, click the Submit button, the Complete window appears, and you are done. This is an example of using a second version of SuperCash. Just insert the disk and enter the PIN number and you are done.
  • In a second version of a secure authentication system, as referred to in FIGS. 35-36 , input the payment device, enter your PIN, click the Submit button, the Complete window appears, and you are done. This is an example of using a second version of SuperID. Just insert the disk and enter the PIN number and you are done. This version is an example where the ID and Payment System (SuperCash/SuperID) are separated.
  • Referring to FIG. 37 , there is shown a recurring charges capability In this example you check the box labeled Recurring Charge, then pick the day of the month you want to be charged, and how many months you want to be charged. This capability will be good for services like AOL or Netflix. The simple version is capable of having recurring charges, you just don't have the upfront control because it assumes how much, how many times and when you are going to be charged is disclosed properly.
  • As shown in FIG. 38 , in the above recurring charges example, the charges are $123.55 on the 15th of the month for 12 months or one year. Charges will be made to Bank of America VISA. What the gateway needs—Merchant ID issued by merchant bank, usually it's the account number, and Terminal ID—issued by merchant bank, similar to POS (Point Of Sale) station.
  • As seen in FIG. 39 , a current system different from the system herein in that the current system functions as follows to enable the user to shop online: Merchant sends authorization request to Gateway. Gateway sends authorization request to Merchant Bank. Merchant Bank sends authorization request to their Clearing and Settling Service. Clearing and Settling Service sends authorization to Issuer. The Issuer approves or declines authorization, and forwards the authorization to the Clearing and Settling Service. Clearing and Settling Service forwards the authorization to the Merchant Bank. Merchant Bank forwards the authorization to the Gateway. Gateway forwards the authorization to the Merchant. Merchant indicates to user that payment was approved or denied.
  • As illustrated in FIG. 40 , the above current system enables fraud to be committed by enabling the client to shop online. Fraudster web sites capture Card Numbers including security numbers like the Card Verification Value 2, by SPAM, Phishing, Pharming etc. Indicate to the user that the transaction did not go through, or that the system is down, or whatever they want, because they just stole the Credit Card number.
  • In the first version of the payment system herein, as seen in FIG. 41 , input the payment device, and the client shops online. On checkout, client is re-directed seamlessly to SuperCash Gateway and back to the Merchant. SuperCash Program sends Cash File directly to SuperCash Gateway. SuperCash Gateway sends authorization request to Merchant Bank. Merchant Bank sends authorization request to their Clearing and Settling Service. Clearing and Settling Service sends authorization to Issuer. The Issuer approves or declines authorization and forwards the authorization to the Clearing and Settling Service. Clearing and Settling Service forwards the authorization to the Merchant Bank. Merchant Bank forwards the authorization to the Gateway. Gateway forwards the authorization to the Merchant. Merchant indicates to user that payment was approved or denied.
  • In the second version of the payment system herein, as seen in FIG. 17 , input the payment device, and the user shops online. On checkout, user is redirected to the SuperCash Gateway. SuperCash Program sends Cash File directly to SuperCash Gateway. SuperCash Gateway sends authorization request to Merchant Bank. Merchant Bank sends authorization request to their Clearing and Settling Service. Clearing and Settling Service sends authorization to Issuer. The Issuer approves or declines authorization and forwards the authorization to the Clearing and Settling Service. Clearing and Settling Service forwards the authorization to the Merchant Bank. Merchant Bank forwards the authorization to the Gateway. Gateway forwards the authorization to the Merchant when the “Complete Transaction” is clicked.
  • Fraud fails in the payment system herein, as illustrated in FIG. 18 , wherein the client Browser goes on to fraudster site—The user goes onto the fraudster site because it looks like a legitimate site, there is no way to tell the difference. Fraudster Sites—Phony Merchants, Phished sites and Spammers. The Fraudsters never even gets the Card numbers or cash files, let alone do anything with it.—It's a Dead End.
  • A current authentication system, as seen in FIG. 19 , operates to enable the function of the Client Browser, Remote Server, Username, Password.
  • Fraud is committed in the current system, as shown in FIG. 20 , wherein client Browser, Phished or Pharmed Remote Server—Username, Password. Fraudsters can login at will once they get the Username and Password.
  • A token system, as shown in FIG. 21 , includes client Browser, Remote Server—Username, Token, Token Device—Only the user knows the Username. Only the Token Device knows the Token Number—The ever changing Token Number. The user goes online and the remote server asks the client to enter their Username and Token Number. The Token Number is changing every 60 seconds or so.
  • Fraud is committed in the token system, as seen in FIG. 22 , as client Browser, Phished or Pharmed Remote Server—The phony server will ask the user for his/her Username—The phony server will also ask for the Token number—Fraudsters can login to the real server and hijack the session but they can't login at will, Token Device.
  • In the SuperID system herein, as in FIG. 23 , input the authentication device, the user goes to the Remote Server—There is no username. There is no password. There is no Token. The SuperID Program—A password or PIN is all that is required. The SuperID program will authenticate the browser.
  • Fraud fails in the SuperID system herein, as shown in FIG. 24 , the user goes to the phony Remote Server—No Username is ever given by the client. No Password is ever given by the client. No Token is ever given by the user. Fraudsters can make a site look like the real site but they can't get authentication information. With the SuperID System, the authenticating information is sent directly to the real server with the IP address, not the URL, bypassing the DNS server, making it impossible to be Phished or Pharmed.
  • In the SuperCash system herein, as seen in FIG. 25 , Gateways can add SuperCash to their system. Merchant can add SuperCash directly to their system. Merchants are not limited to what Gateways provide. SuperCash hashes a string composed of—the Password, Card information, Tracking number, Salt, and the Hash, which is onetime use only. Card number with onetime hashed number and tracking number information will fit on current system.
  • The SuperCash system herein, referring to FIG. 26 , enables actions to be performed—input the payment device, and the Client shops online. When the user checks out he/she will be re-directed to SuperCash. The SuperCash server writes the “Tracking number” and “Salt” Cookies. There are two kinds of Merchants—For the first kind of Merchant, the Merchant sends Client to Gateway and then waits for approval. The user is not redirected back to the Merchant. Instead an instruction to insert the Disk is displayed along with the “Complete Transaction” button. For the second kind of Merchant, Merchant wants to keep the user on their site to control the user experience—the user is instantly redirected back to the Merchants site. The merchant will then display instructions to insert the Disk along with the “Complete Transaction” button. The user inserts the disk and enters their PIN and clicks the Submit button. The Cash File is sent directly to the SuperCash Server via an IP address, not a URL. This protects against a Phishing and Pharming attacks.
  • The Cash File is automatically sent to the Merchants Bank. Merchants Bank process payment with its Clearing and Settling Service just like normal. Clearing and Settling Service locates Issuer Bank and sends authorization request. The Issuer authenticates the card number and Cash File (hashed number) and sends approved or denied just like normal. Clearing and Settling Service sends the approved or denied to Merchants Bank as they would normally. The Merchant Bank send authorization approved or denied to SuperCash Server The SuperCash server will send the approved or denied message to the Merchant or Gateway just like normal. If the client is on the SuperCash Server with the “Complete Transaction” button then a POST will be sent to the merchant “approved or denied”. If the client is on the merchants site with the “Complete Transaction” button then a POST will be sent to the SuperCash Server requesting authorization status and will receive a POST back from the SuperCash Server “approved or denied”.
  • For the SuperCash secure check transaction system herein, as in FIGS. 42-44 , the user makes a Cash File that is double encrypted, Hash Functions will not work. The Cash File is saved as a file and can be sent in an email attachment or uploaded during an online banking session. The user makes the cash file payable to a person or entity. It will be important to make each file generated by SuperChecks unique so they can only be used once. Just fill out the SuperCheck and click the “Submit” button. Save the cash file and you are done. The cash file could be emailed to the receiving person or entity. That person can then upload this cash file to their bank while doing their online banking.
  • While the particular secure authentication and transaction system and method as shown and disclosed in detail herein is fully capable of obtaining the objects and providing the advantages previously stated, it is to be understood that it is merely illustrative of the presently preferred embodiment of the invention, and that no limitations are intended to the details of construction or design shown herein other than as described in the appended claims.

Claims (67)

I claim:
1. A method of authenticating a plurality of clients in an authentication server, comprising the steps of:
storing first authentication-enabling data for each of the clients and information concerning one or more activities enabled over a public network;
receiving a request over the public network to authenticate one of the clients in connection with the client's access over the public network to an application server site,
the request containing second authentication-enabling data uniquely identifying a client token in possession by the client;
authenticating the client based on the first authentication-enabling data and the second authentication-enabling data; and
enabling the one or more activities over the public network for the client at the application server site, if the client is authenticated and the application server site is legitimate; wherein:
the client token is configured to automatically connect to the authentication server upon actuation and to enable an online activity at the application server site when instructed by the authentication server, and the second authentication-enabling data is not readable by the application server site.
2. A method as in claim 1, wherein the application server site is a publicly available website.
3. A method as in claim 1, wherein the client token is configured to require the client's entry of additional authenticating data prior to authentication by the authentication server.
4. A method as in claim 1, wherein the authentication server is configured to host the application server site.
5. A method as in claim 1, wherein the information concerning one or more activities enabled is stored for each client with respect to each of a plurality of application server sites.
6. A method as in claim 1, wherein the information concerning one or more activities enabled is stored for each of a plurality of application server sites with respect to each client.
7. A method as in claim 1, wherein the one or more activities comprise a login.
8. A method as in claim 1, wherein the one or more activities comprise a transaction.
9. A method as in claim 1, wherein the first and second authentication-enabling data further comprise information identifying one or more accounts of the client.
10. A method as in claim 1, wherein the second authentication-enabling data uses or is based on a cookie.
11. A method as in claim 1, wherein the second authentication-enabling data is based on a salt for one time use.
12. A method as in claim 1, wherein one of the client token and the authentication server uses a public key and another of the client token and the authentication server uses a private key.
13. A method as in claim 1, wherein the second authentication-enabling data is made out to the authentication server such that only the authentication server with an appropriate key can read the data.
14. A method as in claim 1, wherein the second authentication-enabling data is for one time use.
15. A method as in claim 1, wherein the second authentication-enabling data is hashed.
16. A method as in claim 1, wherein the client token is configured to store therein and use an internet protocol address of the authentication server.
17. A method as in claim 1, wherein the client token comprises software.
18. A method as in claim 1, wherein the client token comprises hardware.
19. A method as in claim 1, wherein the client token comprises at least one selected from the group consisting of a cell phone and a downloadable program.
20. A method as in claim 1, wherein the client token is configured to run on the client's computer.
21. A method as in claim 1, wherein the client token comprises a processor and a memory.
22. A method as in claim 1, wherein the authentication server determines whether the application server site is legitimate through authentication.
23. A method as in claim 1, wherein the client token is configured for proximity-based radio frequency communication.
24. A method as in claim 1, wherein the client token is configured to store information about the one or more enabled activities for the client.
25. A method as in claim 1, wherein the client is redirected by the application server site to the authentication server for authentication and is redirected by the authentication server back to the application server site after authentication.
26. A method as in claim 1, wherein the public network is the Internet.
27. A method as in claim 1, wherein the authentication server is configured to perform authentication for a plurality of application server sites.
28. A method as in claim 1, wherein the authentication server is configured to store a signature of the application server site.
29. A method as in claim 3, wherein the additional authenticating data comprises a passcode.
30. A method as in claim 4, wherein the second authentication-enabling data includes information regarding the passcode.
31. A method as in claim 9, wherein the transaction is a financial transaction.
32. A method as in claim 11, wherein the one or more accounts are selected from the group consisting of a credit card account, a debit card account, a check card account, an ATM card account, a payroll account, a financial account, and an ecommerce account.
33. A method as in claim 11, wherein the information identifying one or more accounts is encrypted or hashed for processing by an authorized payment gateway or merchant bank, not by the application server site.
34. A method as in claim 11, wherein the client token contains a unique identifier of each of the one or more accounts.
35. A method as in claim 14, wherein the cookie contains information about the application server site enabled for the client.
36. A method as in claim 14, wherein the cookie contains information about one or more activities enabled for the client.
37. A method as in claim 28, wherein the client token is configured to be carried separately from the client's computer.
38. A method as in claim 28, wherein the client token is built into the client's computer.
39. A method as in claim 28, wherein the client's computer is selected from the group consisting of a cell phone, a tablet PC, a laptop computer, and a desktop computer.
40. A method of authenticating a plurality of clients in an application server site, comprising the steps of:
receiving a request for an online activity over a public network from one of the clients,
redirecting the client to an authentication server for authentication,
receiving an indication from the authentication server that the client is authenticated, and
enabling the online activity for the client over the public network when instructed by the authentication server, wherein the authentication server is configured to:
store first authentication-enabling data for each client and information regarding one or more online activities enabled for each client,
receive second authentication-enabling data uniquely identifying a client token from the client in connection with the request,
authenticate each client based on the first authentication-enabling data and the second authentication-enabling data, and
enable the online activity for the client only if the client is authenticated and the application server site is legitimate.
wherein the client token is configured to store information identifying an internet protocol address of the authentication server and to enable the one or more online activities when instructed by the authentication server.
41. A method as in claim 40, wherein the client token comprises a downloadable program in a cell phone.
42. A method as in claim 40, wherein the second authentication-enabling data identifies a particular account of the client.
43. A method as in claim 40, wherein the application server site is hosted at the authentication server.
44. A method as in claim 40, wherein the client token is configured to require additional authenticating data from the client prior to requesting authentication to the authentication server.
45. A method as in claim 40, wherein the client token is configured to connect to the authentication server using an internet protocol address stored therein.
46. A method as in claim 45, wherein the client token, upon actuation, is configured to automatically connect to the authentication server.
47. A portable client token system for use in accessing one or more application server sites over a public network, comprising:
a memory for storing a unique identifier and an internet protocol address of an authentication server,
a software module for generating first client authentication-enabling data based on the unique identifier and enabling an online activity at the one or more application server sites when instructed by the authentication server, and
a communication module for connecting to, and sending the first client authentication-enabling data, over the public network to the authentication server,
wherein the authentication server is configured:
to store second client authentication-enabling data for the portable client token system,
to authenticate a client in possession of the portable client token system based on the first client authentication-enabling data and the second client authentication-enabling data, and
to enable the online activity for the client at one or more application server sites over a public network only when the one or more application server sites are legitimate.
48. A system as in claim 47, further comprising a proximity-based radio frequency communication chip.
49. A system as in claim 47, wherein the portable client token system comprises a downloadable program in a cell phone.
50. A system as in claim 47, wherein the first authentication-enabling data is based at least in part on a salt.
51. A system as in claim 47, wherein the one or more application server sites are hosted at the authentication server.
52. A system as in claim 47, wherein the portable client token system does not have a fixed internet protocol address.
53. A system as in claim 47, wherein the portable client token system is configured to automatically connect to the authentication server upon actuation.
54. A method of authenticating a plurality of clients in an authentication server, comprising the steps of:
storing first authentication-enabling data for each of the clients and information concerning one or more activities at an application server site enabled over a public network;
receiving a request for authenticating one of the clients over the public network to allow the client's access to the application server site over the public network,
the request containing second authentication-enabling data uniquely identifying a client token in possession by the client;
authenticating the client based on the first authentication-enabling data and the second authentication-enabling data; and
enabling the one or more activities for the client over the public network only when the application server site is legitimate, if the client token is authenticated; wherein:
the client token, upon actuation, is configured to automatically connect to the authentication server based on an internet protocol address stored therein and thereafter to send the second authentication-enabling data.
55. A method as in claim 54, wherein the authentication server is configured to host one or more application server sites.
56. A method as in claim 54, wherein the client token comprises a downloadable program.
57. A method as in claim 54, wherein the client token comprises a cell phone.
58. A method as in claim 54, wherein the client token is configured to require additional authenticating data from the client prior to requesting authentication to the authentication server, and the authentication server authenticates the application server site to determine whether the application server site is legitimate.
59. A method as in claim 54, wherein the second authentication-enabling data identifies a certain account of the client.
60. A method as in claim 54, wherein the second authentication-enabling data is at least partially based on a unique certificate or salt for one time use.
61. A method as in claim 58, wherein the certain account is a financial account.
62. A method as in claim 60, wherein the certain account is a financial account.
63. A method as in claim 60, wherein the certain account is an ecommerce account.
64. A system for authenticating a client and an application, for enabling the user to obtain access through the authenticated client to the authenticated application, for enabling execution of an authenticated transaction, comprising:
an authentication server, comprising server software;
a client, able to be uniquely identified by a unique client identifier, and able to be authenticated by the authentication server;
an application, comprising integration server software, able to be authenticated by the authentication server, and able to confirm with the authentication server that the uniquely identified client has been authenticated; and
a client token, able to authenticate the uniquely identified client to the authentication server, to create a fully authenticated connection where both the client and the application have been authenticated by the authentication server.
65. A system as in claim 64, wherein the client comprises a cell phone, and wherein the client token is able to be executable in the cell phone and is able to actuate the authentication server through the client-server communications network.
66. A method of authenticating a client and an application, for enabling the user to obtain access through the authenticated client to the authenticated application, for enabling execution of an authenticated transaction, in a system which comprises an authentication server, comprising server software, a client, able to be uniquely identified by a unique client identifier, and able to be authenticated by the authentication server, an application, comprising integration server software, able to be authenticated by the authentication server, and able to confirm with the authentication server that the uniquely identified client has been authenticated, and a client token, able to authenticate the uniquely identified client to the authentication server, to create a fully authenticated connection where both the client and the application have been authenticated by the authentication server, wherein the method comprises:
enabling the application to be authenticated by the authentication server, and to confirm with the authentication server that the uniquely identified client has been authenticated;
enabling client to be uniquely identified by the unique client identifier, and to be a authenticated by the authentication server; and
enabling the client token to authenticate the uniquely identified client to the authentication server, to confirm with the authentication server that the uniquely identified client has been authenticated.
67. A method as in claim 66, wherein the application server site is further able to redirect the user to the authentication server for secure user authentication by the authentication server, and wherein the method further comprises redirecting the user to the authentication server for secure user authentication by the authentication server.
US15/967,377 2005-10-07 2018-04-30 Secure authentication and transaction system and method Pending US20230196357A9 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/967,377 US20230196357A9 (en) 2005-10-07 2018-04-30 Secure authentication and transaction system and method

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US72469105P 2005-10-07 2005-10-07
US11/544,302 US7861077B1 (en) 2005-10-07 2006-10-06 Secure authentication and transaction system and method
US12/978,105 US9112842B1 (en) 2005-10-07 2010-12-23 Secure authentication and transaction system and method
US201514797160A 2015-07-12 2015-07-12
US15/967,377 US20230196357A9 (en) 2005-10-07 2018-04-30 Secure authentication and transaction system and method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US201514797160A Continuation 2005-10-07 2015-07-12

Publications (2)

Publication Number Publication Date
US20190333062A1 US20190333062A1 (en) 2019-10-31
US20230196357A9 true US20230196357A9 (en) 2023-06-22

Family

ID=86768513

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/967,377 Pending US20230196357A9 (en) 2005-10-07 2018-04-30 Secure authentication and transaction system and method

Country Status (1)

Country Link
US (1) US20230196357A9 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10389708B1 (en) * 2019-01-03 2019-08-20 Capital One Services, Llc Secure authentication of a user associated with communication with a service representative
US10984416B2 (en) * 2019-03-20 2021-04-20 Capital One Services, Llc NFC mobile currency transfer
US11876798B2 (en) * 2019-05-20 2024-01-16 Citrix Systems, Inc. Virtual delivery appliance and system with remote authentication and related methods
CN112988333B (en) * 2021-04-26 2021-09-03 武汉深之度科技有限公司 Container application authentication method, system, computing device and readable storage medium

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010045451A1 (en) * 2000-02-28 2001-11-29 Tan Warren Yung-Hang Method and system for token-based authentication
CA2305249A1 (en) * 2000-04-14 2001-10-14 Branko Sarcanin Virtual safe
US7478434B1 (en) * 2000-05-31 2009-01-13 International Business Machines Corporation Authentication and authorization protocol for secure web-based access to a protected resource
US7587368B2 (en) * 2000-07-06 2009-09-08 David Paul Felsher Information record infrastructure, system and method
US7616784B2 (en) * 2002-07-29 2009-11-10 Robert William Kocher Method and apparatus for contactless hand recognition
WO2005029746A2 (en) * 2003-09-12 2005-03-31 Rsa Security Inc. System and method providing disconnected authentication
US7624269B2 (en) * 2004-07-09 2009-11-24 Voltage Security, Inc. Secure messaging system with derived keys
US7861077B1 (en) * 2005-10-07 2010-12-28 Multiple Shift Key, Inc. Secure authentication and transaction system and method
US8850219B2 (en) * 2010-05-13 2014-09-30 Salesforce.Com, Inc. Secure communications
US8819424B2 (en) * 2010-09-30 2014-08-26 Microsoft Corporation Token-based authentication using middle tier
US20140282978A1 (en) * 2013-03-15 2014-09-18 Sergio Demian LERNER Method and apparatus for secure interaction with a computer service provider
US10574692B2 (en) * 2016-05-30 2020-02-25 Christopher Nathan Tyrwhitt Drake Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements

Also Published As

Publication number Publication date
US20190333062A1 (en) 2019-10-31

Similar Documents

Publication Publication Date Title
US9112842B1 (en) Secure authentication and transaction system and method
US20230133210A1 (en) Secure authentication system and method
US6836765B1 (en) System and method for secure and address verifiable electronic commerce transactions
AU2010315111B2 (en) Verification of portable consumer devices for 3-D secure services
US7392534B2 (en) System and method for preventing identity theft using a secure computing device
JP6012125B2 (en) Enhanced 2CHK authentication security through inquiry-type transactions
EP2859488B1 (en) Enterprise triggered 2chk association
US7606560B2 (en) Authentication services using mobile device
US9213992B2 (en) Secure online transactions using a trusted digital identity
EP1245008B1 (en) Method and system for secure authenticated payment on a computer network
US20090106138A1 (en) Transaction authentication over independent network
Raina Overview of mobile payment: technologies and security
WO2012167941A1 (en) Method to validate a transaction between a user and a service provider
US20230196357A9 (en) Secure authentication and transaction system and method
Hudaib E-payment security analysis in depth
US20110022837A1 (en) Method and Apparatus For Performing Secure Transactions Via An Insecure Computing and Communications Medium
Ashrafi et al. Privacy-preserving e-payments using one-time payment details
US20120290483A1 (en) Methods, systems and nodes for authorizing a securized exchange between a user and a provider site
Ashrafi et al. Enabling privacy-preserving e-payment processing
CA E-commerce
Fei et al. The analysis of e-commerce online payment status in China
US20130110729A1 (en) System, Device and Method for Secure Handling of Key Credential Information Within Network Servers
US20150269550A1 (en) Apparatus for Improving Security for User Input and/or Access to Secure Resources and/or for Point of Sale
Islam et al. A PKI Enabled Authentication Protocol for Secure E-Payment Framework
Boardman An Investigation into Electronic Commerce Frauds and their Security Implications

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

AS Assignment

Owner name: MULTIPLE SHIFT KEY, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GALLAGHER, RAYMOND J., III;REEL/FRAME:054394/0649

Effective date: 20201113

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION