WO2004114075A2 - Method, system, and apparatus for identification number authentication - Google Patents

Method, system, and apparatus for identification number authentication Download PDF

Info

Publication number
WO2004114075A2
WO2004114075A2 PCT/US2004/019014 US2004019014W WO2004114075A2 WO 2004114075 A2 WO2004114075 A2 WO 2004114075A2 US 2004019014 W US2004019014 W US 2004019014W WO 2004114075 A2 WO2004114075 A2 WO 2004114075A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
identification number
code
ssn
predetermined digits
Prior art date
Application number
PCT/US2004/019014
Other languages
French (fr)
Other versions
WO2004114075A3 (en
Inventor
Pattie Suozzi Dillon
James M. Giordano
Kenneth A. Galle
Original Assignee
Et Al., Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Et Al., Inc. filed Critical Et Al., Inc.
Publication of WO2004114075A2 publication Critical patent/WO2004114075A2/en
Publication of WO2004114075A3 publication Critical patent/WO2004114075A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Definitions

  • This invention relates generally to a method, system and apparatus for identification number authentication, more particularly, to a method, system and apparatus for non-intrusively verifying a user's social security number.
  • the present invention relates generally to authenticating identification numbers. Often people are leery of divulging user identification numbers, such as social security numbers, on remote or public terminals such as the internet or telephone operators, or even placing them on documents. For instance, a person using the internet to purchase goods may
  • a SSN is especially vulnerable as it is a unique "person identifier" used by many agencies to track information such as credit or employment histories.
  • Recent legislation relating to identity theft includes the Federal Trade Commission Act, 15 U.S.C. ⁇ 41 et seq. (prohibiting deceptive or unfair acts or practices, including violations of stated privacy policies); Fair Credit Reporting Act, 15 U.S.C. ⁇ 1681 et seq. (addressing the accuracy, dissemination, and integrity of consumer reports); Children's Online Privacy Protection Act, 15 U.S.C. ⁇ 6501 et seq. (prohibiting the collection of personally identifiable information from young children without their parents' consent);
  • United States Patent No. 4,198,619 discloses a method of operating a personal verification system.
  • the logic module receives an account code word (or any other data that is specific for an individual) and a secret code word from an individual for encoding in accordance with a logical combination of such code words altered in accordance with a selectable control word to produce a compiled code word of fixed length.
  • the second number/code being compared is a mathematical function of at least two predetermined digits within a user's identification number.
  • United States Patent No. 4,697,236 discloses a secure system for identification verification by transmission of an access number, preferably a random number, from a central processor to a remote terminal.
  • the system provides portable identification devices for use by individuals, programmed to perform specified mathematical functions on data input thereto.
  • the portable devices may be cumbersome, expensive and difficult to
  • the invention requires
  • United States Patent No. 5,093,861 discloses a method of authentication wherein a user identification number is coordinated with an associated pin code number. There is no teaching of a method of authentication of the user's identification number.
  • United States Patent No. 5,655,020 shows a system and method for authenticating the identity of an authorized person.
  • the algorithm involves the generation of a second code that has more character positions than the first code.
  • user authentication based on mathematical functions involving at least two predetermined digits of a user's identification number.
  • identification numbers by modifying at least two digits within the user's identification number.
  • United States Patent No. 5,754,653 (Canfield) teaches a coding formula for verifying checks and credit cards.
  • the formula involves a numerical base code which is divided into two parts. Then the check number or transaction amount is modified by an assigned mathematical mode and each of the two parts of the base code. There is no teaching of comparing a first number associated with a user with a second number, wherein the second
  • United States Patent No. 5,956,699 (Wong et al.) relates to a system for secure credit card transaction on the internet.
  • the system generates a personal charge number from the user account number by inserting a user key into the user account number.
  • it fails to teach user authentication based on mathematical functions involving at least two predetermined digits of a user's identification number.
  • United States Patent No. 6,108,644 discloses a system and method for electronic transactions, which uses an unblinded validated certificate and a blinded unvalidated certification. There is no teaching of user authentication based on mathematical functions involving at least two predetermined digits of a user's identification number.
  • United States Patent Application No. 2002/0073321 discloses a method for fraud prevention for remote transactions in which a "scramble key" is generated.
  • the user then generates an input code by modifying their user code in accordance with the scramble key.
  • the user code and the input code are compared and authentication occurs if the user is determined to have used the user code to generate the input code.
  • the scramble key is applied to all or parts of the user code but there is no teaching of the scramble key being a mathematical function that includes only predetermined digits within the user's identification number.
  • the present invention broadly comprises a method, system and apparatus for authenticating a user's identification number.
  • the present invention broadly teaches a computer based method of authentication, comprising comparing a first number associated with a user with a second
  • said second number is a mathematical function of at least two predetermined
  • the present invention teaches an apparatus for authenticating a user's identification number, the apparatus comprising a means for comparing a first number associated with a user with a second number, wherein the second number is a mathematical function of at least two predetermined digits of the user's identification number.
  • the present invention broadly comprises a computer-readable medium having stored thereon a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first number associated with a user with a second number, wherein said second number is a mathematical function of at least two predetermined digits of said user's identification number.
  • the present invention broadly comprises a propagated computer data signal transmitted via a propagation medium, the computer data system comprising a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first number associated with a user with a second number, wherein said second number is a mathematical function of at least two predetermined digits of said user's
  • the present invention also teaches a computer based method of authentication
  • the invention broadly comprises an apparatus for authenticating a user's identification number, the apparatus comprising a means for comparing a first code associated with a user with a second code, wherein the second code is an alphabetic translation of at least two predetermined digits of the user's identification number.
  • One embodiment broadly comprises a computer-readable medium having stored thereon a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first code associated with a user with a second code, wherein the second code is an alphabetic translation of at least two predetermined digits of the user's identification number.
  • the computer data system comprises a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first code associated with a user with a second code, wherein the second code is a alphabetic translation of at least two predetermined digits of the user's identification number.
  • Figure 1 represents a schematic illustration of a method for carrying out the present invention
  • Figure 2 represents a detailed schematic illustration of the algorithm incorporated into the method of the present invention
  • Figure 3 is a continuation of the algorithm in Figure 2;
  • Figure 4 is a screen capture of the output of an apparatus of the present invention wherein a user enters their personal information
  • Figure 5 is a screen capture of the output of an apparatus of the present invention wherein a SSN authentication question is generated
  • Figure 6 is a screen capture of the output of an apparatus of the present invention wherein a SSN authentication question is generated, along with two other identity
  • Figure 7 is a screen capture of the output of an apparatus of the present invention wherein authentication of a user's identification number has been confirmed based on a single SSN authentication question;
  • Figure 8 is a screen capture of the output of an apparatus of the present invention wherein authentication of a user's identification number has been confirmed based on an SSN authentication question and two other identity verification questions.
  • Appendix A includes an ASCII text file printout of a computer program listing of the current invention.
  • the computer program listing appendix is hereby expressly incorporated by reference in the present application.
  • FIG. 1 represents a schematic illustration of a method for carrying out the present invention wherein a user makes an online purchase.
  • the authentication process begins at step 12.
  • the user fills out an online order at step 14.
  • a first number associated with the user is obtained from customer SSN database 16, and then modified with a mathematical function to create a key in step 18.
  • the user is then prompted with a SSN authentication question to generate a second number (hereinafter "response code"), wherein the response code is a mathematical function of at least two predetermined digits within the user's identification number.
  • the response code is compared to the key in step 22. If the key
  • step 26 is equal to the response code in step 24, the user's identity is authenticated in step 28. Otherwise the authentication fails at step 26.
  • the SSN authentication question involves adding, subtracting, multiplying or dividing any of the combination of numbers within a user's Social Security Number.
  • the user will be prompted via a web site, via a phone clerk or hard copy for a tally that would have been added, subtracted, multiplied or divided using a specified grouping of numbers within the user's Social Security Number.
  • the customer's response will be either
  • FIG. 2 and 3 represents a detailed schematic illustration of the algorithm incorporated into the method of the present invention.
  • the term “idresponse” refers to a computer program which a) locates the identity record from a SSN database and verifies the user's "Bill To" and/or "Ship To" address(es), b) generates a challenge with a SSN authentication question, and c) compares the identity record as modified by the idresponse challenge with the user response to the idresponse pop-up.
  • the order confirmation process starts at step 30.
  • the user enters their order information in step 32.
