WO2021259065A1 - Method and system for securing one or more messages - Google Patents

Method and system for securing one or more messages Download PDF

Info

Publication number
WO2021259065A1
WO2021259065A1 PCT/CN2021/099180 CN2021099180W WO2021259065A1 WO 2021259065 A1 WO2021259065 A1 WO 2021259065A1 CN 2021099180 W CN2021099180 W CN 2021099180W WO 2021259065 A1 WO2021259065 A1 WO 2021259065A1
Authority
WO
WIPO (PCT)
Prior art keywords
secure
messages
access
request
storage space
Prior art date
Application number
PCT/CN2021/099180
Other languages
French (fr)
Inventor
Yogesh Kumar Sardana
Kumar Pankaj
Vikrant Gupta
Param Shantilal KHANPARA
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp., Ltd. filed Critical Guangdong Oppo Mobile Telecommunications Corp., Ltd.
Publication of WO2021259065A1 publication Critical patent/WO2021259065A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Definitions

  • the present disclosure generally relates to the field of data and information security and more particularly to a system and method for securing one or more messages.
  • a message comprising one or more personal information such as address details, government identification details etc. of the user/s or in one other instance high priority messages comprising business meeting details etc. also requires additional security measures to avoid data theft and/or such similar problems.
  • an object of the present disclosure is to provide a novel method and system for securing one or more messages based on a message type, wherein the message type is one of a secure message and a normal message. It is another object of the present disclosure to provide users a solution that does not involve encryption mechanism at client/server end to secure one or more secure messages, but instead the present solution identifies the message type and place the message/s in a secure space, based on the identified message type. Also, one other object of the present disclosure is to deny the access of one or more secure messages to 3 rd party applications installed in a user device/equipment.
  • the 3 rd party applications can access messages and if the 3 rd party applications get to know encryption technique, there might be a major risk of data theft and fraud etc., therefore in order to deal with such situation, the present disclosure provides a secure space comprising a security layer, to store one or more secure messages.
  • one aspect of the present disclosure relates to a method of securing one or more messages.
  • the method encompasses receiving, at a transceiver unit, the one or more messages.
  • the method further comprises processing, via a processing unit, each of the one or more messages to identify one of a secure message and a normal message.
  • the method encompasses securing one or more secure messages by storing, at a storage unit, the one or more secure messages, wherein the storage unit comprises a private storage space and a normal storage space, the one or more secure messages are stored at the private storage space, and an access to the private storage space is based on an access key.
  • the system comprises a transceiver unit, configured to receive, the one or more messages. Thereafter the system comprises a processing unit, configured to process, each of the one or more messages to identify one of a secure message and a normal message. Further the system encompasses a storage unit, configured to store, one or more secure messages, to secure the one or more secure messages, wherein the storage unit comprises a private storage space and a normal storage space, the one or more secure messages are stored at the private storage space and an access to the private storage space is based on an access key.
  • the user equipment comprises a system configured to receive, the one or more messages.
  • the system further configured to process, each of the one or more messages to identify one of a secure message and a normal message. Thereafter the system is configured to store, one or more secure messages, to secure the one or more secure messages, wherein the system comprises a private storage space and a normal storage space, the one or more secure messages are stored at the private storage space, and an access to the private storage space is based on an access key.
  • FIG. 1 illustrates a block diagram of the system [100] , for securing one or more messages, in accordance with exemplary embodiments of the present disclosure.
  • FIG. 2 illustrates an exemplary method flow diagram [200] , depicting method of securing one or more messages, in accordance with exemplary embodiments of the present disclosure.
  • FIG. 3 illustrates an exemplary flow diagram [300] , depicting an instance implementation of the process of securing one or more OTP messages, in accordance with exemplary embodiments of the present disclosure.
  • FIG. 4 illustrates an exemplary user interface [400] , in accordance with exemplary embodiments of the present disclosure.
  • one of the currently known solution includes transmitting a seed OTP to a user device/smart-device and thereafter receiving a response OTP from the user device to calculate an expected response OTP by applying a function to the seed OTP.
  • This prior art solution may then compare the response OTP to the expected response OTP and send a result in response to the comparison of the response OTP to the expected response OTP.
  • This prior art solution works well in securing OTP messages from external interference, but local applications that has access to message space can access secure message/s(OTP messages) very well.
  • the present disclosure provides a method and system for securing one or more messages.
  • the present disclosure proposes a solution that focuses on keeping a private space for one or more secure text messages, unlike the prior known solution that are focused on encryption/decryption of the one or more messages and involves both parties.
  • the present disclosure discloses that, once a secure message related to any transaction or related to any personal data access or such similar confidential information is received, the present disclosure encompasses moving/storing that received secure message to the private space present under a messaging application.
  • the present disclosure identifies that a received message is a secure message by comparing one or more keywords like “OTP” (i.e. usually six/four-digit number) , transaction related keywords, keywords indicating confidential information etc.
  • the private space includes a separate space created in the messaging application itself via implementing the features of present disclosure. The private space does not allow any local applications installed in a user device, to read content of message/s inside it. Also, the present disclosure encompasses adding one or more additional layer of security to this private space by adding a lock/password based access to the private space, so that the access to the private space is possible only with valid credentials.
  • the “secure message” is a message comprising one or more secure keywords, wherein the secure keywords comprising at least one of an OTP detail, a transaction detail, a personal detail, a confidential detail, a password related detail and the like.
  • the one or more secure keywords may be any other such similar keyword/s which needs to be secured in order to avoid any digital fraud and is obvious to a person skilled in the art.
  • a “transceiver unit” may comprise one or more transmitter units and one or more receiver units, configured to transmit and receive respectively, one or more messages, to implement the features of the present disclosure.
  • the transceiver unit may be any such transmitting and receiving unit known to a person skilled in the art, required to implement the features of the present invention.
  • storage unit refers to a machine or computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine.
  • a computer-readable medium includes read-only memory ( “ROM” ) , random access memory ( “RAM” ) , magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media.
  • a “processing unit” or “processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions.
  • a processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc.
  • the processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
  • auser equipment may be any electrical, electronic and computing device or equipment, capable of, receiving one or more text messages and implementing the features of the present disclosure.
  • the user equipment may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of capturing and analyzing one or more media.
  • the user equipment contains at least one input means configured to receive an input from a user, a processing unit, a storage unit, a display unit and any other such unit which is obvious to the person skilled in the art and is capable of implementing the features of the present disclosure.
  • FIG. 1 an exemplary block diagram of the system [100] , for securing one or more messages, in accordance with exemplary embodiments of the present disclosure is shown.
  • the system [100] comprises, at least one transceiver unit [102] , at least one processing unit [104] and at least one storage unit [106] .
  • the at least one storage unit [106] further comprises a private storage space [106-A] and a normal storage space [106-B] . All of these components/units are assumed to be connected to each other unless otherwise indicated below. Also, in Fig. 1 only few units are shown, however the system [100] may comprise multiple such units or the system [100] may comprise any such numbers of the units, obvious to a person skilled in the art or as required to implement the features of the present disclosure.
  • the system [100] is configured for securing one or more messages with the help of the interconnection between its components/units.
  • the at least one transceiver unit [102] is configured to receive, the one or more messages.
  • the one or more messages may be one or more text messages which further comprising one or more keywords indicating a message type.
  • the message type relates to one of a secure message and a normal message.
  • the at least one processing unit [104] is connected to the at least one transceiver unit [102] .
  • the processing unit [104] is configured to process, each of the one or more messages to identify one of the secure message and the normal message. For example, if 4 messages are received at a user device, the processing unit processes these received 4 messages to identify the message type (i.e. one of the secure message and a normal message) of each of the received 4 messages.
  • the processing unit [104] is further configured to identify the secure message based on a presence of one or more secure keywords in the secure message. Also, the processing unit [104] is further configured to identify the normal message based on an absence of one or more secure keywords in the normal message. Further, the one or more secure keywords may comprise at least one of an OTP detail, a transaction detail, a personal detail, a confidential detail, a password related detail and such similar detail.
  • the secure keywords are the keyword/s including but not limited to at least one of an OTP related keyword, a transaction related keyword, a personal detail related keyword, a confidential detail related keyword, a password related keyword and the any other such similar keyword/s which needs to be secured in order to avoid any digital fraud.
  • the at least one storage unit [106] is connected to the at least one processing unit [104] and the at least one transceiver unit [102] .
  • the storage unit [106] is configured to store, the one or more secure messages in order to secure the one or more secure messages.
  • the storage unit [106] further comprises a private storage space [106-A] and a normal storage space [106-B] .
  • the private storage space is further associated with at least one security layer/access key.
  • the access key may be one of a user defined access key or a pre-defined access key.
  • the access key may comprise a security measure related to provide a secure access to the private storage space [106-A] based on a user defined lock pattern or lock password.
  • the storage unit [106] is configured to store the one or more secure messages at the private storage space [106-A] . Also, to access the private storage space [106-A] , the access/secure-access is required based on the at least one access key associated with the private storage space [106-A] .
  • processing unit [104] is configured to compare a user input key with the access key associated with the private storage space [106-A] , based on a request received on the storage unit [106] to access via the user, the one or more secure messages. Also, the received request comprises the user input key.
  • the processing unit [104] is further configured to provide the user, a secure access to the one or more secure messages based on a successful matching of the access key with the user input key.
  • processing unit [104] is also configured to determine, a request type associated with an automatically generated request, wherein the automatically generated request is a request generated via one or more applications which further received at the storage unit [106] , to access the one or more secure messages by one or more applications.
  • the request type is one of an authorized request and an unauthorized request.
  • the authorized request is the request comprising a valid authentication key and an unauthorized request comprises an invalid authentication key or the unauthorized request does not comprises any authentication key.
  • the valid authentication key is the user input key provided by the user to one or more applications to further access the private storage space [106-A] .
  • the invalid authentication key is a false access key or an automatically generated key which is not based on a user input.
  • the processing unit [104] is further configured to deny access to the one or more secure messages, in an event the request type associated with the automatically generated request is the unauthorized request.
  • the system [100] for securing one or more messages in accordance with the present invention is able secure one or more secure messages by providing additional security measurements at the device level. Also, the system [100] provides data protection via eliminating the risk related to data theft and data fraud by one or more unauthorized users and one or more applications.
  • FIG. 2 an exemplary method flow diagram [200] , depicting method of securing one or more messages, in accordance with exemplary embodiments of the present disclosure, is shown. As shown in Fig. 2, the method begins at step [202] .
  • the method comprises receiving, at a transceiver unit [102] , the one or more messages.
  • the one or more messages may be one or more text messages which further comprising one or more keywords indicating a message type.
  • the message type relates to one of a secure message and a normal message.
  • the method comprises processing, via a processing unit [104] , each of the one or more messages to identify one of the secure message and the normal message. For example, if 5 messages are received at a user device and 3 out of 5 messages are related to a transaction and 2 out of 5 messages promotional messages, the method encompasses processing via the processing unit the received 5 messages to identify the message type (i.e. one of the secure message and a normal message) of each of the received 5 messages. In the given example the 3 messages related to the transaction are identified as secure messages and the 2 promotional messages are identified as normal messages.
  • the method comprises identifying via the processing unit [104] , the secure message based on a presence of one or more secure keywords in the secure message. Also, the method comprises identifying via the processing unit [104] , the normal message based on an absence of one or more secure keywords in the normal message. Further, the one or more secure keywords may comprise at least one of an OTP detail, a transaction detail, a personal detail, a confidential detail, a password related detail and such similar detail.
  • the secure keywords are the keyword/s including but not limited to at least one of an OTP related keyword, a transaction related keyword, a personal detail related keyword, a confidential detail related keyword, a password related keyword and the any other such similar keyword/s which needs to be secured in order to avoid any digital fraud.
  • the method comprises identifying a message comprising keywords “your one time password is 4444” as a secure message based on the OTP (one time password) details.
  • the method comprises securing one or more secure messages by storing the one or more secure messages, at a storage unit [106] , wherein the storage unit [106] comprises a private storage space [106-A] and a normal storage space [106-B] . Also, the method at step [208] further encompasses storing the one or more secure messages at the private storage space [106-A] . Further, an access to the private storage space [106-A] is based on an access key.
  • the private storage space [106-A] is associated with at least one security layer/access key.
  • the access key may be one of a user defined authentication/access key or a pre-defined authentication/access key. For example, the access key may comprise a security measure related to a secure access of the private storage space [106-A] based on a face unlock or PIN code or fingerprint authentication etc.
  • the method encompasses receiving, at the storage unit [106] , a request to access the one or more secure messages, wherein the request comprises a user input key.
  • the method further comprises comparing, by the processing unit [104] , the user input key with the access key associated with the private storage space [106-A] .
  • the method comprises providing, by the processing unit [104] , a secure access to the one or more secure messages based on a successful matching of the access key with the user input key.
  • a user receives a password in a text message.
  • the method of the present disclosure in such instance firstly identifies the received message as a secure message based on one or more keywords related to the received password. Thereafter, the method encompasses storing the identified secure message in a private storage space [106-A] . Also the private storage space [106-A] may be associated with a password/access key abc@! *2. Further, in order to get access to the received message the use further provides a user input key abc@! *2. Thereafter, the method encompasses comparing the access key/password i.e. abc@! *2 with the user input key i.e. abc@! *2.
  • the method upon successful matching of the access key with the user input key, the method encompasses providing the user a secure access to the received message. Also, in an instance if the access key fails to match with the user input key, the method encompasses denying the access to the private storage space [106-A] .
  • the method encompasses receiving, at the storage unit [106] , an automatically generated request to access the one or more secure messages.
  • the automatically generated request is a request generated via one or more applications to access the one or more secure messages.
  • a XYZ banking application in order to receive a password to perform some digital transaction may automatically generated request to access the one or more secure messages.
  • the method encompasses determining via the processing unit [104] , a request type associated with the automatically generated request, wherein the request type is one of an authorized request and an unauthorized request.
  • the authorized request is the request comprising a valid authentication key and an unauthorized request comprises an invalid authentication key or the unauthorized request does not comprises any authentication key.
  • the valid authentication key is the user input key provided by the user to one or more applications to further access the private storage space [106-A] .
  • the invalid authentication key is a false access key or an automatically generated key which is not based on a user input.
  • the method comprises denying via the processing unit [104] the access to the one or more secure messages in an event the request type associated with the automatically generated request is the unauthorized request. For instance, in order to access a message stored in the private storage space [106-A] , an automatically generated request to access the message is received from an ABC e-commerce application. Further, the automatically generated request comprising an automatically generated key 22jq8. The method in such case encompasses comparing the automatically generated key 22jq8 with an access key of the private storage space [106-A] . Further, if the automatically generated key 22jq8 fails to match with the access key of the private storage space [106-A] , the method comprises denying the access of the private storage space [106-A] to the ABC e-commerce application.
  • the method After successfully securing one or more messages, the method further terminates at step [210] .
  • the user equipment comprises a system [100] configured to receive, the one or more messages.
  • the system [100] further configured to process, each of the one or more messages to identify one of a secure message and a normal message.
  • the system [100] is configured to store, one or more secure messages, to secure the one or more secure messages, wherein the system [100] comprises a private storage space [106-A] and a normal storage space [106-B] , the one or more secure messages are stored at the private storage space [106-A] , and an access to the private storage space [106-A] is based on an access key.
  • FIG. 3 an exemplary flow diagram [300] , depicting an instance implementation of the process of securing one or more OTP messages, in accordance with exemplary embodiments of the present disclosure, is shown.
  • the process starts at step [302] .
  • the process is initiated to prevent one or more OTP frauds.
  • the method encompasses receiving at a user equipment/user device a new text message.
  • the method comprises detecting via the processing unit [104] , a message type of the received text message.
  • the method comprises identifying one or more keywords received in the text message and on the basis of the identified keywords the method further determines if the received message is an OTP message (i.e. a secure message) or a normal message.
  • the keywords may be:
  • the method leads to the step [308] , if the detected message is the OTP message, otherwise the method leads to the step [312] .
  • the method comprises storing the received text message in a normal storage space [106-B] . Also, at step [312] , the method comprises storing the received text message in a private storage space [106-A] .
  • the private storage space [106-A] may be a part of a native messaging application itself.
  • the private storage space [106-A] may be present under a messaging module but with different access permission from rest of the messaging module.
  • the method indicates securing the private storage space [106-A] using one or more additional layer of security. For instance, a password based access associated with the private storage space [106-A] is indicated at step [310] .
  • the method comprises securing the received message from being accessed outside secure space.
  • the method encompasses allowing access to a user based on a valid user input key or allowing access to an application authenticated via the user by providing a valid authentication key to access the private space [106-A] .
  • the user and/or the application authenticated via the user moves out of secure space i.e. the private space [106-A] , it gets locked down securing all messages inside it.
  • the method further leads to denying the access of the private storage space [106-A] to the user. Also, if the authentication key associated with one or more application fails to match with the access key/password associated with the private storage space [106-A] , the method further leads to denying the access of the private storage space [106-A] to the one or more applications requesting the access to the received text message.
  • step [316] the method terminates after securing the received OTP message.
  • FIG. 4 an exemplary user interface [400] , in accordance with exemplary embodiments of the present disclosure, is shown.
  • Figure 4 pictorially represents a screen layout/user interface [400] indicating mechanism of securing one or more secure messages by placing respective messages in secure private space [106-A] , such that, no other application as well as no non-intended user can get access the one or more secure messages, which in turn can help the user to avoid any type of fraud or cheat.
  • Figure 4 indicates a messaging module [402] which further comprises a private storage space [106-A] indicated at step [404] and a normal storage space [106-B] indicated at step [408] .
  • the private storage space [106-A] is configured to store one or more secure messages and the normal storage space [106-B] is configured to store one or more normal messages.
  • the private storage space [106-A] is further associated with one or more security layers.
  • One of the security layer indicated at step [406] discloses that an authentication is required to access the private storage space [106-A] .
  • the normal storage space [106-B] does not comprises security layers.
  • the step [410] indicates that no authentication is required to access the normal storage space [106-B] and the normal storage space [106-B] can be access normally in the messaging module [402] .
  • the present solution provides significant technical advancement over the existing solutions by securing one or more messages based on associated message type.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present disclosure provides method [200] and system [100] for securing one or more messages. The method of the present disclosure encompasses receiving, at a transceiver unit [102], the one or more messages. Thereafter, the method comprises processing, via a processing unit [104], each of the one or more messages to identify one of a secure message and a normal message. Further, the method encompasses securing one or more secure messages by storing, at a storage unit [106], the one or more secure messages, wherein the storage unit [106] comprises a private storage space [106-A] and a normal storage space [106-B], the one or more secure messages are stored at the private storage space [106-A], and an access to the private storage space [106-A] is based on an access key.

Description

METHOD AND SYSTEM FOR SECURING ONE OR MORE MESSAGES
FIELD OF THE DISCLOSURE
The present disclosure generally relates to the field of data and information security and more particularly to a system and method for securing one or more messages.
BACKGROUND
This section is intended to provide information relating to field of the disclosure and thus any approach or functionality described below should not be assumed to be qualified as prior art merely by its inclusion in this section.
With the evolution of digital technologies it is now possible for users to perform a number of day to day tasks using various digital platforms. Also, such advanced technologies have provided the users a number of platforms to communicate digitally. Further, in order to perform various transactions the communication technologies also plays an important role along with the digital platforms. For instance, the users can use various digital platforms to complete a number of financial and banking related transaction digitally. Furthermore, to add a security measure/layer to such digital transactions a number of security platforms are developed time to time. Authentication of any user account/s and one or more digital transactions using encrypted secret key or password, OTP text messages and passwords received over text messages are few examples of these security measures.
Apart from the transactional messages, there also requires security measures for various other messages. For instance, a message comprising one or more personal information such as address details, government identification details etc. of the user/s or in one other instance high priority messages comprising business meeting details etc. also requires additional security measures to avoid data theft and/or such similar problems.
Further, although the existing technologies have provided various solutions to provide security layer/s in order to secure one or more messages, but these currently known solutions have many limitations and therefore there is a need for improvement in this area of technology.
SUMMARY
This section is provided to introduce certain objects and aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
In order to overcome at least a few problems associated with the known solutions, an object of the present disclosure is to provide a novel method and system for securing one or more messages based on a message type, wherein the message type is one of a secure message and a normal message. It is another object of the present disclosure to provide users a solution that does not involve encryption mechanism at client/server end to secure one or more secure messages, but instead the present solution identifies the message type and place the message/s in a secure space, based on the identified message type. Also, one other object of the present disclosure is to deny the access of one or more secure messages to 3 rd party applications installed in a user device/equipment. The 3 rd party applications can access messages and if the 3 rd party applications get to know encryption technique, there might be a major risk of data theft and fraud etc., therefore in order to deal with such situation, the present disclosure provides a secure space comprising a security layer, to store one or more secure messages.
In order to achieve the afore-mentioned objectives, one aspect of the present disclosure relates to a method of securing one or more messages. The method encompasses receiving, at a transceiver unit, the one or more messages. The method further comprises processing, via a processing unit, each of the one or more messages to identify one of a secure message and a normal message. Thereafter the method encompasses securing one or more secure messages by storing, at a storage unit, the one or more secure messages, wherein the storage unit comprises a private storage space and a normal storage space, the one or more secure messages are stored at the private storage space, and an access to the private storage space is based on an access key.
Further, another aspect of the present disclosure relates to a system for securing one or more messages. The system comprises a transceiver unit, configured to receive, the one or more messages. Thereafter the system comprises a processing unit, configured to process, each of the one or more messages to identify one of a secure message and a normal message. Further the system encompasses a storage unit, configured to store, one or more secure messages, to secure the one or more secure messages, wherein the storage unit comprises a private storage space and a normal storage space, the one or more secure messages are stored at the private storage space and an access to the private storage space is based on an access key.
Yet, another aspect of the present disclosure relates to a user equipment for securing one or more messages. The user equipment comprises a system configured to receive, the one or more messages. The system further configured to process, each of the one or more messages to identify one of a secure message and a normal message. Thereafter the system is configured to store, one or more secure messages, to secure the one or more secure messages, wherein the system comprises a private storage space and a normal storage space, the one or more secure messages are stored at the private storage space, and an access to the private storage space is based on an access key.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components, electronic components or circuitry commonly used to implement such components.
FIG. 1 illustrates a block diagram of the system [100] , for securing one or more messages, in accordance with exemplary embodiments of the present disclosure.
FIG. 2 illustrates an exemplary method flow diagram [200] , depicting method of securing one or more messages, in accordance with exemplary embodiments of the present disclosure.
FIG. 3 illustrates an exemplary flow diagram [300] , depicting an instance implementation of the process of securing one or more OTP messages, in accordance with exemplary embodiments of the present disclosure.
FIG. 4 illustrates an exemplary user interface [400] , in accordance with exemplary embodiments of the present disclosure.
The foregoing shall be more apparent from the following more detailed description of the present disclosure.
DETAILED DESCRIPTION
In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address all of the problems discussed above or might address only some of the problems discussed above.
As in today’s world, we come across a lot of digital frauds that are related to user’s digital transactions and user’s personal and/or confidential data, where attackers clone user’s smart device or by any other means the attackers get access to user’s smart-device/user device, which further leads to providing the attackers an access to one or more secure message related to any transaction and/or personal and/or confidential data, that is been requested by attacker. The user in such cases has no  idea of the access of one or more secure messages by the attackers, and therefore attackers takes advantage in such scenarios. User’s OTP messages, password messages, confidential messages and such similar secure messages are also accessed from native messaging application by other one or more 3 rd party applications that have permission to read all messages of user’s messaging application. This further results in financial or personal information loss of the user. Therefore, it is important to secure messages to avoid problems such as data theft, digital fraud etc.
Further in order to secure one or more secure messages and to provide secure access to such secure message/s a number of solutions are developed time to time, but most of these prior art solutions tries to secure message/s at client and server end using encryption-decryption technique. Further, one of the currently known solution includes transmitting a seed OTP to a user device/smart-device and thereafter receiving a response OTP from the user device to calculate an expected response OTP by applying a function to the seed OTP. This prior art solution may then compare the response OTP to the expected response OTP and send a result in response to the comparison of the response OTP to the expected response OTP. This prior art solution works well in securing OTP messages from external interference, but local applications that has access to message space can access secure message/s(OTP messages) very well.
Further, as this known prior art solution only takes care of securing the secure message/s (OTP messages) from the external interference such as man in middle attack etc., it fails to prevent access of the secure messages from the 3rd party applications that are installed locally in user device/s.
Therefore, in view of these and other existing limitations, there is an imperative need to provide a solution to overcome the limitations of prior existing solutions and to provide a more efficient method and system for securing one or more messages.
The present disclosure provides a method and system for securing one or more messages. The present disclosure proposes a solution that focuses on keeping a private space for one or more secure text messages, unlike the prior known solution that are focused on encryption/decryption of the one or more messages and involves both parties. The present disclosure discloses that, once a secure message related to any transaction or related to any personal data access or such similar confidential information is received, the present disclosure encompasses moving/storing that received secure message to the private space present under a messaging application.
The present disclosure identifies that a received message is a secure message by comparing one or more keywords like “OTP” (i.e. usually six/four-digit number) , transaction related keywords, keywords indicating confidential information etc. Also, the private space includes a separate space created in the messaging application itself via implementing the features of present disclosure. The private space does not allow any local applications installed in a user device, to read content  of message/s inside it. Also, the present disclosure encompasses adding one or more additional layer of security to this private space by adding a lock/password based access to the private space, so that the access to the private space is possible only with valid credentials.
As used herein, the “secure message” is a message comprising one or more secure keywords, wherein the secure keywords comprising at least one of an OTP detail, a transaction detail, a personal detail, a confidential detail, a password related detail and the like. Also, the one or more secure keywords may be any other such similar keyword/s which needs to be secured in order to avoid any digital fraud and is obvious to a person skilled in the art.
As used herein, a “transceiver unit” may comprise one or more transmitter units and one or more receiver units, configured to transmit and receive respectively, one or more messages, to implement the features of the present disclosure. The transceiver unit may be any such transmitting and receiving unit known to a person skilled in the art, required to implement the features of the present invention.
As used herein, “storage unit” refers to a machine or computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine. For example, a computer-readable medium includes read-only memory ( “ROM” ) , random access memory ( “RAM” ) , magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media.
As used herein, a “processing unit” or “processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. A processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
As used herein, “auser equipment” , “auser device” , “asmart-user device” , “asmart device” and “an electronic device” may be any electrical, electronic and computing device or equipment, capable of, receiving one or more text messages and implementing the features of the present disclosure. The user equipment may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of capturing and analyzing one or more media. The user equipment contains at least one input means  configured to receive an input from a user, a processing unit, a storage unit, a display unit and any other such unit which is obvious to the person skilled in the art and is capable of implementing the features of the present disclosure.
The present disclosure is further explained in detail below with reference now to the diagrams.
Referring to FIG. 1, an exemplary block diagram of the system [100] , for securing one or more messages, in accordance with exemplary embodiments of the present disclosure is shown.
The system [100] comprises, at least one transceiver unit [102] , at least one processing unit [104] and at least one storage unit [106] . The at least one storage unit [106] further comprises a private storage space [106-A] and a normal storage space [106-B] . All of these components/units are assumed to be connected to each other unless otherwise indicated below. Also, in Fig. 1 only few units are shown, however the system [100] may comprise multiple such units or the system [100] may comprise any such numbers of the units, obvious to a person skilled in the art or as required to implement the features of the present disclosure.
The system [100] is configured for securing one or more messages with the help of the interconnection between its components/units.
The at least one transceiver unit [102] is configured to receive, the one or more messages. The one or more messages may be one or more text messages which further comprising one or more keywords indicating a message type. The message type relates to one of a secure message and a normal message.
The at least one processing unit [104] is connected to the at least one transceiver unit [102] . The processing unit [104] is configured to process, each of the one or more messages to identify one of the secure message and the normal message. For example, if 4 messages are received at a user device, the processing unit processes these received 4 messages to identify the message type (i.e. one of the secure message and a normal message) of each of the received 4 messages.
The processing unit [104] is further configured to identify the secure message based on a presence of one or more secure keywords in the secure message. Also, the processing unit [104] is further configured to identify the normal message based on an absence of one or more secure keywords in the normal message. Further, the one or more secure keywords may comprise at least one of an OTP detail, a transaction detail, a personal detail, a confidential detail, a password related detail and such similar detail.
In an instance, the secure keywords are the keyword/s including but not limited to at least one of an OTP related keyword, a transaction related keyword, a personal detail related keyword, a confidential detail related keyword, a password related keyword  and the any other such similar keyword/s which needs to be secured in order to avoid any digital fraud.
The at least one storage unit [106] is connected to the at least one processing unit [104] and the at least one transceiver unit [102] . The storage unit [106] is configured to store, the one or more secure messages in order to secure the one or more secure messages.
The storage unit [106] further comprises a private storage space [106-A] and a normal storage space [106-B] . The private storage space is further associated with at least one security layer/access key. The access key may be one of a user defined access key or a pre-defined access key. For example, the access key may comprise a security measure related to provide a secure access to the private storage space [106-A] based on a user defined lock pattern or lock password.
Further, the storage unit [106] is configured to store the one or more secure messages at the private storage space [106-A] . Also, to access the private storage space [106-A] , the access/secure-access is required based on the at least one access key associated with the private storage space [106-A] .
Further, the processing unit [104] is configured to compare a user input key with the access key associated with the private storage space [106-A] , based on a request received on the storage unit [106] to access via the user, the one or more secure messages. Also, the received request comprises the user input key.
The processing unit [104] is further configured to provide the user, a secure access to the one or more secure messages based on a successful matching of the access key with the user input key.
Further, the processing unit [104] is also configured to determine, a request type associated with an automatically generated request, wherein the automatically generated request is a request generated via one or more applications which further received at the storage unit [106] , to access the one or more secure messages by one or more applications.
Further the request type is one of an authorized request and an unauthorized request. In an instance the authorized request is the request comprising a valid authentication key and an unauthorized request comprises an invalid authentication key or the unauthorized request does not comprises any authentication key. The valid authentication key is the user input key provided by the user to one or more applications to further access the private storage space [106-A] . Also, the invalid authentication key is a false access key or an automatically generated key which is not based on a user input.
The processing unit [104] is further configured to deny access to the one or more secure messages, in an event the request type associated with the automatically  generated request is the unauthorized request.
Therefore, the system [100] for securing one or more messages in accordance with the present invention is able secure one or more secure messages by providing additional security measurements at the device level. Also, the system [100] provides data protection via eliminating the risk related to data theft and data fraud by one or more unauthorized users and one or more applications.
Referring to Fig. 2, an exemplary method flow diagram [200] , depicting method of securing one or more messages, in accordance with exemplary embodiments of the present disclosure, is shown. As shown in Fig. 2, the method begins at step [202] .
At step [204] , the method comprises receiving, at a transceiver unit [102] , the one or more messages. The one or more messages may be one or more text messages which further comprising one or more keywords indicating a message type. The message type relates to one of a secure message and a normal message.
Next, at step [206] , the method comprises processing, via a processing unit [104] , each of the one or more messages to identify one of the secure message and the normal message. For example, if 5 messages are received at a user device and 3 out of 5 messages are related to a transaction and 2 out of 5 messages promotional messages, the method encompasses processing via the processing unit the received 5 messages to identify the message type (i.e. one of the secure message and a normal message) of each of the received 5 messages. In the given example the 3 messages related to the transaction are identified as secure messages and the 2 promotional messages are identified as normal messages.
Thereafter, the method comprises identifying via the processing unit [104] , the secure message based on a presence of one or more secure keywords in the secure message. Also, the method comprises identifying via the processing unit [104] , the normal message based on an absence of one or more secure keywords in the normal message. Further, the one or more secure keywords may comprise at least one of an OTP detail, a transaction detail, a personal detail, a confidential detail, a password related detail and such similar detail.
In an instance, the secure keywords are the keyword/s including but not limited to at least one of an OTP related keyword, a transaction related keyword, a personal detail related keyword, a confidential detail related keyword, a password related keyword and the any other such similar keyword/s which needs to be secured in order to avoid any digital fraud. For example, the method comprises identifying a message comprising keywords “your one time password is 4444” as a secure message based on the OTP (one time password) details.
Next, at step [208] , the method comprises securing one or more secure messages by storing the one or more secure messages, at a storage unit [106] , wherein the storage unit [106] comprises a private storage space [106-A] and a normal storage  space [106-B] . Also, the method at step [208] further encompasses storing the one or more secure messages at the private storage space [106-A] . Further, an access to the private storage space [106-A] is based on an access key. The private storage space [106-A] is associated with at least one security layer/access key. The access key may be one of a user defined authentication/access key or a pre-defined authentication/access key. For example, the access key may comprise a security measure related to a secure access of the private storage space [106-A] based on a face unlock or PIN code or fingerprint authentication etc.
Thereafter, the method encompasses receiving, at the storage unit [106] , a request to access the one or more secure messages, wherein the request comprises a user input key. The method further comprises comparing, by the processing unit [104] , the user input key with the access key associated with the private storage space [106-A] . Further the method comprises providing, by the processing unit [104] , a secure access to the one or more secure messages based on a successful matching of the access key with the user input key.
For example, in order to get access to a user account, a user receives a password in a text message. The method of the present disclosure in such instance firstly identifies the received message as a secure message based on one or more keywords related to the received password. Thereafter, the method encompasses storing the identified secure message in a private storage space [106-A] . Also the private storage space [106-A] may be associated with a password/access key abc@! *2. Further, in order to get access to the received message the use further provides a user input key abc@! *2. Thereafter, the method encompasses comparing the access key/password i.e. abc@! *2 with the user input key i.e. abc@! *2. Further, upon successful matching of the access key with the user input key, the method encompasses providing the user a secure access to the received message. Also, in an instance if the access key fails to match with the user input key, the method encompasses denying the access to the private storage space [106-A] .
Further, the method encompasses receiving, at the storage unit [106] , an automatically generated request to access the one or more secure messages. The automatically generated request is a request generated via one or more applications to access the one or more secure messages. For example, a XYZ banking application in order to receive a password to perform some digital transaction may automatically generated request to access the one or more secure messages.
Further, the method encompasses determining via the processing unit [104] , a request type associated with the automatically generated request, wherein the request type is one of an authorized request and an unauthorized request. In an instance the authorized request is the request comprising a valid authentication key and an unauthorized request comprises an invalid authentication key or the unauthorized request does not comprises any authentication key. The valid authentication key is the user input key provided by the user to one or more  applications to further access the private storage space [106-A] . Also, the invalid authentication key is a false access key or an automatically generated key which is not based on a user input.
Thereafter, the method comprises denying via the processing unit [104] the access to the one or more secure messages in an event the request type associated with the automatically generated request is the unauthorized request. For instance, in order to access a message stored in the private storage space [106-A] , an automatically generated request to access the message is received from an ABC e-commerce application. Further, the automatically generated request comprising an automatically generated key 22jq8. The method in such case encompasses comparing the automatically generated key 22jq8 with an access key of the private storage space [106-A] . Further, if the automatically generated key 22jq8 fails to match with the access key of the private storage space [106-A] , the method comprises denying the access of the private storage space [106-A] to the ABC e-commerce application.
After successfully securing one or more messages, the method further terminates at step [210] .
Furthermore, one aspect of the present disclosure relates to a user equipment for securing one or more messages. The user equipment comprises a system [100] configured to receive, the one or more messages. The system [100] further configured to process, each of the one or more messages to identify one of a secure message and a normal message. Thereafter the system [100] is configured to store, one or more secure messages, to secure the one or more secure messages, wherein the system [100] comprises a private storage space [106-A] and a normal storage space [106-B] , the one or more secure messages are stored at the private storage space [106-A] , and an access to the private storage space [106-A] is based on an access key.
Referring to Fig. 3, an exemplary flow diagram [300] , depicting an instance implementation of the process of securing one or more OTP messages, in accordance with exemplary embodiments of the present disclosure, is shown. As indicated in Figure 3, the process starts at step [302] . In an instance the process is initiated to prevent one or more OTP frauds.
At step [304] the method encompasses receiving at a user equipment/user device a new text message.
Next, at step [306] , the method comprises detecting via the processing unit [104] , a message type of the received text message. At step [306] , the method comprises identifying one or more keywords received in the text message and on the basis of the identified keywords the method further determines if the received message is an OTP message (i.e. a secure message) or a normal message. For example the keywords may be:
·Substring with word “OTP”
·Substring with word “Transaction”
·Substring with numbers which is actual OTP (usually 4/6 digits)
·Substring stating “Do not share with anyone”
·Substring stating the validity of the OTP message
· Substring stating “Please contact support if you haven’t requested” , etc.
Next, the method leads to the step [308] , if the detected message is the OTP message, otherwise the method leads to the step [312] .
Further, at step [308] , the method comprises storing the received text message in a normal storage space [106-B] . Also, at step [312] , the method comprises storing the received text message in a private storage space [106-A] . The private storage space [106-A] may be a part of a native messaging application itself. The private storage space [106-A] may be present under a messaging module but with different access permission from rest of the messaging module.
Further, at step [310] the method indicates securing the private storage space [106-A] using one or more additional layer of security. For instance, a password based access associated with the private storage space [106-A] is indicated at step [310] .
Thereafter the method further leads to step [314] from step [312] . At step [314] , the method comprises securing the received message from being accessed outside secure space. For instance, the method encompasses allowing access to a user based on a valid user input key or allowing access to an application authenticated via the user by providing a valid authentication key to access the private space [106-A] . Further, as soon as the user and/or the application authenticated via the user moves out of secure space i.e. the private space [106-A] , it gets locked down securing all messages inside it.
Also, in an instance, if the user input key fails to match with the access key/password associated with the private storage space [106-A] , the method further leads to denying the access of the private storage space [106-A] to the user. Also, if the authentication key associated with one or more application fails to match with the access key/password associated with the private storage space [106-A] , the method further leads to denying the access of the private storage space [106-A] to the one or more applications requesting the access to the received text message.
Further, at step [316] , the method terminates after securing the received OTP message.
Further referring to Fig. 4, an exemplary user interface [400] , in accordance with exemplary embodiments of the present disclosure, is shown.
Figure 4 pictorially represents a screen layout/user interface [400] indicating mechanism of securing one or more secure messages by placing respective messages in secure private space [106-A] , such that, no other application as well as no non-intended user can get access the one or more secure messages, which in turn can help the user to avoid any type of fraud or cheat.
Further, Figure 4 indicates a messaging module [402] which further comprises a private storage space [106-A] indicated at step [404] and a normal storage space [106-B] indicated at step [408] . The private storage space [106-A] is configured to store one or more secure messages and the normal storage space [106-B] is configured to store one or more normal messages.
The private storage space [106-A] is further associated with one or more security layers. One of the security layer indicated at step [406] . The step [406] discloses that an authentication is required to access the private storage space [106-A] .
The normal storage space [106-B] does not comprises security layers. The step [410] indicates that no authentication is required to access the normal storage space [106-B] and the normal storage space [106-B] can be access normally in the messaging module [402] .
As evident from the above disclosure, the present solution provides significant technical advancement over the existing solutions by securing one or more messages based on associated message type.
While considerable emphasis has been placed herein on the disclosed embodiments, it will be appreciated that many embodiments can be made and that many changes can be made to the embodiments without departing from the principles of the present disclosure. These and other changes in the embodiments of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.

Claims (17)

  1. A method [200] for securing one or more messages, the method comprising:
    - receiving, at a transceiver unit [102] , the one or more messages;
    - processing, via a processing unit [104] , each of the one or more messages to identify one of a secure message and a normal message; and
    - securing one or more secure messages by storing, at a storage unit [106] , the one or more secure messages, wherein:
    the storage unit [106] comprises a private storage space [106-A] and a normal storage space [106-B] ,
    the one or more secure messages are stored at the private storage space [106-A] , and
    an access to the private storage space [106-A] is based on an access key.
  2. The method as claimed in claim 1 wherein the secure message is identified based on a presence of one or more secure keywords in the secure message.
  3. The method as claimed in claim 1 wherein the normal message is identified based on an absence of one or more secure keywords in the normal message.
  4. The method as claimed in claim 2 and 3, wherein the one or more secure keywords comprises at least one of an OTP detail, a transaction detail, a personal detail, a confidential detail and a password related detail.
  5. The method as claimed in claim 1, the method further comprises:
    - receiving, at the storage unit [106] , a request to access the one or more secure messages, wherein the request comprises a user input key;
    - comparing, by the processing unit [104] , the user input key with the access key associated with the private storage space [106-A] ; and
    - providing, by the processing unit [104] , a secure access to the one or more secure messages based on a successful matching of the access key with the user input key.
  6. The method as claimed in claim 1, wherein the access key is one of a pre-defined access key and a user defined access key.
  7. The method as claimed in claim 1, the method further comprises:
    - receiving, at the storage unit [106] , an automatically generated request to access the one or more secure messages;
    - determining, by the processing unit [104] , a request type associated with the automatically generated request, wherein the request type is one of an authorized request and an unauthorized request; and
    - denying access to the one or more secure messages in an event the request type associated with the automatically generated request is the unauthorized request.
  8. The method as claimed in claim 7, wherein the automatically generated request is a request generated via one or more applications to access the one or more secure messages.
  9. A system [100] for securing one or more messages, the system comprising:
    - a transceiver unit [102] , configured to receive, the one or more messages;
    - a processing unit [104] , configured to process, each of the one or more messages to identify one of a secure message and a normal message; and
    - a storage unit [106] , configured to store, one or more secure messages, to secure the one or more secure messages, wherein:
    the storage unit [106] comprises a private storage space [106-A] and a normal storage space [106-B] ,
    the one or more secure messages are stored at the private storage space [106-A] , and
    an access to the private storage space [106-A] is based on an access key.
  10. The system as claimed in claim 9 wherein the processing unit [104] is further configured to identify the secure message based on a presence of one or more secure keywords in the secure message.
  11. The system as claimed in claim 9 wherein the processing unit [104] is further configured to identify the normal message based on an absence of one or more secure keywords in the normal message.
  12. The system as claimed in claim 10 and 11, wherein the one or more secure keywords comprises at least one of an OTP detail, a transaction detail, a personal detail, a confidential detail and a password related detail.
  13. The system as claimed in claim 9, wherein the processing unit [104] is further configured to:
    - compare, a user input key with the access key associated with the private storage space [106-A] based on a request received on the storage unit [106] to access the one or more secure messages, wherein the request comprises the user input key; and
    - provide, a secure access to the one or more secure messages based on a successful matching of the access key with the user input key.
  14. The system as claimed in claim 9, wherein the access key is one of a pre-defined access key and a user defined access key.
  15. The system as claimed in claim 9, wherein the processing unit [104] is further configured to:
    - determine, a request type associated with an automatically generated request, wherein:
    the automatically generated request is received at the storage unit [106] , to access the one or more secure messages, and
    the request type is one of an authorized request and an unauthorized request; and
    - deny access to the one or more secure messages in an event the request type associated with the automatically generated request is the unauthorized request.
  16. The system as claimed in claim 15, wherein the automatically generated request is a request generated via one or more applications to access the one or more secure messages.
  17. A user equipment for securing one or more messages, the user equipment comprising:
    - a system [100] configured to:
    receive, the one or more messages;
    process, each of the one or more messages to identify one of a secure message and a normal message;
    store, one or more secure messages to secure the one or more secure messages, wherein:
    the system comprises a private storage space [106-A] and a normal storage space [106-B] ,
    the one or more secure messages are stored at the private storage space [106-A] , and
    an access to the private storage space is based on an access key.
PCT/CN2021/099180 2020-06-23 2021-06-09 Method and system for securing one or more messages WO2021259065A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202041026616 2020-06-23
IN202041026616 2020-06-23

Publications (1)

Publication Number Publication Date
WO2021259065A1 true WO2021259065A1 (en) 2021-12-30

Family

ID=79281903

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/099180 WO2021259065A1 (en) 2020-06-23 2021-06-09 Method and system for securing one or more messages

Country Status (1)

Country Link
WO (1) WO2021259065A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120117348A1 (en) * 2010-11-08 2012-05-10 Triantafillou Nicholas D Techniques for security management provisioning at a data storage device
CN105760768A (en) * 2016-03-09 2016-07-13 成都爆米花信息技术有限公司 Data security storage method
CN106778337A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Document protection method, device and terminal
CN108959465A (en) * 2018-06-19 2018-12-07 阿里巴巴集团控股有限公司 Storage, read method, device and the server of business datum

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120117348A1 (en) * 2010-11-08 2012-05-10 Triantafillou Nicholas D Techniques for security management provisioning at a data storage device
CN105760768A (en) * 2016-03-09 2016-07-13 成都爆米花信息技术有限公司 Data security storage method
CN106778337A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Document protection method, device and terminal
CN108959465A (en) * 2018-06-19 2018-12-07 阿里巴巴集团控股有限公司 Storage, read method, device and the server of business datum

Similar Documents

Publication Publication Date Title
US11803633B1 (en) Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates
US11206258B2 (en) Identity confirmation during authentication requests using nearby mobile computing devices
US11171951B2 (en) Device interface output based on biometric input orientation and captured proximate data
JP6538872B2 (en) Common identification data replacement system and method
CN101310286A (en) Improved single sign on
US11665156B2 (en) Method and system for securely authenticating a user by an identity and access service using a pictorial code and a one-time code
Mtaho Improving mobile money security with two-factor authentication
US20190132312A1 (en) Universal Identity Validation System and Method
Singhal et al. Software tokens based two factor authentication scheme
US20230006844A1 (en) Dynamic value appended to cookie data for fraud detection and step-up authentication
Mohamed Security of Multifactor Authentication Model to Improve Authentication Systems
US20230291565A1 (en) Data recovery for a computing device
US20100153275A1 (en) Method and apparatus for throttling access using small payments
WO2021259065A1 (en) Method and system for securing one or more messages
US20180341402A1 (en) Method for executing of security keyboard, apparatus and system for executing the method
US11870801B2 (en) Protecting computer system end-points using activators
Cheng et al. Implementing fingerprint recognition on one-time password device to enhance user authentication
KR100657577B1 (en) System and method for authorization using client information assembly
Kamau et al. A review of Two Factor Authentication Security Challenges in the Cyberspace
US20230362009A1 (en) User identification and authentication method and system
Chude et al. et., al,” Multi-factor Authentication for Physical Access”
US11663357B2 (en) System and method of providing secure access to personal information
US20240129299A1 (en) Selectively and intelligently displaying authentication notifications to protect users
MALAU et al. REVIEW OF TEXT BASED PASSWORD AND OTHER AUTHENTICATION METHODS FOR E-COMMERCE DATA PROTECTION
US20230196375A1 (en) Multi-Factor User Authentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21829290

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21829290

Country of ref document: EP

Kind code of ref document: A1