  • step 34 This may be accomplished as follows: a) the user/customer goes online or calls the merchants ordering center; b) the user places their order; or c) the Check out process gathers customer information such as: First Name and Last Name, Address Line 1, Address Line 2, City State and Zip, and Phone. The vendor then contacts idresponse in step 34 to request verification of the user's identity. The contact is determined to be successful or unsuccessful in step 36. If
  • step 38 the vendor contacts idresponse for assistance in step 38.
  • the vendor continues the transaction with the customer in step 40. However, as shown in step 42, the transaction is unverifiable.
  • idresponse searches for the identity record in step 44. If it is not located, the vendor may continue the transaction as before, but it is again unverifiable. If the identity record is located, idresponse verified the address in step 44
  • Idresponse then generates the challenge to the user in step 48.
  • the user fills in their
  • Idresponse determines the validity of the response in step 52. If invalid, the transaction may continue with the customer in step 54, but a negative authorization is sent to the vendor (step 56). If verified, the transaction continues withy the customer in step 58, and a positive authorization is sent to the vendor (step 60).
  • the user is asked to add the first and last digits of their SSN together, and give the result of the total.
  • the user adds 1 + 9 and enters the result "10.”
  • the user is asked to subtract the first and last digit of their SSN, and give the result of the total. If the SSN is 123-45-6789, the user performs the mathematical function 1 - 9 and enters the result "-8.”
  • the user is asked to multiply the first and last digits of their SSN together, and give the result of the total.
  • the user multiplies 1 by 9 and enters the result "9.”
  • the user is asked to divide the first digit of their SSN by the last digit of their SSN, and enter the result. If the SSN is 123-45-6789, the user divides 1 by 9 and enters the result "1/9.” Variations, permutations, and combinations on each of these variables within the embodiments of the invention are also intended to be within the spirit and scope of the invention as claimed.
  • a central computer may ask the user to modify the user identification number by performing additional mathematical functions on the at least two predetermined digits. For example, the computer requests that the user add 5 to the sum of the two middle digits of the user's SSN. If the SSN is 123-45-6789, the user adds 5 + 9 and enters "14.”
  • the digit for entry is limited such that the user enters the first digit of the sum of the last four digits of the SSN. The appropriate entry is "3.”
  • the user is asked to shift their SSN and then perform a mathematical or conversion function. For example, the user shifts the digits by one and then adding one to the sum of the shifted first and second digits. If the SSN is 123-45-6789, the user enters "10.”
  • the present invention also contemplates a comparison method in which several choices are provided and the user selects the appropriate choice based on their user identification number. For example, the user is asked to provide the third and fifth digits of their SSN and choose the letter which corresponds with the correct answer. Thus, if the SSN is 123-45-6789, and choices are given of a) 35 b) 45 c) 12 d) 78, the user chooses a).
  • mathematical or conversion functions may be chosen so as to vary randomly from session to session. Also, each session may consist of several SSN authentication questions.
  • the user's identification number may be a social security number, a student identification number, a personal-identification number, a federal employer identification number, patron barcode number, or payment identification
  • the mathematical function may involve addition, subtraction, division, multiplication, square roots, exponents, factorials, or logarithms. Details of some of the mathematical functions that may be used can be found in various references understood by those of skill in the art such as the Handbook of Mathematical Formulas and Integrals by Allen Jeffrey; Academic Press; 2 nd edition; (January
  • the present invention broadly teaches a method for
  • the method including generating a
  • mathematical formula key involving, as operands, at least two digits of the user identification number and a mathematical operation involving the at least two digits; providing the mathematical formula key to the user and prompting the user to generate an input code wherein the user calculates the input code from the mathematical formula key; and receiving the input code from the user.
  • Another aspect of the present invention is a method of authenticating possession of a user identification number by: generating a conversion key, involving, as operands, at least two digits of a user identification number and a translation operation involving the at least two digits; providing the conversion key to the user and prompting the user to generate an input code wherein the user creates the input code from the conversion key; and receiving the input code from the user.
  • the conversion key may be an alphabetic translation such as the conversion of a number to a letter of the alphabet.
  • the invention may be further modified to determine whether the user used the user identification number to generate the input code by retrieving from memory the user identification number of the user; calculating a verification code, wherein the verification code is produced by modifying the at least two digits of the user identification number in accordance with the mathematical formula key or the conversion; comparing the input code and the verification code; and providing an authentication signal confirming the identity of the user only if the input code and the verification code are equal.
  • Figure 4 is a screen capture of the output of an apparatus of the present invention wherein a user enters their personal information (steps 14 and 32).
  • Figure 5 is a screen capture output of an apparatus of the present invention wherein a single SSN authentication question is generated (steps 20 and 48).
  • the invention contemplates a series of
  • the user may be required to answer a series of questions requiring knowledge of various combinations of the user identification number and personal information.
  • Figure 6 is a screen capture output of an apparatus of the present invention wherein an SSN authentication question is generated, along with two other identity verification questions.
  • Figure 7 is a screen capture output of an apparatus of the present invention wherein authentication of a user's identification number has been confirmed based on the user's correct answer to a single SSN authentication question (steps 28 and 60).
  • FIG. 8 is a screen capture output of an apparatus of the present invention wherein the user's identity is verified based on the user's answers to an SSN authentication question and two identity verification questions.
  • identity verification questions shown in the figures are two examples that can be constructed from the identity information kept in databases known in the art. Methods and apparatuses using different questions are within the spirit and scope of the invention as claimed.
  • the authentication question refers to a mathematical
  • the authentication question may require the user to generate an alphabetic or alphanumeric second code/number.
  • An alphabetic translation may, for example, require the conversion of a number to a letter of the alphabet.
  • the authentication question may then request that the user enter the alphabetic translation of the last four digits of the user's
  • the present invention may be used to prevent eavesdropping on any user information entered by the user, whether numeric or alphanumeric, and whether a short code or longer blocks of information.
  • the user information which is to be protected is referred to herein as a user identification number.
  • the present invention may be utilized any time a remotely-located agent or computer requests a user entering information into a potentially publicly visible terminal (where "visible” in this sense includes all forms of eavesdropping on all forms of information entry) such as a computer connected to the internet.
  • a potentially publicly visible terminal such as a computer connected to the internet.
  • the computer in general supplies the user with certain mathematical or alphabet conversions
  • the user may still supply confirming information to the computer or agent that the user indeed is in possession of the confidential information, without the user publicly exhibiting the actual data, but only a converted version of it.
  • a human agent may be employed to perform the heretofore described functions of a central computer.
  • a user may need to enter their SSN or other confidential information into a data entry terminal that is not necessarily remotely connected with a remote database, computer, or other facilities of the company managing the account.
  • a user may enter data into a data entry terminal such as a self-contained automatic teller machine in an airport or other public location, which is able to process the user's transaction without remote communication.
  • a data entry terminal such as a self-contained automatic teller machine in an airport or other public location, which is able to process the user's transaction without remote communication.
  • the user may listen to instructions or data entry prompts from a hand-held speaker
  • a telephone or telecommunications terminal may conceivably perform locally database and related functions described hereinabove.
  • a self-contained device such as the user's laptop may require the user to enter confidential passwords or other user codes to access some information or applications.
  • an embodiment of the present invention may be utilized.
  • the present invention can benefit the user and the account company by reducing the costs associated resulting from instances of fraud and identity theft and from the
  • the present invention can also be embodied in the form of computer- implemented processes and apparatuses for practicing those processes.
  • the present invention can also be embodied in the form of computer program code embodied in tangible media, such
  • the present invention can also be embodied in the form of computer program code, for example, whether stored in a storage medium, loaded into and/or executed by a computer, or transmitted as a propagated computer data or other signal over some transmission or propagation medium, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, or otherwise embodied in a carrier wave, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the invention.
  • the computer program code segments configure the microprocessor to create specific logic circuits to carry out the desired process.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A computer based method, system and apparatus of authentication which compares a first number associated with a user with a second number, wherein the second number is a mathematical function of at least two predetermined digits within the user's identification number, preferably a Social Security Number. A computer based method, system and apparatus for authenticating a user's identification number, which compares a first code associated with a user with a second code, wherein said second code is an alphabetic translation of at least two predetermined digits within the user's identification number.

Description

METHOD, SYSTEM, AND APPARATUS FOR ΓDENTΓFIC ATION NUMBER AUTHENTICATION
TECHNICAL FIELD
This invention relates generally to a method, system and apparatus for identification number authentication, more particularly, to a method, system and apparatus for non-intrusively verifying a user's social security number.
BACKGROUND ART
The present invention relates generally to authenticating identification numbers. Often people are leery of divulging user identification numbers, such as social security numbers, on remote or public terminals such as the internet or telephone operators, or even placing them on documents. For instance, a person using the internet to purchase goods may
be asked to provide both publicly accessible information such as name and address along with a private user identification number such as a social security number (SSN), or a personal identification number (PIN). One problem with this scenario is that the user may not wish to reveal such information because of concerns about identity theft, maintaining privacy, and unauthorized third party use.
The Federal Trade Commission has noted that misuse of personal identifying information can result in temporary and sometimes permanent financial loss when wages are garnished, tax refunds are withheld, or liens are placed on victims' property as a result of someone else's criminal use of their identity. Beyond direct financial loss, consumers report being denied employment, credit, loans (including mortgages and student loans), government
benefits, utility and telecommunications services, and apartment leases when credit reports and background checks are littered with the fraudulently incurred debts or wrongful criminal records of an identity thief. A SSN is especially vulnerable as it is a unique "person identifier" used by many agencies to track information such as credit or employment histories.
Recent legislation relating to identity theft includes the Federal Trade Commission Act, 15 U.S.C. § 41 et seq. (prohibiting deceptive or unfair acts or practices, including violations of stated privacy policies); Fair Credit Reporting Act, 15 U.S.C. § 1681 et seq. (addressing the accuracy, dissemination, and integrity of consumer reports); Children's Online Privacy Protection Act, 15 U.S.C. § 6501 et seq. (prohibiting the collection of personally identifiable information from young children without their parents' consent);
Identify Theft and Assumption Deterrence Act of 1998, 18 U.S.C. §1028 (directing the FTC to collect identity theft complaints, refer them to the appropriate credit bureaus and law enforcement agencies, and provide victim assistance); Gramm-Leach-Bliley Act, 15 U.S.C. § 6801 et seq. (requiring financial institutions to provide notices to consumers and allowing consumers (with some exceptions) to choose whether their financial institutions may share their information with third parties).
Under all of this legislation, parties attempting to verify user identity may be severely limited in their access and use of such information. Thus, currently available methods for authenticating a user's identification number suffer from a lack of security and user privacy because other parties may intercept information, thus providing unauthorized and illegal access to these numbers. Also, parties with the legitimate need for this information or concerned about trying to protect themselves from fraudulent transactions, need a non-invasive method for authenticating a user identification number. A variety of methods, systems and apparatus for verifying a user identification number are known in the art.
United States Patent No. 4,198,619 (Atalla) discloses a method of operating a personal verification system. The logic module receives an account code word (or any other data that is specific for an individual) and a secret code word from an individual for encoding in accordance with a logical combination of such code words altered in accordance with a selectable control word to produce a compiled code word of fixed length. There is no teaching that the second number/code being compared is a mathematical function of at least two predetermined digits within a user's identification number.
United States Patent No. 4,697,236 (Davies) discloses a secure system for identification verification by transmission of an access number, preferably a random number, from a central processor to a remote terminal. The system provides portable identification devices for use by individuals, programmed to perform specified mathematical functions on data input thereto. The portable devices may be cumbersome, expensive and difficult to
modify since changes must be coordinated with the central processor. Also, there is no teaching of comparing a first number associated with a user with a second number, wherein the second number is a mathematical function of at least two predetermined digits of the user's identification number.
United States Patent No. 4,992,783 (Zdunek et al.) teaches a method and
I apparatus for controlling access to a two-way communication system. The invention requires
the use of both numbers and password codes in the subscriber units. Thus, it does not teach a
method of authentication using a single user identification number.
United States Patent No. 5,093,861 (Graham) discloses a method of authentication wherein a user identification number is coordinated with an associated pin code number. There is no teaching of a method of authentication of the user's identification number.
United States Patent No. 5,555,303 (Stambler) teaches a secret transaction
system which uses a joint code derived from a transaction, document, or thing to code information. The system involves a comparison of re-derived information against information recorded on the document to authenticate the accuracy of that information. Thus, there is no teaching of comparing a first number associated with a user with a second number, wherein the second number is a mathematical function of at least two predetermined digits of the user's identification number.
United States Patent No. 5,655,020 (Powers) shows a system and method for authenticating the identity of an authorized person. The algorithm involves the generation of a second code that has more character positions than the first code. Again, there is no teaching of user authentication based on mathematical functions involving at least two predetermined digits of a user's identification number.
United States Patent Nos. 5,754,652 and 5,940,511 (Wilfong) disclose a method and apparatus for secure PIN entry in which the user sequentially encodes each digit
of number, one digit at a time. There is no teaching of non-sequentially encoding user
identification numbers by modifying at least two digits within the user's identification number.
United States Patent No. 5,754,653 (Canfield) teaches a coding formula for verifying checks and credit cards. The formula involves a numerical base code which is divided into two parts. Then the check number or transaction amount is modified by an assigned mathematical mode and each of the two parts of the base code. There is no teaching of comparing a first number associated with a user with a second number, wherein the second
number is a mathematical function of at least two predetermined digits of the user's identification number.
United States Patent No. 5,956,699 (Wong et al.) relates to a system for secure credit card transaction on the internet. The system generates a personal charge number from the user account number by inserting a user key into the user account number. Thus, it fails to teach user authentication based on mathematical functions involving at least two predetermined digits of a user's identification number.
United States Patent No. 6,108,644 (Goldschlag et al.) discloses a system and method for electronic transactions, which uses an unblinded validated certificate and a blinded unvalidated certification. There is no teaching of user authentication based on mathematical functions involving at least two predetermined digits of a user's identification number.
United States Patent Application No. 2002/0073321 (Kinsella) discloses a method for fraud prevention for remote transactions in which a "scramble key" is generated. The user then generates an input code by modifying their user code in accordance with the scramble key. The user code and the input code are compared and authentication occurs if the user is determined to have used the user code to generate the input code. The scramble key is applied to all or parts of the user code but there is no teaching of the scramble key being a mathematical function that includes only predetermined digits within the user's identification number.
What is needed, then, is a non-intrusive method, system and apparatus for
authentication of user identification numbers.
DISCLOSURE OF INVENTION
The present invention broadly comprises a method, system and apparatus for authenticating a user's identification number.
In one embodiment, the present invention broadly teaches a computer based method of authentication, comprising comparing a first number associated with a user with a second
number, wherein said second number is a mathematical function of at least two predetermined
digits of said user's identification number. In another embodiment, the present invention teaches an apparatus for authenticating a user's identification number, the apparatus comprising a means for comparing a first number associated with a user with a second number, wherein the second number is a mathematical function of at least two predetermined digits of the user's identification number.
Also, the present invention broadly comprises a computer-readable medium having stored thereon a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first number associated with a user with a second number, wherein said second number is a mathematical function of at least two predetermined digits of said user's identification number.
In yet another embodiment, the present invention broadly comprises a propagated computer data signal transmitted via a propagation medium, the computer data system comprising a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first number associated with a user with a second number, wherein said second number is a mathematical function of at least two predetermined digits of said user's
identification number.
The present invention also teaches a computer based method of authentication,
comprising comparing a first code associated with a user with a second code, wherein said second code is an alphabetic translation of at least two predetermined digits of said user's identification number.
In another embodiment, the invention broadly comprises an apparatus for authenticating a user's identification number, the apparatus comprising a means for comparing a first code associated with a user with a second code, wherein the second code is an alphabetic translation of at least two predetermined digits of the user's identification number.
One embodiment broadly comprises a computer-readable medium having stored thereon a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first code associated with a user with a second code, wherein the second code is an alphabetic translation of at least two predetermined digits of the user's identification number.
In yet another embodiment involving a propagated computer data signal transmitted via a propagation medium, the computer data system comprises a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first code associated with a user with a second code, wherein the second code is a alphabetic translation of at least two predetermined digits of the user's identification number.
It is an object of the present invention to provide a computer based, non- intrusive method for authentication and verification of user identification numbers during
purchase transactions on the internet.
These and other objects, features, and advantages of the present invention will become readily apparent to those having ordinary skill in the art upon reading the following detailed description of the invention in view of the several drawings of the invention.
BRIEF DESCRIPTION OF DRAWINGS
The nature and mode of operation of the present invention will now be more fully described in the following detailed description of the invention taken with the accompanying drawing figures, in which: Figure 1 represents a schematic illustration of a method for carrying out the present invention;
Figure 2 represents a detailed schematic illustration of the algorithm incorporated into the method of the present invention;
Figure 3 is a continuation of the algorithm in Figure 2;
Figure 4 is a screen capture of the output of an apparatus of the present invention wherein a user enters their personal information;
Figure 5 is a screen capture of the output of an apparatus of the present invention wherein a SSN authentication question is generated;
Figure 6 is a screen capture of the output of an apparatus of the present invention wherein a SSN authentication question is generated, along with two other identity
verification questions;
Figure 7 is a screen capture of the output of an apparatus of the present invention wherein authentication of a user's identification number has been confirmed based on a single SSN authentication question; and
Figure 8 is a screen capture of the output of an apparatus of the present invention wherein authentication of a user's identification number has been confirmed based on an SSN authentication question and two other identity verification questions.
Appendix A includes an ASCII text file printout of a computer program listing of the current invention. The computer program listing appendix is hereby expressly incorporated by reference in the present application. BEST MODE FOR CARRYING OUT THE INVENTION
While the present invention is described with respect to what is presently considered to be the preferred embodiments, it is understood that the invention is not limited to the disclosed embodiments.
Figure 1 represents a schematic illustration of a method for carrying out the present invention wherein a user makes an online purchase. The authentication process begins at step 12. The user fills out an online order at step 14. A first number associated with the user is obtained from customer SSN database 16, and then modified with a mathematical function to create a key in step 18. In step 20, the user is then prompted with a SSN authentication question to generate a second number (hereinafter "response code"), wherein the response code is a mathematical function of at least two predetermined digits within the user's identification number. The response code is compared to the key in step 22. If the key
is equal to the response code in step 24, the user's identity is authenticated in step 28. Otherwise the authentication fails at step 26.
In general the SSN authentication question involves adding, subtracting, multiplying or dividing any of the combination of numbers within a user's Social Security Number. The user will be prompted via a web site, via a phone clerk or hard copy for a tally that would have been added, subtracted, multiplied or divided using a specified grouping of numbers within the user's Social Security Number. The customer's response will be either
right or wrong (pass or fail), determining if they are using the Social Security Number
legitimately or fraudulently.
Figures 2 and 3 represents a detailed schematic illustration of the algorithm incorporated into the method of the present invention. The term "idresponse" refers to a computer program which a) locates the identity record from a SSN database and verifies the user's "Bill To" and/or "Ship To" address(es), b) generates a challenge with a SSN authentication question, and c) compares the identity record as modified by the idresponse challenge with the user response to the idresponse pop-up. The order confirmation process starts at step 30. The user enters their order information in step 32. This may be accomplished as follows: a) the user/customer goes online or calls the merchants ordering center; b) the user places their order; or c) the Check out process gathers customer information such as: First Name and Last Name, Address Line 1, Address Line 2, City State and Zip, and Phone. The vendor then contacts idresponse in step 34 to request verification of the user's identity. The contact is determined to be successful or unsuccessful in step 36. If
unsuccessful, the vendor contacts idresponse for assistance in step 38. The vendor continues the transaction with the customer in step 40. However, as shown in step 42, the transaction is unverifiable.
If idresponse is successfully contacted, idresponse searches for the identity record in step 44. If it is not located, the vendor may continue the transaction as before, but it is again unverifiable. If the identity record is located, idresponse verified the address in step
46. Idresponse then generates the challenge to the user in step 48. The user fills in their
response in step 50. Idresponse determines the validity of the response in step 52. If invalid, the transaction may continue with the customer in step 54, but a negative authorization is sent to the vendor (step 56). If verified, the transaction continues withy the customer in step 58, and a positive authorization is sent to the vendor (step 60).
In a first example of a mathematical function used to create the key and
response code, the user is asked to add the two center digits of their SSN together, and enter
the result of the total. If the SSN is 123-45-6789, the user adds 4 + 5 and enters the result
"9." In a second example, the user is asked to add the first and last digits of their SSN together, and give the result of the total. Thus, if the SSN is 123-45-6789, the user adds 1 + 9 and enters the result "10." In a third example, the user is asked to subtract the first and last digit of their SSN, and give the result of the total. If the SSN is 123-45-6789, the user performs the mathematical function 1 - 9 and enters the result "-8." In a fourth example, the user is asked to multiply the first and last digits of their SSN together, and give the result of the total. If the SSN is 123-45-6789, the user multiplies 1 by 9 and enters the result "9." In a fifth example, the user is asked to divide the first digit of their SSN by the last digit of their SSN, and enter the result. If the SSN is 123-45-6789, the user divides 1 by 9 and enters the result "1/9." Variations, permutations, and combinations on each of these variables within the embodiments of the invention are also intended to be within the spirit and scope of the invention as claimed.
In another example, a central computer may ask the user to modify the user identification number by performing additional mathematical functions on the at least two predetermined digits. For example, the computer requests that the user add 5 to the sum of the two middle digits of the user's SSN. If the SSN is 123-45-6789, the user adds 5 + 9 and enters "14."
The mathematical functions or alphabetic translation, or constituent parts
thereof, may be applied to parts of all, or all of the user identification number. Thus, the user
may be asked to sum all the digits of their SSN so that if the SSN is 123-45-6789, the user enters "45." In a further example, the digit for entry is limited such that the user enters the first digit of the sum of the last four digits of the SSN. The appropriate entry is "3."
In another example, the user is asked to shift their SSN and then perform a mathematical or conversion function. For example, the user shifts the digits by one and then adding one to the sum of the shifted first and second digits. If the SSN is 123-45-6789, the user enters "10."
The present invention also contemplates a comparison method in which several choices are provided and the user selects the appropriate choice based on their user identification number. For example, the user is asked to provide the third and fifth digits of their SSN and choose the letter which corresponds with the correct answer. Thus, if the SSN is 123-45-6789, and choices are given of a) 35 b) 45 c) 12 d) 78, the user chooses a).
Furthermore, the mathematical or conversion functions may be chosen so as to vary randomly from session to session. Also, each session may consist of several SSN authentication questions.
In one aspect of the present invention, the user's identification number may be a social security number, a student identification number, a personal-identification number, a federal employer identification number, patron barcode number, or payment identification
number.
In another aspect of the present invention, the mathematical function may involve addition, subtraction, division, multiplication, square roots, exponents, factorials, or logarithms. Details of some of the mathematical functions that may be used can be found in various references understood by those of skill in the art such as the Handbook of Mathematical Formulas and Integrals by Allen Jeffrey; Academic Press; 2nd edition; (January
15, 2000) incorporated herein in its entirety.
In yet another aspect, the present invention broadly teaches a method for
authenticating possession of a user identification number, the method including generating a
mathematical formula key, involving, as operands, at least two digits of the user identification number and a mathematical operation involving the at least two digits; providing the mathematical formula key to the user and prompting the user to generate an input code wherein the user calculates the input code from the mathematical formula key; and receiving the input code from the user.
Another aspect of the present invention is a method of authenticating possession of a user identification number by: generating a conversion key, involving, as operands, at least two digits of a user identification number and a translation operation involving the at least two digits; providing the conversion key to the user and prompting the user to generate an input code wherein the user creates the input code from the conversion key; and receiving the input code from the user. In this aspect of the invention, the conversion key may be an alphabetic translation such as the conversion of a number to a letter of the alphabet.
The invention may be further modified to determine whether the user used the user identification number to generate the input code by retrieving from memory the user identification number of the user; calculating a verification code, wherein the verification code is produced by modifying the at least two digits of the user identification number in accordance with the mathematical formula key or the conversion; comparing the input code and the verification code; and providing an authentication signal confirming the identity of the user only if the input code and the verification code are equal.
Figure 4 is a screen capture of the output of an apparatus of the present invention wherein a user enters their personal information (steps 14 and 32). Figure 5 is a screen capture output of an apparatus of the present invention wherein a single SSN authentication question is generated (steps 20 and 48). In order to reduce the likelihood of a user randomly arriving at the correct response, the invention contemplates a series of
questions requiring repeated congruence between the key and the response code. Additionally, the user may be required to answer a series of questions requiring knowledge of various combinations of the user identification number and personal information.
For example, Figure 6 is a screen capture output of an apparatus of the present invention wherein an SSN authentication question is generated, along with two other identity verification questions. Figure 7 is a screen capture output of an apparatus of the present invention wherein authentication of a user's identification number has been confirmed based on the user's correct answer to a single SSN authentication question (steps 28 and 60). Figure
8 is a screen capture output of an apparatus of the present invention wherein the user's identity is verified based on the user's answers to an SSN authentication question and two identity verification questions. It should be readily apparent to one skilled in the art that the identity verification questions shown in the figures are two examples that can be constructed from the identity information kept in databases known in the art. Methods and apparatuses using different questions are within the spirit and scope of the invention as claimed.
In the above example, the authentication question refers to a mathematical
modification of the user's SSN. However, in another aspect of the invention, the authentication question may require the user to generate an alphabetic or alphanumeric second code/number. An alphabetic translation may, for example, require the conversion of a number to a letter of the alphabet. The user may be provided a conversion or translation key wherein 0=A; 1=B; 2=C; 3=D; 4=E; 5=F; 6=G; 7=H; 8=1; and 9=J. The authentication question may then request that the user enter the alphabetic translation of the last four digits of the user's
SSN. If the SSN is 123-45-6789, authentication would occur if the user entered "GHIJ".
Conversions involving symbols, non-English characters, ideograms, and any other methods known in the art are within the spirit and scope of the invention as claimed. In alternative embodiments, the present invention may be used to prevent eavesdropping on any user information entered by the user, whether numeric or alphanumeric, and whether a short code or longer blocks of information. In any event, the user information which is to be protected is referred to herein as a user identification number.
It will be understood that, in general, the present invention may be utilized any time a remotely-located agent or computer requests a user entering information into a potentially publicly visible terminal (where "visible" in this sense includes all forms of eavesdropping on all forms of information entry) such as a computer connected to the internet. The computer in general supplies the user with certain mathematical or alphabet conversions
and asks the user to use these conversions to provide a converted version of the information to
the computer. Thus, the user may still supply confirming information to the computer or agent that the user indeed is in possession of the confidential information, without the user publicly exhibiting the actual data, but only a converted version of it.
As will be understood, in alternative embodiments a human agent may be employed to perform the heretofore described functions of a central computer.
As will further be understood, although account-related transactions associated
with remote terminals is described herein above, in alternative preferred embodiments users may need to enter their SSN or other confidential information into a data entry terminal that is not necessarily remotely connected with a remote database, computer, or other facilities of the company managing the account. For instance, a user may enter data into a data entry terminal such as a self-contained automatic teller machine in an airport or other public location, which is able to process the user's transaction without remote communication. In this case, for
example, the user may listen to instructions or data entry prompts from a hand-held speaker
similar to that used with telephones, so that the mathematical or alphabetic conversions directed to the user are not audible to unauthorized users who may be nearby. The user may then supply his account or other information after converting it in accordance with the terminal's prompts, for instance by speaking the information vocally into a microphone in the mouthpiece or by entering the data into a keypad. Similarly, a telephone or telecommunications terminal may conceivably perform locally database and related functions described hereinabove. In another embodiment, a self-contained device such as the user's laptop may require the user to enter confidential passwords or other user codes to access some information or applications. In this context as well, an embodiment of the present invention may be utilized.
The present invention can benefit the user and the account company by reducing the costs associated resulting from instances of fraud and identity theft and from the
very possibility of such fraud and theft, and should also make the services of a company utilizing the techniques of the present invention more attractive to users desiring confidentiality for social security numbers, account numbers and related information.
The present invention can also be embodied in the form of computer- implemented processes and apparatuses for practicing those processes. The present invention can also be embodied in the form of computer program code embodied in tangible media, such
as floppy diskettes, CD-ROMs, hard drives, or any other computer-readable storage medium,
wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the invention. The present invention can also be embodied in the form of computer program code, for example, whether stored in a storage medium, loaded into and/or executed by a computer, or transmitted as a propagated computer data or other signal over some transmission or propagation medium, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, or otherwise embodied in a carrier wave, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the invention. When implemented on a future general-purpose microprocessor sufficient to carry out the present invention, the computer program code segments configure the microprocessor to create specific logic circuits to carry out the desired process.
Thus it is seen that the objects of the invention are efficiently obtained, although changes and modifications to the invention should be readily apparent to those having ordinary skill in the art, which changes are considered to be within the scope of the invention as claimed. Variations, permutations, and combinations on such embodiments are also intended to be within the spirit and scope of the invention as claimed.

Claims

1. A computer based method of authentication, comprising comparing a first number associated with a user with a second number, wherein said second number is a mathematical function of at least two predetermined digits within said user's identification number, wherein said function includes only predetermined digits within said user's identification number.
2. The computer based method of claim 1, wherein the user's identification number is selected from the group consisting of a social security number, a student identification number, a personal-identification number, a federal employer identification number, patron barcode number, and payment identification number.
3. The method of claim 1, wherein the mathematical function is selected from the group
consisting of addition, subtraction, division, multiplication, square root, exponent, factorial, and logarithm.
4. An apparatus for authenticating a user's identification number, the apparatus comprising: means for comparing a first number associated with a user with a second number, wherein said second number is a mathematical function of at least two predetermined digits within said user's identification number, wherein said function includes only predetermined digits within
said user's identification number.
5. The apparatus of claim 4, wherein the user's identification number is selected from the group consisting of a social security number, a student identification number, and a personal- identification number.
6. A computer-readable medium having stored thereon a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first number associated with a user with a second number, wherein said second number is a mathematical function of at least two predetermined digits within said user's identification number, wherein said function includes only predetermined digits within said user's identification number.
7. A propagated computer data signal transmitted via a propagation medium, the computer data system comprising a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor,
cause the processor to compare a first number associated with a user with a second number, wherein said second number is a mathematical function of at least two predetermined digits within said user's identification number, wherein said function includes only predetermined digits within said user's identification number.
8. The apparatus of claim 7, wherein the propagation medium is selected from the group
consisting of a computer, a public telephone, and an automated teller machine.
9. A computer based method of authentication, comprising comparing a first code associated with a user with a second code, wherein said second code is an alphabetic translation of at least two predetermined digits within said user's identification number.
10. The method of claim 9, wherein the alphabetic translation comprises the conversion of a number to a letter of the alphabet.
11. An apparatus for authenticating a user's identification number, the apparatus comprising:
means for comparing a first code associated with a user with a second code, wherein said
second code is an alphabetic translation of at least two predetermined digits within said user's identification number.
12. The method of claim 11, wherein the alphabetic translation comprises the conversion of a number to a letter of the alphabet.
13. The apparatus of claim 11, wherein the user's identification number is selected from the group consisting of a social security number, a student identification number, a personal identification number, a federal employer identification number, patron barcode number, and payment identification number.
14. A computer-readable medium having stored thereon a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first code associated with a user with a second code, wherein said second code is an alphabetic translation of at least two
predetermined digits within said user's identification number.
15. A propagated computer data signal transmitted via a propagation medium, the computer data system comprising a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when executed by a processor, cause the processor to compare a first code associated with a user with a second code, wherein said second code is a alphabetic translation of at least two predetermined digits within
said user's identification number
16. The apparatus of claim 15, wherein the propagation medium is selected from the group consisting of a computer, a public telephone, and an automated teller machine.
17. A computer based method, comprising calculating a number with a mathematical function of at least two predetermined digits within a user's identification number, wherein said function includes only predetermined digits within said user's identification number.
18. The computer based method of claim 17, wherein the user's identification number is
selected from the group consisting of a social security number, a student identification number,
a personal-identification number, a federal employer identification number, patron barcode
number, and payment identification number.
19. An apparatus for authenticating a user's identification number, the apparatus comprising: calculating a number with a mathematical function of at least two predetermined digits within a user's identification number, wherein said function includes only predetermined digits within said user's identification number.
20. The apparatus of claim 19, wherein the user's identification number is selected from the group consisting of a social security number, a student identification number, and a personal-identification number.
21. A computer-readable medium having stored thereon a plurality of instructions for authenticating a user's identification number, wherein the plurality of instructions, when
executed by a processor, cause the processor to calculate a number with a mathematical
function of at least two predetermined digits within said user's identification number, wherein said function includes only predetermined digits within said user's identification number.
APPENDΓX A
Et Al , Inc/ DBA idresponse Code for SSN Calculation and Comparison Question .
"ssnl"=>"Which number matches the last two digits of your social security number? " ,
"ssn2"=>" hat do the 2 middle numbers of your Social Security number add up to?",
"ssn3"=>"What does the first number and last number of your Social Security number add up to?",
FAKE ANSWERS case "ssnl":
$ra[] = rand(0,9) . rand(0,9);
$ra[] = rand(0,9) . rand(0,9);
$ra[] = rand(0,9) . rand(0,9);
// REMOVING REAL ANSWER IF IN ARRAY
$name = "a" . $q;
$realanswer = $this->$name;
$fakeno[] = rand (0,6);
$fakeno[] = rand (0,6); for ($i=$fakeno[0] ;$i<$fakeno [0] +3; $i++) { for
( $j=$fakeno [ l] ; $j<$fakeno [ l] +3; $j++) {
$ssnarray [ ] = $i . $j ;
}
}
$ra =
$this->remrealanswer ($realanswer, $ra, $ssnarray) ; break; case "ssn2":
$ra[] = rand (0,18) ;$ra[] = rand(0,18);
$ra[] = rand (0,18) ;
// REMOVING REAL ANSWER IF IN ARRAY
$name = "a" . $q;
$realanswer = $this->$name;
$ssnarray = array (0, 1,2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17,18) ;
$ra =
$this->remrealanswer ($realanswer, $ra, $ssnarray) ; break; case "ssn3":
$ra[] = rand(0, 18) ;
$ra[] = rand (0,18) ;
$ra[] = rand(0,18) ;
/ REMOVING REAL ANSWER IF IN ARRAY
$name = "a" . $q;
$realanswer = $this->$name;
$ssnarray = array (0,1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18) ;
$ra =
$this->remrealanswer ($realanswer, $ra, $ssnarray) ; break;
REAL ANSWERS case "ssnl" : if ( $ssn == " " ) { return false;
} else {
$No[] = substr ($ssn, 7, 1) ;
$No[] = substr ($ssn, 8, 1) ;
$name = "a" . $q;
$this->$name = $No[0] . $No[l]; return $No[0] . $No[l];
} break; case "ssn2": if ($ssn == "") { return false;
} else {$No[] = substr ($ssn, 3, 1) ;
$No[] = substr ($ssn, 4, 1) ;
$name = "a" . $q;
$this->$name = $No[0] + $No[l]; return $No[0] + $No[l];
} break; case "ssn3": if ($ssn == "") { return false;
} else {
$No[] = substr ($ssn, 0, 1),-
$No[] = substr ($ssn, 8,1);
$name = "a" . $q;
$this->$name = $No [0] + $No [l] ; return $No [ 0] + $No [ l] ;
} break;
PCT/US2004/019014 2003-06-17 2004-06-16 Method, system, and apparatus for identification number authentication WO2004114075A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/250,249 US7676681B2 (en) 2003-06-17 2003-06-17 Method, system, and apparatus for identification number authentication
US10/250,249 2003-06-17

Publications (2)

Publication Number Publication Date
WO2004114075A2 true WO2004114075A2 (en) 2004-12-29
WO2004114075A3 WO2004114075A3 (en) 2006-08-24

Family

ID=33538835

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/019014 WO2004114075A2 (en) 2003-06-17 2004-06-16 Method, system, and apparatus for identification number authentication

Country Status (2)

Country Link
US (2) US7676681B2 (en)
WO (1) WO2004114075A2 (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9064364B2 (en) * 2003-10-22 2015-06-23 International Business Machines Corporation Confidential fraud detection system and method
US7690563B2 (en) * 2004-09-14 2010-04-06 Rose James M Transaction security system
US9191198B2 (en) 2005-06-16 2015-11-17 Hewlett-Packard Development Company, L.P. Method and device using one-time pad data
TW200701732A (en) * 2005-06-21 2007-01-01 Ite2 Technology Inc Method and system for verifying personal identity in internet trades
JP2007049343A (en) * 2005-08-09 2007-02-22 Fujitsu Ltd Authentication system
US20140125455A1 (en) * 2005-09-01 2014-05-08 Memphis Technologies, Inc. Systems and algorithms for classification of user based on their personal features
US20070101410A1 (en) * 2005-09-29 2007-05-03 Hewlett-Packard Development Company, L.P. Method and system using one-time pad data to evidence the possession of a particular attribute
US8842839B2 (en) * 2005-09-29 2014-09-23 Hewlett-Packard Development Company, L.P. Device with multiple one-time pads and method of managing such a device
US8881266B2 (en) * 2008-11-13 2014-11-04 Palo Alto Research Center Incorporated Enterprise password reset
US20100313273A1 (en) * 2009-06-06 2010-12-09 Walter Stewart Freas Securing or Protecting from Theft, Social Security or Other Sensitive Numbers in a Computerized Environment
US8370926B1 (en) * 2010-04-27 2013-02-05 Symantec Corporation Systems and methods for authenticating users
US8775353B2 (en) * 2010-07-06 2014-07-08 Carnegie Mellon University Validating legitimacy of a social security number or other identifier
US8949371B1 (en) * 2011-09-29 2015-02-03 Symantec Corporation Time and space efficient method and system for detecting structured data in free text
US8650627B2 (en) * 2011-12-28 2014-02-11 Tata Consultancy Services Ltd. Computer implemented system and method for providing challenge-response solutions to authenticate a user
US20130182576A1 (en) * 2012-01-13 2013-07-18 Qualcomm Incorporated Context-aware mobile computing for automatic environment detection and re-establishment
US9680763B2 (en) 2012-02-14 2017-06-13 Airwatch, Llc Controlling distribution of resources in a network
US10404615B2 (en) 2012-02-14 2019-09-03 Airwatch, Llc Controlling distribution of resources on a network
US9648490B2 (en) 2012-03-01 2017-05-09 Qualcomm Incorporated Context-aware mobile computing for automatic environment detection and re-establishment
US20140280955A1 (en) 2013-03-14 2014-09-18 Sky Socket, Llc Controlling Electronically Communicated Resources
US9401915B2 (en) * 2013-03-15 2016-07-26 Airwatch Llc Secondary device as key for authorizing access to resources
US9509682B2 (en) 2014-01-10 2016-11-29 The Board Of Regents Of The Nevada System Of Higher Education On Behalf Of The University Of Nevada, Las Vegas Obscuring usernames during a login process
US10055747B1 (en) * 2014-01-20 2018-08-21 Acxiom Corporation Consumer Portal
US9584964B2 (en) 2014-12-22 2017-02-28 Airwatch Llc Enforcement of proximity based policies
US9413754B2 (en) 2014-12-23 2016-08-09 Airwatch Llc Authenticator device facilitating file security

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6282658B2 (en) * 1998-05-21 2001-08-28 Equifax, Inc. System and method for authentication of network users with preprocessing
US20030038707A1 (en) * 2000-03-17 2003-02-27 Avner Geller Method for secured identification of user's id

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4198619A (en) 1976-10-28 1980-04-15 Atalla Technovations Corporation Programmable security system and method
US4745267A (en) 1983-12-28 1988-05-17 Fairview Partners Fraudulent card intercept system
US4652698A (en) 1984-08-13 1987-03-24 Ncr Corporation Method and system for providing system security in a remote terminal environment
US4679236A (en) 1984-12-21 1987-07-07 Davies Richard E Identification verification method and system
US4992783A (en) 1988-04-04 1991-02-12 Motorola, Inc. Method and apparatus for controlling access to a communication system
US5093861A (en) 1990-10-12 1992-03-03 Cardkey Systems, Inc. Recognition apparatus and method for security systems
US5655020A (en) 1992-05-08 1997-08-05 Wesco Software Limited Authenticating the identity of an authorized person
US5267314A (en) 1992-11-17 1993-11-30 Leon Stambler Secure transaction system and method utilized therein
SE9403060L (en) 1994-09-14 1995-10-09 Leif Karlsson Method and apparatus for facilitating authorized and at the same time making unauthorized access to a plurality of digit codes
US5754652A (en) * 1994-12-14 1998-05-19 Lucent Technologies Inc. Method and apparatus for secure pin entry
US5754653A (en) 1995-07-26 1998-05-19 Canfield; Henry A. Coding formula for verifying checks and credit cards
US5913203A (en) 1996-10-03 1999-06-15 Jaesent Inc. System and method for pseudo cash transactions
US6108636A (en) * 1996-10-15 2000-08-22 Iris Corporation Berhad Luggage handling and reconciliation system using an improved security identification document including contactless communication insert unit
US6058189A (en) 1997-06-20 2000-05-02 Secure Choice Llc Method and system for performing secure electronic monetary transactions
CA2302784A1 (en) * 1997-09-17 1999-03-25 Frank C. Luyster Improved block cipher method
US6009411A (en) * 1997-11-14 1999-12-28 Concept Shopping, Inc. Method and system for distributing and reconciling electronic promotions
US6108644A (en) 1998-02-19 2000-08-22 At&T Corp. System and method for electronic transactions
US6070154A (en) 1998-11-27 2000-05-30 Activepoint Ltd. Internet credit card security
US7275110B2 (en) 1999-12-03 2007-09-25 Intercard Payments, Inc. Authentication using portion of social security number
US20030070074A1 (en) * 2000-03-17 2003-04-10 Avner Geller Method and system for authentication
US20010051928A1 (en) * 2000-04-21 2001-12-13 Moshe Brody Protection of software by personalization, and an arrangement, method, and system therefor
US6535269B2 (en) 2000-06-30 2003-03-18 Gary Sherman Video karaoke system and method of use
US20020032662A1 (en) 2000-08-30 2002-03-14 Maclin Roland Martin System and method for servicing secure credit/debit card transactions
US7392388B2 (en) * 2000-09-07 2008-06-24 Swivel Secure Limited Systems and methods for identity verification for secure transactions
US20030021417A1 (en) 2000-10-20 2003-01-30 Ognjen Vasic Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
US20020073321A1 (en) 2000-12-08 2002-06-13 Kinsella N. Stephan Fraud prevention for remote transactions
US6940980B2 (en) * 2000-12-19 2005-09-06 Tricipher, Inc. High security cryptosystem
US20030014672A1 (en) 2001-07-13 2003-01-16 Meera Desikamani Authentication protocol with dynamic secret
US20030120922A1 (en) * 2001-12-06 2003-06-26 Fairchild Semiconductor Corporation Device authentication system and method
US20040044739A1 (en) * 2002-09-04 2004-03-04 Robert Ziegler System and methods for processing PIN-authenticated transactions
US8108916B2 (en) * 2003-05-21 2012-01-31 Wayport, Inc. User fraud detection and prevention of access to a distributed network communication system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6282658B2 (en) * 1998-05-21 2001-08-28 Equifax, Inc. System and method for authentication of network users with preprocessing
US20030038707A1 (en) * 2000-03-17 2003-02-27 Avner Geller Method for secured identification of user's id

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SCHNEIER B.: 'Applied Cryptography', vol. 2ND ED., 1996, JOHN WILEY & SONES, INC. page 10, XP003001084 *

Also Published As

Publication number Publication date
US20100107233A1 (en) 2010-04-29
US7676681B2 (en) 2010-03-09
WO2004114075A3 (en) 2006-08-24
US20050005113A1 (en) 2005-01-06

Similar Documents

Publication Publication Date Title
US20100107233A1 (en) Method, system, and apparatus for identification number authentication
US10083285B2 (en) Direct authentication system and method via trusted authenticators
US20180247483A1 (en) Security systems for protecting an asset
US5940511A (en) Method and apparatus for secure PIN entry
US8738921B2 (en) System and method for authenticating a person&#39;s identity using a trusted entity
CA2649015C (en) Graphical image authentication and security system
US8224887B2 (en) System, method and computer program product for authenticating a client
CN101335619B (en) Authorized using method of disposal dynamic cipher telephone or short message
US20030208449A1 (en) Credit card fraud prevention system and method using secure electronic credit card
MX2007007511A (en) Authentication device and/or method.
IL175228A (en) Use of public switched telephone network for capturing electronic signatures in on-line transactions
US20130024377A1 (en) Methods And Systems For Securing Transactions And Authenticating The Granting Of Permission To Perform Various Functions Over A Network
CN106911722B (en) Intelligent password signature identity authentication bidirectional authentication method and system
JPH06507277A (en) Personal authentication method and device
US7069584B1 (en) Process and apparatus for improving the security of authentication procedures using a new “Super PIN”
US20140244510A1 (en) Privacy protection system and method
KR100818793B1 (en) A Phone-Banking Auto Calling System and Finance Dealing Method Using the Same
JP3925613B2 (en) Personal authentication system and personal authentication method
Reno Multifactor authentication: Its time has come
US20020073321A1 (en) Fraud prevention for remote transactions
US20040015688A1 (en) Interactive authentication process
Smejkal et al. Development trends of electronic authentication
JP3090265B2 (en) Authentication IC card
Gahan URU—on-line identity verification
Ndunagu et al. Development of an enhanced mobile banking security: multifactor authentication approach

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase