US20110140834A1 - Secure identification, verification and authorization using a secure portable device - Google Patents
Secure identification, verification and authorization using a secure portable device Download PDFInfo
- Publication number
- US20110140834A1 US20110140834A1 US12/837,736 US83773610A US2011140834A1 US 20110140834 A1 US20110140834 A1 US 20110140834A1 US 83773610 A US83773610 A US 83773610A US 2011140834 A1 US2011140834 A1 US 2011140834A1
- Authority
- US
- United States
- Prior art keywords
- user
- information
- image
- portable device
- output
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 42
- 238000012795 verification Methods 0.000 title description 16
- 238000000034 method Methods 0.000 claims description 42
- 238000012790 confirmation Methods 0.000 description 30
- 230000008569 process Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 13
- 230000015654 memory Effects 0.000 description 10
- 230000000694 effects Effects 0.000 description 9
- 238000010295 mobile communication Methods 0.000 description 9
- 238000012546 transfer Methods 0.000 description 9
- 230000004044 response Effects 0.000 description 8
- 230000001413 cellular effect Effects 0.000 description 6
- 235000014510 cooky Nutrition 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 230000036962 time dependent Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000009795 derivation Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000001994 activation Methods 0.000 description 1
- 230000009118 appropriate response Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Definitions
- the present invention relates generally to secure transactions, and more specifically, to methods and devices for providing secure identification, verification and authorization using a portable secure device.
- authentication can be useful including, for example, e-commerce transactions, secure system access, etc.
- Authentication technologies are generally implemented to verify the identify of a user prior to allowing the user to have ability to perform certain tasks, such as, accessing confidential information or conducting authorized transactions.
- Many authentication systems are known in the art and the methodologies associated with these systems cover a wide range of techniques.
- an apparatus for identifying an individual.
- the apparatus employs a static value and a dynamic variable to generate passwords.
- a fixed code is entered into the card by the user at the start of the access request procedure.
- This fixed code constitutes the static value.
- the dynamic variable is produced which varies dynamically as a function of time.
- the static value and the dynamic variable are next used as input parameters of a secret encryption algorithm implemented in order to produce a password in the card.
- This password is displayed on the card and the user is invited to transfer it to a server.
- the fixed code is also transferred to the server.
- the server calculates the password by using the same encryption algorithm and the dynamic variable.
- the password generated by the password is compared with the password transmitted to the server by the user.
- the dynamic variable is a time-dependent dynamic value. Since this variable is necessarily produced independently, both in the card and in the server, the clocks of these two facilities used to produce the dynamic variable on each side must be synchronized with a given accuracy. As a result, the apparatus requires time-dependent synchronization and shared secret keys.
- This apparatus comprises an authorization computer and a credit card that work in conjunction with each other to enhance the security of credit card transactions. More specifically, the system includes a smart credit card that has a microprocessor, associated memories and a liquid crystal display. The credit card is used to produce a unique verification number by processing a transaction sequence number with an encryption algorithm. The verification number is then displayed in the display device, and can be transmitted to the authorization computer along with a customer identifying account number. The computer, which is used for authorizing the credit card transactions for the customers of the credit card issuer, uses the account number to access an account file for the credit cardholder.
- the account file contains a de-encryption algorithm, which is complementary to the encryption algorithm of the credit card, such that the computer can use the de-encryption algorithm together with the verification number to produce a computed transaction sequence number.
- Both transaction sequence numbers, the one in the card and the one in the computer, are changed by increment after the authorized transaction so that a different verification number is generated and used in the authorization in each subsequent credit card transaction. Synchronization between the card and the computer is required.
- a portable information and transaction processing system and method utilizing biometric authorization and digital certificate security uses a portable client PDA with touch screen, microphone, and CPU for processing voice commands, and processing biometric data to verify a user.
- the system requires the use of a PDA in which the user stores his financial and personal information.
- a digital certificate is downloaded from a central server of a service provider. The digital certificate accomplishes the goal of identification verification by checking whether the digital certificate is expired before providing any credit card information.
- This system is intended for managing financial data.
- the foregoing system requires use of shared secret keys between the user and the verifier. It also requires time-dependent synchronization for user verification purposes.
- Another prior art system discloses a token issuing system, a mobile communication means, a token verification system and tokens.
- a user of the mobile communication means can use this system by ordering a certain token from the token issuing system, which produces a token and transmits the token to the mobile communication means.
- the user of the mobile communication means can then later use the token by effecting the transfer of the token to the token verification system, which receives and processes the token, and allows the user to obtain the benefit, right, or product associated with the token.
- the user of the mobile communication means types the token on a keypad of the verifying system.
- the verifying system can include a scanning or image capture device for reading information on a display of the mobile communication means.
- the verifying system can comprise a digital camera for obtaining images.
- the mobile communication means displays the token as a bar code on a display of the mobile communication means.
- the verifying system uses a shared key to decrypt the encoded string received from the mobile communication means.
- the token which can be a credit-card sized clip or carried as part of a key chain, works in conjunction with hardware or software running on a supplier's server system to generate a new, unpredictable code every 60 seconds that is known to the supplier server. For instance, each user may receive a personal token having a hidden 6-digit numerical string. The user further selects a 4-digit personal identification number (PIN) that is appended to the hidden numerical string in the token. The user's password is therefore the combination of the 4-digit PIN plus the hidden 6-digit numerical string. The 6-digit numerical string in the token automatically changes every 60 seconds.
- a security server compares the user-entered password with its knowledge of what password should have been entered for that 60-second period. The foregoing system requires time-dependent synchronization. Further, the passwords change every 60 seconds.
- the system includes a server configured to: allow a user to conduct a transaction using a computer, and present an image to the user in connection with the transaction, the image having information embedded therein, and a portable device configured to: allow the user to capture the image, store predetermined information, capture input information from the user, the input information to be used to ensure that the user is authorized to use the portable device, and generate an output based on the information embedded in the image and the predetermined information.
- the server is further configured to receive the output from the portable device and evaluate the output to determine if the user has authorized the transaction.
- a method of providing authorization includes configuring a server to: allow a user to conduct a transaction using a computer, present an image to the user in connection with the transaction, the image having information embedded therein, configuring a portable device to: allow the user to capture the image, store predetermined information, capture input information from the user, the input information to be used to ensure that the user is authorized to use the portable device, and generate an output based on the information embedded in the image and the predetermined information, and configuring the server to receive the output from the portable device and evaluate the output to determine if the user has authorized the transaction.
- a method of providing authorization includes presenting an image to a user in connection with a transaction, the image having information embedded therein, configuring a portable device to: allow the user to capture the image, store predetermined information, capture input information from the user, the input information to be used to ensure that the user is authorized to use the portable device, and generate an output based on the information embedded in the image and the predetermined information, receiving the output generated by the portable device, and evaluating the output to determine if the user has authorized the transaction.
- FIG. 1 is a simplified schematic diagram illustrating a secure device according to one embodiment of the present invention
- FIG. 2 is a flow diagram illustrating general operations of the secure device according to one embodiment of the present invention.
- FIG. 3 is a simplified schematic diagram illustrating one authentication application of the secure device according to one embodiment of the present invention.
- FIG. 4 is a simplified schematic diagram illustrating another authentication application of the secure device according to one embodiment of the present invention.
- FIG. 5 is a simplified schematic diagram illustrating one authorization application of the secure device according to one embodiment of the present invention.
- FIG. 6 is a simplified schematic diagram illustrating another authorization application of the secure device according to one embodiment of the present invention.
- FIG. 7 is a simplified schematic diagram illustrating one digital signature application of the secure device according to one embodiment of the present invention.
- FIG. 8 is a flow diagram illustrating general operations of a document distribution application using the secure device according to one embodiment of the present invention.
- FIG. 9 is a simplified schematic diagram illustrating one online e-commerce application of the secure device according to one embodiment of the present invention.
- FIG. 10 is a simplified schematic diagram illustrating one check-out application of the secure device according to one embodiment of the present invention.
- FIG. 11 is a simplified schematic diagram illustrating another check-out application of the secure device according to one embodiment of the present invention.
- FIG. 12 is a simplified schematic diagram illustrating one phishing-prevention application of the secure device according to one embodiment of the present invention.
- the present invention may be used for a number of different purposes including, for example, authentication, authorization, secure document distribution and guarding against phishing attacks, as will be further described below.
- the present invention may be used in both the offline and online environments and provide on-demand input capability.
- FIG. 1 illustrates one secure device 100 according to one embodiment of the present invention.
- the secure device 100 may include a processor 110 , an image capture device or circuit 120 , an input unit 130 , an output unit 140 and a memory 150 .
- the secure device 100 may be incorporated as part of a token, card, badge, key fob, personal digital assistant (PDA), and cellphone, etc.
- PDA personal digital assistant
- the processor 110 may include control logic configured to control operations of the secure device 100 including, for example, managing decryption and encryption functions.
- the processor 110 may be implemented in the form of a smartcard.
- the smartcard may include a ciphering unit and a secure memory for storing, public keys, private keys and/or shared keys.
- the image capture circuit 120 may include a digital camera or other types of image capturing devices.
- the image capture circuit 120 is used to capture image and/or video information.
- the captured image and/or video information may include a barcode including an one-dimensional barcode, such as a linear barcode, or a multi-dimensional barcode, such as a 2D barcode, multiple barcodes in a single image or multiple barcodes in multiple images where multiple images form a stream of images or a video.
- a barcode including an one-dimensional barcode, such as a linear barcode, or a multi-dimensional barcode, such as a 2D barcode, multiple barcodes in a single image or multiple barcodes in multiple images where multiple images form a stream of images or a video.
- the captured image and/or video information is used and processed for a number of different purposes.
- the input device 130 may include a keypad, a touch sensitive screen, a biometric input unit or other types of devices that are capable of allowing a user to provide input information.
- the biometric input unit may include at least one of a fingerprint recognition module and a facial recognition module.
- the input information may be used for identification purposes to allow the secure device 100 to be activated by the user, as well as other purposes.
- the output unit 140 may include a LCD (Liquid Crystal Display).
- the display 140 is used to display information to a user of the secure device 100 .
- the memory 150 may include any type of storage devices that can be used to store information.
- the secure device 100 generally operates in the following manner, as shown in FIG. 2 .
- the secure device 100 via the image capture circuit 120 captures information on a still or moving image or a stream of images.
- the stream of images may constitute a video.
- the image or video may include, for example, a linear or 2D barcode. Multiple barcodes may be embedded in the same image, or alternatively, multiple barcodes may be transmitted in multiple frames or images.
- the image or stream of images contain embedded information that is relevant to the transaction to be conducted.
- the information embedded in the image or stream of images may be created using any one of a number of well-known decryption/encryption algorithms, such as, a symmetric system using shared keys an asymmetric system using public/private key pairs.
- the information embedded in an image may be encrypted using a public key or signed by a private key.
- a person of ordinary skill in the art will know how to select the appropriate decryption/encryption algorithm for use according to the present invention.
- the secure device 100 also prompts a user to provide identification information via the input unit 130 .
- the identification information may include a personal identification number (PIN), a password, and/or biometric information.
- PIN personal identification number
- the identification information is used to identify the user to ensure that the user is authorized to use the secure device 100 .
- the secure device 100 via the processor 110 decodes the captured image or video and extracts the relevant embedded information.
- the processor 110 has knowledge of the encryption algorithm that is used to create the image and thus is able to use the corresponding decryption algorithm to decode the captured image.
- the decryption algorithm may use one or more input parameters for decoding. For example, if the image is created using a public key, the corresponding private key (as well as other information, such as, predetermined information stored in the memory 150 and the input information provided by the user) may be used to decrypt or decode the captured image.
- the predetermined information may include, for example, address information, personal profile information and payment account information.
- the secure device 100 also checks the identification information provided by the user to verify or authenticate the user's identity. The identification information provided by the user is checked against information previously supplied by the user during registration.
- the secure device 100 upon successful verification of the user's identity and decoding of the captured image, the secure device 100 generates the appropriate instructions or information for the user.
- the instructions or information may then be provided via the output unit 140 for further action by the user.
- the user may act on the instructions or information in a number of ways.
- the instructions or information may be transmitted in the form of a radio or sonic signal.
- the transmitted signal may then be received by another party, such as, a merchant, seller, vendor or third-party service provider, for use in connection with various purposes, as will be further described below.
- the secure device 100 can be deployed in a number of applications. In one illustrative application, the secure device 100 is used to effect authentication, as shown in FIG. 3 . Authentication is needed for any system where the identity of a user has to be ascertained.
- a user visits a website and is presented with a log-on screen 300 .
- the user is required to enter certain correct information (such as, company ID 310 , user ID 320 and password 330 ) before further access to the website is granted.
- the log-on screen 300 further displays an image or video 340 .
- the image or video 340 such as a linear barcode, or multiple barcodes in moving images contain certain embedded information that will be used to derive the corresponding authentication code 350 .
- the correct authentication code 350 has to be entered in order to allow the user to continue to access the website.
- the user activates the secure device 100 and uses the secure device 100 to scan the image or video 340 .
- the user may need to enter a password or other types of identification information into the secure device 100 to ensure that the user is authorized to use the secure device 100 .
- the secure device 100 then derives the authentication code 350 and other relevant information 360 based on the embedded information stored in the scanned image or video 340 and, optionally, other types of information including, for example, predetermined information stored in the secure device 100 and identification information provided by the user.
- the derivation process may be performed using an encryption, a decryption or a message authentication algorithm.
- the derivation process may correspond to the encryption or decryption algorithm used to create the information embedded in the image or video 340 .
- the authentication code 350 and other relevant information 360 are displayed on secure device 100 for viewing by the user. The user may then key in the authentication code 350 as well as other required information (such as, company ID 310 , user ID 320 and password 330 ) to obtain further access to the website. Since the website initially provides the image or video 340 , the website also has knowledge regarding the correct authentication code 350 corresponding to the information embedded in the image or video 340 .
- the foregoing method may also be used to identify users or authenticate users to computer terminals, servers, and devices, etc.
- a corresponding reception device at a station (such as, a computer, terminal or server) receiving the transmitted signal may deem the user identified if the signal corresponds to an expected value at the station for a specific user and secure device 100 previously registered for that station.
- the secure device 100 may also be used to identify or authenticate persons for physical access to structures and/or vehicles through entry points, such as, doors and gates. If the output of the secure device 100 is transmitted in the form of a radio or sonic signal, a station (e.g., a merchant, seller, vendor, third part service provider, guard) receiving the transmitted signal may deem the user identified if the signal corresponds to an expected value at the station for a specific user and secure device 100 . If, on the other hand, the output is in the form of a visual display displayed on the secure device 100 , the user can enter the displayed information on a keypad attached to the station. The user can also read the information to a machine or a person over the telephone at the station. The user can also write down the displayed information on paper for immediate or later processing. The display may display an image that can be captured with a camera at the station, thereby eliminating the need for user to enter, read or write down the information.
- a station e.g., a merchant, seller, vendor, third part service
- the output from the secure device 100 received at a station may be compared to all the registered users and devices to identify the user and the secure device 100 that would generate the expected output.
- the output can be rendered deterministically or probabilistically unique for each user and device combination.
- the image or video captured by the secure device 100 may also include additional information, such as, information relating to a website, server, terminal, device, structure or vehicle which the user is gaining access to.
- the image or video captured by the secure device 100 may further include a description of the action, such as, login to a server or terminal or access to a structure.
- the image or video captured by the secure device 100 may include a unique number, nonce, a transaction number or a random number, a number that the secure device 100 will use to derive the authentication code.
- the image or video captured by the device may include a digital signature generated by a trusted party.
- the authentication process can also be accomplished in two steps to improve the security.
- the user may provide his or her information such as company ID, user ID, and a password in the first step of the authentication.
- the terminal, server, or website receiving the information may generate an image in the second step of the authentication process.
- the image generated in the second step of the authentication process may contain information specific for the user.
- Such information may include the identity of the user as established by the first step and a piece of information that can be used to prevent replay attacks.
- the piece of information that can be used to prevent replay attacks include, for example, time of the last login, a sequence number assigned at the last authentication process, or a sequence number greater than a number embedded in the image at the last authentication process.
- such information may be digitally signed to prevent other parties from generating such information.
- the secure device 100 can be used to capture such information and the secure device 100 may verify the validity of such information by verifying the signature and the piece of information added to prevent replay attacks. For example, the secure device 100 may verify that the sequence number used by the site is larger than the last sequence number that the secure device 100 has captured.
- the speed of the authentication process can be increased by establishing a secret key shared by the secure device 100 and the website, server or terminal requiring authentication.
- shared secret key can be selected by the website, server or terminal requiring authentication and sent to the secure device 100 through the images that embed such information.
- the shared secret key may be encrypted by the public key of the secure device 100 and signed by the private key of the website, server or terminal requiring authentication.
- the secure device 100 upon receiving the information related to the shared secret key, may confirm the validity by verifying the digital signature associated with the information. Upon verification, the secure device 100 may store the shared secret key in a secure fashion. Any interaction with the website, server or terminal requiring authentication can use the shared secret key to create shorter signatures. Furthermore, such signatures can be created and verified faster than the digital signatures created using asymmetric encryption algorithms.
- the secure device 100 can be used to effect authentication in an alternative manner, as shown in FIG. 4 .
- the user uses the secure device 100 to derive the authentication code 410 and other relevant information 420 from the scanned image or video 400 .
- the secure device 100 then further prompts the user to enter his/her personal identification number (PIN) 430 and/or other identification information.
- PIN personal identification number
- the PIN 430 and/or identification information may then be forwarded by the secure device 100 in the form of a message to the website server 440 via, for example, a wide area network (such as, a cellular or wireless network), SMS (Short Message Service), EMS (Extended Message Service), or other types of message delivery services or protocols.
- a wide area network such as, a cellular or wireless network
- SMS Short Message Service
- EMS Extended Message Service
- the message may include identity of the user and secure device 100 , a unique value generated by the secure device 100 , and a unique number, nonce, a transaction number or a random number embedded in the image.
- the message might be digitally signed and encrypted to protect and prove the identity of the user and the secure device 100 and also to prevent eavesdropping. If a shared secret key has been established previously, the shared secret key can also be used to increase the speed of the encryption and signature generation and shorten the message length.
- the server 440 by using the unique number, the nonce, the transaction number or the random number transmitted with the message, may identify the session that the user is using to authenticate his or her identity and may then deem the session as authenticated, thereby allowing the user to conduct any desired transactions on the website.
- the secure device 100 may be implemented as part of a cell phone or a personal digital assistant.
- the secure device 100 can be used to effect authorization, as shown in FIG. 5 .
- the user may be authenticated for permission to enter a website, terminal, server or device using the secure device 100 as described above or through other mechanisms. It is also possible that no prior authentication took place.
- the user may perform a desired transaction, such as, transferring money between accounts. Such desired transaction may need to be further authorized to provide additional security.
- the user may complete a form 500 to effect transfer of money between accounts.
- the website, terminal, server or device Upon hitting the “transfer” button 510 , the website, terminal, server or device displays an image or stream of images 520 and a blank designated entry 530 for a confirmation signature.
- the image or stream of images 520 include embedded information relating to the transfer transaction and possibly a unique transaction number.
- the embedded information might be encrypted and digitally signed for authentication purposes to prevent eavesdropping.
- the correct confirmation signature has to be provided in order to effect the transfer.
- the correct confirmation signature can be derived from the information embedded in the image or stream of images 520 using the secure device 100 . More specifically, the user may use the secure device 100 to scan the image or stream of images 520 . The secure device 100 may then decode the scanned image or stream of images 520 and derive the embedded information. The derived information relating to the transfer transaction may then be shown on a display 540 by the secure device 100 for viewing by the user. The user may then verify the information. The user may optionally be asked to enter his or her personal identification number for authentication.
- the secure device 100 may generate the corresponding confirmation signature 550 .
- the confirmation signature may be a digital signature generated based on embedded information contained in the image or stream of images 520 and, optionally, other types of information, such as, an identification code that uniquely identifies the user and the secure device 100 . If a shared secret key has been established beforehand, the generated confirmation signature may also be an authorization code derived from the identity of the user and secure device 100 , the transaction information and the shared secret key. The user may then input the generated confirmation signature or authorization code into the designated entry 530 . The website, terminal, server or device may then check the generated confirmation signature or authorization code relative to the information embedded in the image or stream of images 520 . If the generated confirmation signature is correct for a specific user and/or secure device 100 , the transfer transaction will be completed. Furthermore, the generated confirmation signature may be used as undisputed proof that the user has authorized the transfer transaction, thereby preventing the user from denying having performed the transaction.
- the secure device 100 can be used to effect authorization in an alternative manner, as shown in FIG. 6 .
- the authorization process is similar to that described in connection with FIG. 5 above.
- the secure device 100 may transmit the generated confirmation signature or authorization code to a transaction server 600 handling the transaction.
- the generated confirmation signature or authorization code may be transmitted in the form of a message in a number of ways including, for example, a wide area network (such as, a cellular or wireless network), email, SMS and EMS.
- the message may also include the unique transaction number embedded in the image or stream of images.
- the transaction server 600 may then use the transaction number to identify the session and check the generated confirmation signature or authorization code relative to the information embedded in the image or stream of images and, if appropriate, effect the transaction and display the confirmation information 610 to the user.
- Authorization involving multiple parties can also be achieved.
- the authorization can be achieved by embedding values derived from the transaction with secret information shared by the user of the secure device 100 and the other parties.
- the secrets shared by the user of the secure device 100 and the other parties can be credit card numbers, the expiration date of the card, the registered address of the user, and a password established by the user.
- the other parties can be merchants, banks, credit card issuers, and service providers that may need to be involved with the transaction.
- a party receiving a user response can forward the response to any of the other parties for verification purposes.
- Such authorization may be used in connection with an online e-commerce transaction, as will be further described below.
- the secure device 100 can be used to provide offline digital signature to effect authorization, as shown in FIG. 7 .
- a sender seeking authorization for a transaction forwards a printed form 700 to a user.
- the printed form 700 includes certain transaction information as well as an image 710 , such as a barcode, or a set of images, such as a set of barcodes.
- the image 710 includes embedded information relating to the transaction.
- the user using the secure device 100 scans the image 710 .
- the secure device 100 may then prompt the user to enter his/her personal identification number (PIN) 720 for authentication purposes. Once the correct PIN 720 is entered, the secure device 100 decodes the scanned image 710 and derives the embedded transaction information.
- PIN personal identification number
- the transaction information is then shown via a display 730 on the secure device 100 to the user.
- the user may then provide approval of the transaction by entering the corresponding command into the secure device 100 .
- the secure device 100 may then generate the corresponding confirmation signature or authorization code 740 based on the information embedded in the image 710 and optionally the PIN 720 of the user and display the generated confirmation signature or authorization code 740 to the user.
- the user may then provide the generated confirmation signature or authorization code 740 to the sender to confirm authorization via, for example, a telephone, a wide area network (such as, a cellular or wireless network), an email, SMS message, EMS message or facsimile 750 .
- the sender Since the sender initially provides the image 710 , the sender also has knowledge with respect to the corresponding confirmation signature or authorization code. As a result, by receiving the generated confirmation signature or authorization code 740 from the user, the sender may verify whether the user is authorized to provide approval for the transaction.
- the secure device 100 can be used to provide secure document distribution.
- FIG. 8 illustrates the logic flow with respect to using the secure device 100 to provide secure document distribution.
- a document is created and secured using a password.
- the password can be viewed as the correct answer to a challenge.
- the challenge is presented to someone who attempts to access the secured document.
- a message such as an email, instant message (IM), SMS or EMS message, is created for a recipient with the secured document being included as an attachment.
- an image or a stream of images is created.
- the image or stream of images includes embedded information relating to the password used to secure the document.
- the information embedded in the image or stream of images can be created using public keys that are stored locally or centrally managed.
- creation of the image or stream of images may be automated.
- a plug-in can be added to allow the image or stream of images containing the password to be inserted automatically into a message, such as an email; alternatively, the image or stream of images may also be created for S/MIME compatibility on an automated basis by generating a one-time certificate and attaching the certificate to the image or stream of images or encrypting the certificate with a randomly generated password, storing the certificate at a server and providing the password and the location of the certificate to the user through the image or stream of images.
- the image or stream of images is also included as part of the message.
- the message including the secured document and the image or stream of images is delivered to the recipient.
- the recipient may use the secure device 100 to scan the image or stream of images.
- the secure device 100 may then derive the embedded information from the images or stream of images including information relating to the password. Such information is then displayed to the user.
- the user uses such information to access the secured document. For example, a challenge may be presented to the user when the user attempts to access the secured document. Upon providing the password, the challenge is satisfied and the secured document can be accessed by the user.
- the secure device 100 provides a number of benefits with respect to secure document distribution.
- the secure device 100 enables secure document distribution without incurring any additional software resources on the recipient.
- the recipient does not have to manage any digital certificates, nor does the recipient have to install any drivers for hardware tokens.
- the recipient may use distrusted terminals to retrieve secured documents.
- the secure device 100 can be used to effect digital rights management.
- the document may contain an access control list to limit the users to certain operations. For example, only certain users might be allowed to open, modify, change, copy and/or print the information embedded in a document or media, such as, music or video.
- the digital certificates of the users might be embedded in the document or media directly.
- the program might generate a challenge for a specific user dynamically.
- the challenge might be embedded in an image or stream of images which, for example, contain barcodes.
- the user scans the image or stream of images using the secure device 100 .
- the user might be optionally asked to provide a password to either the secure device 100 or the program.
- the secure device 100 might use the private key of the certificate associated with the user or secure device 100 to generate an authentication code in response to the challenge. The user may then provide the authentication code by entering it manually on a terminal.
- the secure device 100 might also generate radio or sonic signals that might be captured by the terminal.
- the secure device 100 might also send a message, such as email, SMS or EMS message, to a server to provide the authentication code.
- the program upon receiving the authentication code confirms the identity of the user by comparing the response received. If the identity of the user is confirmed and the operation that the user is trying to accomplish is allowed, the program performs the operation.
- the secure device 100 can be used to conduct transactions using images displayed on printed materials, such as books, signs, and catalogs, or transmitted to computers or television screens, as shown in FIG. 9 .
- An image 900 or stream of images can be displayed on a catalog, book or sign.
- the image 900 or stream of images may also be shown on a television or computer screen.
- the image 900 or stream of images may include embedded information relating to a particular product or service (such as, product or service description and transaction identification), information related to a merchant providing the product or service, a public key assigned to the merchant, a digital signature of the public key, a digital signature for the transaction, the Internet address of the merchant, etc.
- a user may scan the image 900 or stream of images.
- the secure device 100 may then derive the relevant information relating to the product or service and display such information to the user as shown in block 910 .
- the secure device 100 may further allow the user to conduct a transaction as shown in blocks 920 - 960 .
- the user may use the secure device 100 to enter selection and purchase information.
- the secure device 100 may then display the summarized transaction information to the user, as shown in block 930 . If the user agrees with the summarized transaction information, the user may then authorize the transaction.
- the secure device 100 may require the user to provide a PIN to ensure that the user is authorized to order the transaction. Upon verifying the PIN provided by the user, the secure device 100 may then proceed with the transaction, for example, by allowing the user to select a shipping address and displaying the fatal transaction information to the user, as shown in block 950 - 960 . In addition, the secure device 100 may also allow the user to designate how the transaction is to be paid for, as shown in blocks 970 - 980 . The secure device 100 may then forward the relevant transactional information to a server associated with the merchant for further processing, as shown in block 990 .
- Such information may be forwarded to the merchant using a number of different methods including, for example, a wide area network (such as, a cellular or wireless network), SMS, EMS or other types of message delivery services.
- the information may be encrypted.
- the secure device 100 may also forward a digital signature or authorization code associated with the transaction and generated by the secure device 100 to the server. The digital signature or authorization code may be used to prove that the transaction was legitimately ordered by the secure device 100 .
- confirmation information can be sent by the merchant to the secure device 100 for viewing by the user, as shown in block 992 .
- the transaction can be handled via a third party service provider.
- the image or stream of images can be generated by the third party service provider.
- the public key and the server address of the third party service provider can be embedded in the secure device 100 .
- the server of the third party service provider can conduct the transaction on behalf of the user of the secure device 100 .
- the secure device 100 upon deciphering the image or stream of images can send a confirmation to the third party service provider through, for example, a wide area network (such as, a cellular or wireless network).
- the third party service provider can then cooperate with the server associated with the merchant to complete the transaction including, for example, transferring the information required to complete the transaction, such as payment and shipping information, to the server associated with the merchant.
- the third party service provider may also bill the user of the secure device 100 directly for the transaction amount.
- the secure device 100 and the third party service provider or merchant can utilize a shared secret key and identification information assigned to the secure device 100 or to the user of the secure device 100 .
- the shared secret key and the identification information are previously provided to the secure device 100 and the service provider.
- the secure device 100 can capture the image or stream of images and decode its embedded information.
- the secure device 100 can then combine the decoded information and the identification information and encode the combination using the shared secret key.
- the encoded value including a portion of the identification information, can be displayed on the secure device 100 .
- the user may then provide the encoded value to the terminal, device, or website or may call the merchant or third party service provider to provide the encoded information.
- the third party service provider upon receiving the encoded value, can send the information to the merchant for identification and verification purposes.
- the merchant upon receiving the encoded value, can derive the identity of the user and verify that the secure device 100 has been in legitimate possession of the user.
- the secure device 100 can be used in a checkout process, as shown in FIG. 10 .
- a register upon checkout, a register generates an image or a stream of images for a transaction.
- the image or stream of images includes embedded information relating to the transaction.
- the image or stream of images is presented to the user.
- the user uses the secure device 100 to scan the image or stream of images.
- the secure device 100 then derives the relevant information relating to the transaction from the barcode and displays such information to the user, as shown in block 1010 .
- the user may then authorize the transaction.
- the secure device 100 may further require the user to provide a PIN, as shown in block 1020 , to ensure that the user is indeed authorized to approve the transaction.
- the secure device 100 If the correct PIN is provided, the secure device 100 generates its own image or stream of images, as shown in block 1030 .
- the image or stream of images generated by the secure device 100 may include relevant transaction and payment information including, for example, credit card or other payment account information.
- the image or stream of images is then provided to the register, as shown in block 1040 .
- the register may include a scanning device capable of scanning the image or stream of images displayed on the secure device 100 .
- the register may then derive the relevant information and use such information to contact a payment server to obtain payment for the transaction, as shown in block 1050 .
- the payment server may then provide the appropriate response to the register accordingly, as shown in block 1060 .
- the secure device 100 can be used in a checkout process in an alternative manner, as shown in FIG. 11 .
- a register upon checkout, a register generates an image or a stream of images for a transaction.
- the image or stream of images includes embedded information relating to the transaction.
- the image or stream of images is presented to the user.
- the user uses the secure device 100 to scan the image or stream of images.
- the secure device 100 then derives the relevant information relating to the transaction from the image or stream of images and displays such information to the user, as shown in block 1110 .
- the user may then further provide any additional information, such as, the transaction amount, and authorize the transaction, as shown in block 1120 .
- the secure device 100 may further require the user to provide a PIN, as shown in block 1130 , to ensure that the user is indeed authorized to order the transaction. If the correct PIN is provided, the secure device 100 may then contact a payment server to complete payment for the transaction, as shown in block 1140 . Upon successfully completing payment for the transaction, the payment server may then forward the appropriate confirmation information to the secure device 100 , as shown in block 1150 .
- the confirmation information may be forwarded to the secure device 100 in a number of ways including, for example, a wide area network (such as, a cellular or wireless network), SMS, EMS and other types of message delivery services.
- the secure device 100 may then generate its own image or stream of images, as shown in block 1160 .
- the image or stream of images generated by the secure device 100 may include relevant information relating to the transaction including, for example, the confirmation information.
- the image or stream of images may then be presented to the register for scanning.
- the register may then derive the relevant information and confirm that the transaction has been paid for and proceed to conclude the transaction, as shown in block 1170 .
- the secure device 100 can be used to defend against real-time phishing attacks, as shown in FIG. 12 .
- Phishing attacks involve fraudulently capturing information from a user, for example, via a fake website, and then using such information to conduct unauthorized transactions.
- a user 1200 unknowingly provides information to a fake website 1210 , thinking that s/he is dealing with the legitimate website 1220 .
- the fake website 1210 upon capturing the information, then uses such information to contact the legitimate website 1220 and attempts to conduct an unauthorized transaction.
- the legitimate website 1220 generates an image or a stream of images that requires confirmation by the secure device 100 .
- the image or stream of images may include confirmation information relating to the transaction. If the image or stream of images is forwarded to the secure device 100 , as shown in 1260 , the secure device 100 may then derive the confirmation information and display such information to the user, thereby allowing the user to detect that an unauthorized transaction has been attempted. The user may then terminate any connection to the fake website 1210 .
- the legitimate website 1220 may include warning information in the image or stream of images, such as, information alerting the user to disconnect from the website 1210 and re-connect to the legitimate website 1220 directly. To guarantee only the legitimate user visits the legitimate website 1220 , the information embedded in the image or stream of images may include a unique but randomly generated number.
- Such a number may be combined with the URL of the website to form a unique URL for a specific user for a specific period of time.
- the secure device 100 may then display such information to the user, thereby alerting the user to potential fraud and unauthorized transactions and also providing the user the unique URL that the user has to enter in a browser.
- the legitimate website 1220 may also detect a legitimate user by using a cookie stored at the computer associated with the user.
- a cookie is a message stored in a text file and given to a Web browser by a Web server. The message is then sent back to the server each time the browser requests a page from the server.
- the main purpose of cookies is to identify users and possibly prepare customized Web pages for such users.
- a website can detect that a user has never used a particular computer to visit that website by requesting cookies stored in a browser associated with that computer.
- the cookie stored by the browser can uniquely identify a user. In the absence of the cookie, the website may request the user to visit the unique URL as described above.
- the present invention can also be deployed in various other types of applications including, for example, digital signatures, encryption, secure ATM cards and secure credit cards, etc. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art should know how to deploy the present invention in many other types of applications.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- a general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
- a processor may also be implemented as a combination of computing components, e.g., a combination of a DSP and a microprocessor, a number of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
- a software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
- a storage medium may be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
A system for providing authorization is disclosed. The system includes a server configured to: allow a user to conduct a transaction using a computer, and present an image to the user in connection with the transaction, the image having information embedded therein, and a portable device configured to: allow the user to capture the image, store predetermined information, capture input information from the user, the input information to be used to ensure that the user is authorized to use the portable device, and generate an output based on the information embedded in the image and the predetermined information. The server is further configured to receive the output from the portable device and evaluate the output to determine if the user has authorized the transaction.
Description
- This application is a continuation of U.S. patent application Ser. No. 11/084,333 by Han Kiliccote, which was filed on Mar. 18, 2005, entitled “Secure Identification, Verification and Authorization Using a Secure Portable Device,” and which claimed the benefit of priority from U.S. Provisional Patent Application Nos. 60/626,146 which was filed on Nov. 8, 2004, and 60/632,756 which was filed on Dec. 3, 2004, which applications are hereby fully incorporated herein by reference for all purposes.
- The present invention relates generally to secure transactions, and more specifically, to methods and devices for providing secure identification, verification and authorization using a portable secure device.
- There are many applications where authentication can be useful including, for example, e-commerce transactions, secure system access, etc. Authentication technologies are generally implemented to verify the identify of a user prior to allowing the user to have ability to perform certain tasks, such as, accessing confidential information or conducting authorized transactions. Many authentication systems are known in the art and the methodologies associated with these systems cover a wide range of techniques.
- The use of credit and debit cards to conduct payment transactions is very popular. Credit and debit cards can be used for paying telephone charges and purchase transactions. With the burgeoning growth of online or e-commerce, the use of credit and debit cards to pay for online transactions is also increasing. Such increase use of credit and debit cards also results in increase in identity theft crimes including credit card fraud. In response, card issuers are employing various different measures in order to minimize and/or prevent such crimes. For example, in order to provide sufficient authentication, a user may be required to provide additional information during the card approval process, such as, certain numbers printed on the back of the card, the postal zip code for the billing address associated with the card, or a persona identification number (PIN) linked to the card. Because such information is static, it may be of nominal effectiveness. In one existing system, an apparatus is provided for identifying an individual. The apparatus employs a static value and a dynamic variable to generate passwords. For every transaction to be completed, a fixed code is entered into the card by the user at the start of the access request procedure. This fixed code constitutes the static value. The dynamic variable is produced which varies dynamically as a function of time. The static value and the dynamic variable are next used as input parameters of a secret encryption algorithm implemented in order to produce a password in the card. This password is displayed on the card and the user is invited to transfer it to a server. The fixed code is also transferred to the server. The server then calculates the password by using the same encryption algorithm and the dynamic variable. The password generated by the password is compared with the password transmitted to the server by the user. In the event of matching, authorization for access to the function can be delivered. It will be noted that the dynamic variable is a time-dependent dynamic value. Since this variable is necessarily produced independently, both in the card and in the server, the clocks of these two facilities used to produce the dynamic variable on each side must be synchronized with a given accuracy. As a result, the apparatus requires time-dependent synchronization and shared secret keys.
- Another existing system discloses a method and apparatus for secure credit card transactions. This apparatus comprises an authorization computer and a credit card that work in conjunction with each other to enhance the security of credit card transactions. More specifically, the system includes a smart credit card that has a microprocessor, associated memories and a liquid crystal display. The credit card is used to produce a unique verification number by processing a transaction sequence number with an encryption algorithm. The verification number is then displayed in the display device, and can be transmitted to the authorization computer along with a customer identifying account number. The computer, which is used for authorizing the credit card transactions for the customers of the credit card issuer, uses the account number to access an account file for the credit cardholder. The account file contains a de-encryption algorithm, which is complementary to the encryption algorithm of the credit card, such that the computer can use the de-encryption algorithm together with the verification number to produce a computed transaction sequence number. Both transaction sequence numbers, the one in the card and the one in the computer, are changed by increment after the authorized transaction so that a different verification number is generated and used in the authorization in each subsequent credit card transaction. Synchronization between the card and the computer is required.
- In another existing system, a portable information and transaction processing system and method utilizing biometric authorization and digital certificate security is disclosed. The system uses a portable client PDA with touch screen, microphone, and CPU for processing voice commands, and processing biometric data to verify a user. In fact, the system requires the use of a PDA in which the user stores his financial and personal information. A digital certificate is downloaded from a central server of a service provider. The digital certificate accomplishes the goal of identification verification by checking whether the digital certificate is expired before providing any credit card information. This system is intended for managing financial data. The foregoing system requires use of shared secret keys between the user and the verifier. It also requires time-dependent synchronization for user verification purposes.
- Another prior art system discloses a token issuing system, a mobile communication means, a token verification system and tokens. A user of the mobile communication means can use this system by ordering a certain token from the token issuing system, which produces a token and transmits the token to the mobile communication means. The user of the mobile communication means can then later use the token by effecting the transfer of the token to the token verification system, which receives and processes the token, and allows the user to obtain the benefit, right, or product associated with the token. In one embodiment, the user of the mobile communication means types the token on a keypad of the verifying system. The verifying system can include a scanning or image capture device for reading information on a display of the mobile communication means. The verifying system can comprise a digital camera for obtaining images. In another embodiment, the mobile communication means displays the token as a bar code on a display of the mobile communication means. The verifying system uses a shared key to decrypt the encoded string received from the mobile communication means.
- Another prior art system discloses an authentication and verification method and apparatus employing tokens. The token, which can be a credit-card sized clip or carried as part of a key chain, works in conjunction with hardware or software running on a supplier's server system to generate a new, unpredictable code every 60 seconds that is known to the supplier server. For instance, each user may receive a personal token having a hidden 6-digit numerical string. The user further selects a 4-digit personal identification number (PIN) that is appended to the hidden numerical string in the token. The user's password is therefore the combination of the 4-digit PIN plus the hidden 6-digit numerical string. The 6-digit numerical string in the token automatically changes every 60 seconds. A security server compares the user-entered password with its knowledge of what password should have been entered for that 60-second period. The foregoing system requires time-dependent synchronization. Further, the passwords change every 60 seconds.
- Hence, it would be desirable to provide methods and devices that are capable of providing secure transactions in a more efficient manner.
- A system for providing authorization is disclosed. In one embodiment, the system includes a server configured to: allow a user to conduct a transaction using a computer, and present an image to the user in connection with the transaction, the image having information embedded therein, and a portable device configured to: allow the user to capture the image, store predetermined information, capture input information from the user, the input information to be used to ensure that the user is authorized to use the portable device, and generate an output based on the information embedded in the image and the predetermined information. The server is further configured to receive the output from the portable device and evaluate the output to determine if the user has authorized the transaction.
- In one aspect, a method of providing authorization is disclosed. The method includes configuring a server to: allow a user to conduct a transaction using a computer, present an image to the user in connection with the transaction, the image having information embedded therein, configuring a portable device to: allow the user to capture the image, store predetermined information, capture input information from the user, the input information to be used to ensure that the user is authorized to use the portable device, and generate an output based on the information embedded in the image and the predetermined information, and configuring the server to receive the output from the portable device and evaluate the output to determine if the user has authorized the transaction.
- In another aspect, a method of providing authorization is disclosed. The method includes presenting an image to a user in connection with a transaction, the image having information embedded therein, configuring a portable device to: allow the user to capture the image, store predetermined information, capture input information from the user, the input information to be used to ensure that the user is authorized to use the portable device, and generate an output based on the information embedded in the image and the predetermined information, receiving the output generated by the portable device, and evaluating the output to determine if the user has authorized the transaction.
- It is understood that other embodiments of the present invention will become readily apparent to those skilled in the art from the following detailed description, wherein various embodiments of the invention are shown and described by way of illustration. As will be realized, the invention is capable of other and different embodiments and its several details are capable of modification in various other respects, all without departing from the spirit and scope of the present invention. Accordingly, the drawings and detailed description are to be regarded as illustrative in nature and not as restrictive.
- Aspects of the present invention are illustrated by way of example, and not by way of limitation, in the accompanying drawings, wherein:
-
FIG. 1 is a simplified schematic diagram illustrating a secure device according to one embodiment of the present invention; -
FIG. 2 is a flow diagram illustrating general operations of the secure device according to one embodiment of the present invention; -
FIG. 3 is a simplified schematic diagram illustrating one authentication application of the secure device according to one embodiment of the present invention; -
FIG. 4 is a simplified schematic diagram illustrating another authentication application of the secure device according to one embodiment of the present invention; -
FIG. 5 is a simplified schematic diagram illustrating one authorization application of the secure device according to one embodiment of the present invention; -
FIG. 6 is a simplified schematic diagram illustrating another authorization application of the secure device according to one embodiment of the present invention; -
FIG. 7 is a simplified schematic diagram illustrating one digital signature application of the secure device according to one embodiment of the present invention; -
FIG. 8 is a flow diagram illustrating general operations of a document distribution application using the secure device according to one embodiment of the present invention; -
FIG. 9 is a simplified schematic diagram illustrating one online e-commerce application of the secure device according to one embodiment of the present invention; -
FIG. 10 is a simplified schematic diagram illustrating one check-out application of the secure device according to one embodiment of the present invention; -
FIG. 11 is a simplified schematic diagram illustrating another check-out application of the secure device according to one embodiment of the present invention; and -
FIG. 12 is a simplified schematic diagram illustrating one phishing-prevention application of the secure device according to one embodiment of the present invention; - The detailed description set forth below in connection with the appended drawings is intended as a description of various embodiments of the present invention and is not intended to represent the only embodiments in which the present invention may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of the present invention. However, it will be apparent to those skilled in the art that the present invention may be practiced without these specific details. In some instances, well-known structures and components are shown in block diagram form in order to avoid obscuring the concepts of the present invention.
- The present invention may be used for a number of different purposes including, for example, authentication, authorization, secure document distribution and guarding against phishing attacks, as will be further described below. The present invention may be used in both the offline and online environments and provide on-demand input capability.
- One or more embodiments of the present invention will now be described.
FIG. 1 illustrates onesecure device 100 according to one embodiment of the present invention. Thesecure device 100 may include aprocessor 110, an image capture device orcircuit 120, aninput unit 130, anoutput unit 140 and amemory 150. Thesecure device 100 may be incorporated as part of a token, card, badge, key fob, personal digital assistant (PDA), and cellphone, etc. - The
processor 110 may include control logic configured to control operations of thesecure device 100 including, for example, managing decryption and encryption functions. In some embodiments, theprocessor 110 may be implemented in the form of a smartcard. The smartcard may include a ciphering unit and a secure memory for storing, public keys, private keys and/or shared keys. - The
image capture circuit 120 may include a digital camera or other types of image capturing devices. Theimage capture circuit 120 is used to capture image and/or video information. The captured image and/or video information may include a barcode including an one-dimensional barcode, such as a linear barcode, or a multi-dimensional barcode, such as a 2D barcode, multiple barcodes in a single image or multiple barcodes in multiple images where multiple images form a stream of images or a video. As will be further described below, the captured image and/or video information is used and processed for a number of different purposes. - The
input device 130 may include a keypad, a touch sensitive screen, a biometric input unit or other types of devices that are capable of allowing a user to provide input information. The biometric input unit may include at least one of a fingerprint recognition module and a facial recognition module. As will be further described below, the input information may be used for identification purposes to allow thesecure device 100 to be activated by the user, as well as other purposes. - The
output unit 140 may include a LCD (Liquid Crystal Display). Thedisplay 140 is used to display information to a user of thesecure device 100. - The
memory 150 may include any type of storage devices that can be used to store information. - The
secure device 100 generally operates in the following manner, as shown inFIG. 2 . Atblock 200, thesecure device 100 via theimage capture circuit 120 captures information on a still or moving image or a stream of images. The stream of images may constitute a video. The image or video may include, for example, a linear or 2D barcode. Multiple barcodes may be embedded in the same image, or alternatively, multiple barcodes may be transmitted in multiple frames or images. The image or stream of images contain embedded information that is relevant to the transaction to be conducted. The information embedded in the image or stream of images may be created using any one of a number of well-known decryption/encryption algorithms, such as, a symmetric system using shared keys an asymmetric system using public/private key pairs. For example, the information embedded in an image may be encrypted using a public key or signed by a private key. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know how to select the appropriate decryption/encryption algorithm for use according to the present invention. - At
block 210, thesecure device 100 also prompts a user to provide identification information via theinput unit 130. The identification information may include a personal identification number (PIN), a password, and/or biometric information. The identification information is used to identify the user to ensure that the user is authorized to use thesecure device 100. - At
block 220, thesecure device 100 via theprocessor 110 decodes the captured image or video and extracts the relevant embedded information. Theprocessor 110 has knowledge of the encryption algorithm that is used to create the image and thus is able to use the corresponding decryption algorithm to decode the captured image. The decryption algorithm may use one or more input parameters for decoding. For example, if the image is created using a public key, the corresponding private key (as well as other information, such as, predetermined information stored in thememory 150 and the input information provided by the user) may be used to decrypt or decode the captured image. The predetermined information may include, for example, address information, personal profile information and payment account information. Thesecure device 100 also checks the identification information provided by the user to verify or authenticate the user's identity. The identification information provided by the user is checked against information previously supplied by the user during registration. - At
block 230, upon successful verification of the user's identity and decoding of the captured image, thesecure device 100 generates the appropriate instructions or information for the user. The instructions or information may then be provided via theoutput unit 140 for further action by the user. The user may act on the instructions or information in a number of ways. For example, the instructions or information may be transmitted in the form of a radio or sonic signal. The transmitted signal may then be received by another party, such as, a merchant, seller, vendor or third-party service provider, for use in connection with various purposes, as will be further described below. - The
secure device 100 can be deployed in a number of applications. In one illustrative application, thesecure device 100 is used to effect authentication, as shown inFIG. 3 . Authentication is needed for any system where the identity of a user has to be ascertained. As shown inFIG. 3 , a user visits a website and is presented with a log-onscreen 300. The user is required to enter certain correct information (such as,company ID 310,user ID 320 and password 330) before further access to the website is granted. In addition, the log-onscreen 300 further displays an image orvideo 340. The image orvideo 340, such as a linear barcode, or multiple barcodes in moving images contain certain embedded information that will be used to derive thecorresponding authentication code 350. Thecorrect authentication code 350 has to be entered in order to allow the user to continue to access the website. - The user activates the
secure device 100 and uses thesecure device 100 to scan the image orvideo 340. As part of the activation process, the user may need to enter a password or other types of identification information into thesecure device 100 to ensure that the user is authorized to use thesecure device 100. Thesecure device 100 then derives theauthentication code 350 and otherrelevant information 360 based on the embedded information stored in the scanned image orvideo 340 and, optionally, other types of information including, for example, predetermined information stored in thesecure device 100 and identification information provided by the user. The derivation process may be performed using an encryption, a decryption or a message authentication algorithm. If theimage 340 has been generated using an encryption or decryption algorithm, the derivation process may correspond to the encryption or decryption algorithm used to create the information embedded in the image orvideo 340. Theauthentication code 350 and otherrelevant information 360 are displayed onsecure device 100 for viewing by the user. The user may then key in theauthentication code 350 as well as other required information (such as,company ID 310,user ID 320 and password 330) to obtain further access to the website. Since the website initially provides the image orvideo 340, the website also has knowledge regarding thecorrect authentication code 350 corresponding to the information embedded in the image orvideo 340. The foregoing method may also be used to identify users or authenticate users to computer terminals, servers, and devices, etc. - If the output of the
secure device 100 is transmitted in the form of a radio or sonic signal, a corresponding reception device at a station (such as, a computer, terminal or server) receiving the transmitted signal may deem the user identified if the signal corresponds to an expected value at the station for a specific user andsecure device 100 previously registered for that station. - The
secure device 100 may also be used to identify or authenticate persons for physical access to structures and/or vehicles through entry points, such as, doors and gates. If the output of thesecure device 100 is transmitted in the form of a radio or sonic signal, a station (e.g., a merchant, seller, vendor, third part service provider, guard) receiving the transmitted signal may deem the user identified if the signal corresponds to an expected value at the station for a specific user andsecure device 100. If, on the other hand, the output is in the form of a visual display displayed on thesecure device 100, the user can enter the displayed information on a keypad attached to the station. The user can also read the information to a machine or a person over the telephone at the station. The user can also write down the displayed information on paper for immediate or later processing. The display may display an image that can be captured with a camera at the station, thereby eliminating the need for user to enter, read or write down the information. - In the identification mode, the output from the
secure device 100 received at a station may be compared to all the registered users and devices to identify the user and thesecure device 100 that would generate the expected output. With suitable selection of the encryption protocols, the output can be rendered deterministically or probabilistically unique for each user and device combination. - The image or video captured by the
secure device 100 may also include additional information, such as, information relating to a website, server, terminal, device, structure or vehicle which the user is gaining access to. The image or video captured by thesecure device 100 may further include a description of the action, such as, login to a server or terminal or access to a structure. In addition, the image or video captured by thesecure device 100 may include a unique number, nonce, a transaction number or a random number, a number that thesecure device 100 will use to derive the authentication code. Furthermore, the image or video captured by the device may include a digital signature generated by a trusted party. - The authentication process can also be accomplished in two steps to improve the security. The user may provide his or her information such as company ID, user ID, and a password in the first step of the authentication. The terminal, server, or website receiving the information may generate an image in the second step of the authentication process. The image generated in the second step of the authentication process may contain information specific for the user. Such information may include the identity of the user as established by the first step and a piece of information that can be used to prevent replay attacks. The piece of information that can be used to prevent replay attacks include, for example, time of the last login, a sequence number assigned at the last authentication process, or a sequence number greater than a number embedded in the image at the last authentication process. Furthermore, such information may be digitally signed to prevent other parties from generating such information. The
secure device 100 can be used to capture such information and thesecure device 100 may verify the validity of such information by verifying the signature and the piece of information added to prevent replay attacks. For example, thesecure device 100 may verify that the sequence number used by the site is larger than the last sequence number that thesecure device 100 has captured. - The speed of the authentication process can be increased by establishing a secret key shared by the
secure device 100 and the website, server or terminal requiring authentication. Such shared secret key can be selected by the website, server or terminal requiring authentication and sent to thesecure device 100 through the images that embed such information. The shared secret key may be encrypted by the public key of thesecure device 100 and signed by the private key of the website, server or terminal requiring authentication. Thesecure device 100, upon receiving the information related to the shared secret key, may confirm the validity by verifying the digital signature associated with the information. Upon verification, thesecure device 100 may store the shared secret key in a secure fashion. Any interaction with the website, server or terminal requiring authentication can use the shared secret key to create shorter signatures. Furthermore, such signatures can be created and verified faster than the digital signatures created using asymmetric encryption algorithms. - In another illustrative application, the
secure device 100 can be used to effect authentication in an alternative manner, as shown inFIG. 4 . Similarly, the user uses thesecure device 100 to derive theauthentication code 410 and otherrelevant information 420 from the scanned image orvideo 400. Thesecure device 100 then further prompts the user to enter his/her personal identification number (PIN) 430 and/or other identification information. ThePIN 430 and/or identification information may then be forwarded by thesecure device 100 in the form of a message to the website server 440 via, for example, a wide area network (such as, a cellular or wireless network), SMS (Short Message Service), EMS (Extended Message Service), or other types of message delivery services or protocols. The message may include identity of the user andsecure device 100, a unique value generated by thesecure device 100, and a unique number, nonce, a transaction number or a random number embedded in the image. The message might be digitally signed and encrypted to protect and prove the identity of the user and thesecure device 100 and also to prevent eavesdropping. If a shared secret key has been established previously, the shared secret key can also be used to increase the speed of the encryption and signature generation and shorten the message length. - The server 440, by using the unique number, the nonce, the transaction number or the random number transmitted with the message, may identify the session that the user is using to authenticate his or her identity and may then deem the session as authenticated, thereby allowing the user to conduct any desired transactions on the website. In one embodiment, the
secure device 100 may be implemented as part of a cell phone or a personal digital assistant. - In another illustrative application, the
secure device 100 can be used to effect authorization, as shown inFIG. 5 . Initially, the user may be authenticated for permission to enter a website, terminal, server or device using thesecure device 100 as described above or through other mechanisms. It is also possible that no prior authentication took place. After the user successfully logs in to the website, terminal, server or device, the user may perform a desired transaction, such as, transferring money between accounts. Such desired transaction may need to be further authorized to provide additional security. For example, as shown inFIG. 5 , the user may complete aform 500 to effect transfer of money between accounts. Upon hitting the “transfer”button 510, the website, terminal, server or device displays an image or stream ofimages 520 and a blank designatedentry 530 for a confirmation signature. The image or stream ofimages 520 include embedded information relating to the transfer transaction and possibly a unique transaction number. The embedded information might be encrypted and digitally signed for authentication purposes to prevent eavesdropping. The correct confirmation signature has to be provided in order to effect the transfer. The correct confirmation signature can be derived from the information embedded in the image or stream ofimages 520 using thesecure device 100. More specifically, the user may use thesecure device 100 to scan the image or stream ofimages 520. Thesecure device 100 may then decode the scanned image or stream ofimages 520 and derive the embedded information. The derived information relating to the transfer transaction may then be shown on adisplay 540 by thesecure device 100 for viewing by the user. The user may then verify the information. The user may optionally be asked to enter his or her personal identification number for authentication. - Upon completion of the authentication process, the
secure device 100 may generate thecorresponding confirmation signature 550. The confirmation signature may be a digital signature generated based on embedded information contained in the image or stream ofimages 520 and, optionally, other types of information, such as, an identification code that uniquely identifies the user and thesecure device 100. If a shared secret key has been established beforehand, the generated confirmation signature may also be an authorization code derived from the identity of the user andsecure device 100, the transaction information and the shared secret key. The user may then input the generated confirmation signature or authorization code into the designatedentry 530. The website, terminal, server or device may then check the generated confirmation signature or authorization code relative to the information embedded in the image or stream ofimages 520. If the generated confirmation signature is correct for a specific user and/orsecure device 100, the transfer transaction will be completed. Furthermore, the generated confirmation signature may be used as undisputed proof that the user has authorized the transfer transaction, thereby preventing the user from denying having performed the transaction. - In a similar illustrative application, the
secure device 100 can be used to effect authorization in an alternative manner, as shown inFIG. 6 . The authorization process is similar to that described in connection withFIG. 5 above. Alternatively, upon thesecure device 100 generating the confirmation signature or authorization code, thesecure device 100 may transmit the generated confirmation signature or authorization code to atransaction server 600 handling the transaction. The generated confirmation signature or authorization code may be transmitted in the form of a message in a number of ways including, for example, a wide area network (such as, a cellular or wireless network), email, SMS and EMS. The message may also include the unique transaction number embedded in the image or stream of images. In response, upon receiving the generated confirmation signature or authorization code, thetransaction server 600 may then use the transaction number to identify the session and check the generated confirmation signature or authorization code relative to the information embedded in the image or stream of images and, if appropriate, effect the transaction and display theconfirmation information 610 to the user. - Authorization involving multiple parties, such as credit and debit card transactions, can also be achieved. For example, the authorization can be achieved by embedding values derived from the transaction with secret information shared by the user of the
secure device 100 and the other parties. The secrets shared by the user of thesecure device 100 and the other parties can be credit card numbers, the expiration date of the card, the registered address of the user, and a password established by the user. The other parties can be merchants, banks, credit card issuers, and service providers that may need to be involved with the transaction. A party receiving a user response can forward the response to any of the other parties for verification purposes. Such authorization may be used in connection with an online e-commerce transaction, as will be further described below. - In another illustrative application, the
secure device 100 can be used to provide offline digital signature to effect authorization, as shown inFIG. 7 . A sender seeking authorization for a transaction forwards a printedform 700 to a user. The printedform 700 includes certain transaction information as well as animage 710, such as a barcode, or a set of images, such as a set of barcodes. Theimage 710 includes embedded information relating to the transaction. The user using thesecure device 100 scans theimage 710. Thesecure device 100 may then prompt the user to enter his/her personal identification number (PIN) 720 for authentication purposes. Once thecorrect PIN 720 is entered, thesecure device 100 decodes the scannedimage 710 and derives the embedded transaction information. The transaction information is then shown via adisplay 730 on thesecure device 100 to the user. The user may then provide approval of the transaction by entering the corresponding command into thesecure device 100. Thesecure device 100 may then generate the corresponding confirmation signature orauthorization code 740 based on the information embedded in theimage 710 and optionally thePIN 720 of the user and display the generated confirmation signature orauthorization code 740 to the user. In response, the user may then provide the generated confirmation signature orauthorization code 740 to the sender to confirm authorization via, for example, a telephone, a wide area network (such as, a cellular or wireless network), an email, SMS message, EMS message orfacsimile 750. Since the sender initially provides theimage 710, the sender also has knowledge with respect to the corresponding confirmation signature or authorization code. As a result, by receiving the generated confirmation signature orauthorization code 740 from the user, the sender may verify whether the user is authorized to provide approval for the transaction. - In another illustrative application, the
secure device 100 can be used to provide secure document distribution.FIG. 8 illustrates the logic flow with respect to using thesecure device 100 to provide secure document distribution. Atblock 800, a document is created and secured using a password. The password can be viewed as the correct answer to a challenge. The challenge is presented to someone who attempts to access the secured document. Atblock 810, a message, such as an email, instant message (IM), SMS or EMS message, is created for a recipient with the secured document being included as an attachment. Atblock 820, an image or a stream of images is created. The image or stream of images includes embedded information relating to the password used to secure the document. The information embedded in the image or stream of images can be created using public keys that are stored locally or centrally managed. In one implementation, creation of the image or stream of images may be automated. For example, using the Microsoft Office application, a plug-in can be added to allow the image or stream of images containing the password to be inserted automatically into a message, such as an email; alternatively, the image or stream of images may also be created for S/MIME compatibility on an automated basis by generating a one-time certificate and attaching the certificate to the image or stream of images or encrypting the certificate with a randomly generated password, storing the certificate at a server and providing the password and the location of the certificate to the user through the image or stream of images. - At
block 830, the image or stream of images is also included as part of the message. Atblock 840, the message including the secured document and the image or stream of images is delivered to the recipient. Atblock 850, upon opening the message, the recipient may use thesecure device 100 to scan the image or stream of images. Atblock 860, upon retrieving the images or stream of images, thesecure device 100 may then derive the embedded information from the images or stream of images including information relating to the password. Such information is then displayed to the user. Atblock 870, the user uses such information to access the secured document. For example, a challenge may be presented to the user when the user attempts to access the secured document. Upon providing the password, the challenge is satisfied and the secured document can be accessed by the user. It can be seen that thesecure device 100 provides a number of benefits with respect to secure document distribution. For example, thesecure device 100 enables secure document distribution without incurring any additional software resources on the recipient. Furthermore, the recipient does not have to manage any digital certificates, nor does the recipient have to install any drivers for hardware tokens. Finally, the recipient may use distrusted terminals to retrieve secured documents. - In a similar illustrative application, the
secure device 100 can be used to effect digital rights management. The document may contain an access control list to limit the users to certain operations. For example, only certain users might be allowed to open, modify, change, copy and/or print the information embedded in a document or media, such as, music or video. Furthermore, the digital certificates of the users might be embedded in the document or media directly. When a user tries to open, modify, change, print and/or copy the document or media through a program, the program might generate a challenge for a specific user dynamically. The challenge might be embedded in an image or stream of images which, for example, contain barcodes. In response to the challenge, the user scans the image or stream of images using thesecure device 100. The user might be optionally asked to provide a password to either thesecure device 100 or the program. Thesecure device 100 might use the private key of the certificate associated with the user orsecure device 100 to generate an authentication code in response to the challenge. The user may then provide the authentication code by entering it manually on a terminal. Thesecure device 100 might also generate radio or sonic signals that might be captured by the terminal. Thesecure device 100 might also send a message, such as email, SMS or EMS message, to a server to provide the authentication code. The program upon receiving the authentication code confirms the identity of the user by comparing the response received. If the identity of the user is confirmed and the operation that the user is trying to accomplish is allowed, the program performs the operation. - In a further illustrative application, the
secure device 100 can be used to conduct transactions using images displayed on printed materials, such as books, signs, and catalogs, or transmitted to computers or television screens, as shown inFIG. 9 . Animage 900 or stream of images can be displayed on a catalog, book or sign. Theimage 900 or stream of images may also be shown on a television or computer screen. Theimage 900 or stream of images may include embedded information relating to a particular product or service (such as, product or service description and transaction identification), information related to a merchant providing the product or service, a public key assigned to the merchant, a digital signature of the public key, a digital signature for the transaction, the Internet address of the merchant, etc. Using thesecure device 100, a user may scan theimage 900 or stream of images. Thesecure device 100 may then derive the relevant information relating to the product or service and display such information to the user as shown inblock 910. Thesecure device 100 may further allow the user to conduct a transaction as shown in blocks 920-960. For example, as shown inblock 920, the user may use thesecure device 100 to enter selection and purchase information. Upon receiving the selection and purchase information, thesecure device 100 may then display the summarized transaction information to the user, as shown inblock 930. If the user agrees with the summarized transaction information, the user may then authorize the transaction. As shown inblock 940, thesecure device 100 may require the user to provide a PIN to ensure that the user is authorized to order the transaction. Upon verifying the PIN provided by the user, thesecure device 100 may then proceed with the transaction, for example, by allowing the user to select a shipping address and displaying the fatal transaction information to the user, as shown in block 950-960. In addition, thesecure device 100 may also allow the user to designate how the transaction is to be paid for, as shown in blocks 970-980. Thesecure device 100 may then forward the relevant transactional information to a server associated with the merchant for further processing, as shown inblock 990. Such information may be forwarded to the merchant using a number of different methods including, for example, a wide area network (such as, a cellular or wireless network), SMS, EMS or other types of message delivery services. The information may be encrypted. In addition, thesecure device 100 may also forward a digital signature or authorization code associated with the transaction and generated by thesecure device 100 to the server. The digital signature or authorization code may be used to prove that the transaction was legitimately ordered by thesecure device 100. Upon the server completing the transaction, confirmation information can be sent by the merchant to thesecure device 100 for viewing by the user, as shown inblock 992. - Alternatively, the transaction can be handled via a third party service provider. The image or stream of images can be generated by the third party service provider. In this case, the public key and the server address of the third party service provider can be embedded in the
secure device 100. The server of the third party service provider can conduct the transaction on behalf of the user of thesecure device 100. Thesecure device 100 upon deciphering the image or stream of images can send a confirmation to the third party service provider through, for example, a wide area network (such as, a cellular or wireless network). The third party service provider can then cooperate with the server associated with the merchant to complete the transaction including, for example, transferring the information required to complete the transaction, such as payment and shipping information, to the server associated with the merchant. The third party service provider may also bill the user of thesecure device 100 directly for the transaction amount. - In the situation where there is no communication channel between the
secure device 100 and the third party service provider or the merchant, thesecure device 100 and the third party service provider or merchant can utilize a shared secret key and identification information assigned to thesecure device 100 or to the user of thesecure device 100. The shared secret key and the identification information are previously provided to thesecure device 100 and the service provider. Thesecure device 100 can capture the image or stream of images and decode its embedded information. Thesecure device 100 can then combine the decoded information and the identification information and encode the combination using the shared secret key. The encoded value, including a portion of the identification information, can be displayed on thesecure device 100. The user may then provide the encoded value to the terminal, device, or website or may call the merchant or third party service provider to provide the encoded information. The third party service provider, upon receiving the encoded value, can send the information to the merchant for identification and verification purposes. The merchant, upon receiving the encoded value, can derive the identity of the user and verify that thesecure device 100 has been in legitimate possession of the user. - In another illustrative application, the
secure device 100 can be used in a checkout process, as shown inFIG. 10 . Atblock 1000, upon checkout, a register generates an image or a stream of images for a transaction. The image or stream of images includes embedded information relating to the transaction. The image or stream of images is presented to the user. The user then uses thesecure device 100 to scan the image or stream of images. Thesecure device 100 then derives the relevant information relating to the transaction from the barcode and displays such information to the user, as shown inblock 1010. The user may then authorize the transaction. Thesecure device 100 may further require the user to provide a PIN, as shown inblock 1020, to ensure that the user is indeed authorized to approve the transaction. If the correct PIN is provided, thesecure device 100 generates its own image or stream of images, as shown inblock 1030. The image or stream of images generated by thesecure device 100 may include relevant transaction and payment information including, for example, credit card or other payment account information. The image or stream of images is then provided to the register, as shown inblock 1040. The register may include a scanning device capable of scanning the image or stream of images displayed on thesecure device 100. Upon retrieving the image or stream of images from thesecure device 100, the register may then derive the relevant information and use such information to contact a payment server to obtain payment for the transaction, as shown inblock 1050. Depending on the information received from the register, the payment server may then provide the appropriate response to the register accordingly, as shown inblock 1060. - In a further illustrative application, the
secure device 100 can be used in a checkout process in an alternative manner, as shown inFIG. 11 . Atblock 1100, upon checkout, a register generates an image or a stream of images for a transaction. The image or stream of images includes embedded information relating to the transaction. The image or stream of images is presented to the user. The user then uses thesecure device 100 to scan the image or stream of images. Thesecure device 100 then derives the relevant information relating to the transaction from the image or stream of images and displays such information to the user, as shown inblock 1110. The user may then further provide any additional information, such as, the transaction amount, and authorize the transaction, as shown inblock 1120. Thesecure device 100 may further require the user to provide a PIN, as shown inblock 1130, to ensure that the user is indeed authorized to order the transaction. If the correct PIN is provided, thesecure device 100 may then contact a payment server to complete payment for the transaction, as shown inblock 1140. Upon successfully completing payment for the transaction, the payment server may then forward the appropriate confirmation information to thesecure device 100, as shown inblock 1150. The confirmation information may be forwarded to thesecure device 100 in a number of ways including, for example, a wide area network (such as, a cellular or wireless network), SMS, EMS and other types of message delivery services. Upon receiving the confirmation information, thesecure device 100 may then generate its own image or stream of images, as shown inblock 1160. The image or stream of images generated by thesecure device 100 may include relevant information relating to the transaction including, for example, the confirmation information. The image or stream of images may then be presented to the register for scanning. Upon retrieving the image or stream of images from thesecure device 100, the register may then derive the relevant information and confirm that the transaction has been paid for and proceed to conclude the transaction, as shown inblock 1170. - In yet another illustrative application, the
secure device 100 can be used to defend against real-time phishing attacks, as shown inFIG. 12 . Phishing attacks involve fraudulently capturing information from a user, for example, via a fake website, and then using such information to conduct unauthorized transactions. At 1230, auser 1200 unknowingly provides information to afake website 1210, thinking that s/he is dealing with thelegitimate website 1220. At 1240, thefake website 1210, upon capturing the information, then uses such information to contact thelegitimate website 1220 and attempts to conduct an unauthorized transaction. At 1250, in order to confirm the transaction, thelegitimate website 1220 generates an image or a stream of images that requires confirmation by thesecure device 100. The image or stream of images may include confirmation information relating to the transaction. If the image or stream of images is forwarded to thesecure device 100, as shown in 1260, thesecure device 100 may then derive the confirmation information and display such information to the user, thereby allowing the user to detect that an unauthorized transaction has been attempted. The user may then terminate any connection to thefake website 1210. Alternatively, thelegitimate website 1220 may include warning information in the image or stream of images, such as, information alerting the user to disconnect from thewebsite 1210 and re-connect to thelegitimate website 1220 directly. To guarantee only the legitimate user visits thelegitimate website 1220, the information embedded in the image or stream of images may include a unique but randomly generated number. Such a number may be combined with the URL of the website to form a unique URL for a specific user for a specific period of time. Upon deriving the relevant information from the image or stream of images, thesecure device 100 may then display such information to the user, thereby alerting the user to potential fraud and unauthorized transactions and also providing the user the unique URL that the user has to enter in a browser. - The
legitimate website 1220 may also detect a legitimate user by using a cookie stored at the computer associated with the user. A cookie is a message stored in a text file and given to a Web browser by a Web server. The message is then sent back to the server each time the browser requests a page from the server. The main purpose of cookies is to identify users and possibly prepare customized Web pages for such users. A website can detect that a user has never used a particular computer to visit that website by requesting cookies stored in a browser associated with that computer. The cookie stored by the browser can uniquely identify a user. In the absence of the cookie, the website may request the user to visit the unique URL as described above. - In addition to the applications described above, the present invention can also be deployed in various other types of applications including, for example, digital signatures, encryption, secure ATM cards and secure credit cards, etc. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art should know how to deploy the present invention in many other types of applications.
- The various illustrative logical blocks, modules, circuits, elements, and/or components described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic component, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing components, e.g., a combination of a DSP and a microprocessor, a number of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
- The methods or algorithms described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executable by a processor, or in a combination of both, in the form of control logic, programming instructions, or other directions, and may be contained in a single device or distributed across multiple devices. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. A storage medium may be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
- The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit of scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein, but is to be accorded the full scope consistent with the claims, wherein reference to an element in the singular is not intended to mean “one and only one” unless specifically so stated, but rather “one or more”. All structural and functional equivalents to the elements of the various embodiments described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims. No claim element is to be construed under the provisions of 35 U.S.C. §112, sixth paragraph, unless the element is expressly recited using the phrase “means for” or, in the case of a method claim, the element is recited using the phrase “step for”.
Claims (27)
1. A system for providing authorization, the system comprising:
a server configured to:
allow a user to conduct a transaction using a computer; and
present an image to the user in connection with the transaction, the image having information embedded therein; and
a portable device comprising a camera and configured to:
allow the user to capture the image using the camera;
store predetermined information, the predetermined information including information related to the user;
capture input information from the user, including input information to be used to ensure that the user is authorized to use the portable device; and
generate an output based on the information embedded in the image and the predetermined information;
wherein the server is further configured to receive the output from the portable device and evaluate the output to determine if the user has authorized the transaction.
2. The system of claim 1 wherein the portable device is further configured to generate the output using the input information captured from the user.
3. The system of claim 1 wherein the portable device is further configured to decode the information embedded in the image for use in generating the output by using a cryptographic algorithm.
4. The system of claim 1 wherein the input information includes one of a personal identification number and biometric information.
5. The system of claim 1 wherein the image includes a barcode.
6. The system of claim 5 wherein the barcode includes a multi-dimensional barcode.
7. The system of claim 1 wherein the image includes a set of barcodes.
8-10. (canceled)
11. The system of claim 1 wherein the portable device is further configured to transmit the output to the server via a message delivery protocol comprising the Short Message Service.
12-14. (canceled)
15. The system of claim 1 wherein the output includes a digital signature associated with the user.
16. A method of providing authorization, the method comprising:
configuring a server to:
allow a user to conduct a transaction using a computer;
present an image to the user in connection with the transaction, the image having information embedded therein;
configuring a portable device to:
allow the user to capture the image, wherein the portable device comprises a camera and the image is captured by the camera;
store predetermined information;
capture input information from the user, the input information to be used to ensure that the user is authorized to use the portable device; and
generate an output based on the information embedded in the image and the predetermined information; and
configuring the server to receive the output from the portable device and evaluate the output to determine if the user has authorized the transaction.
17. The method of claim 16 further comprising:
configuring the portable device to generate the output using the input information captured from the user.
18. The method of claim 16 further comprising:
configuring the portable device to decode the information embedded in the image for use in generating the output by using a cryptographic algorithm.
19. The method of claim 16 wherein the input information includes one of a personal identification number and biometric information,
20-23. (canceled)
24. The method of claim 16 further comprising:
configuring the portable device to display the output to the user; and
configuring the server to receive the output, or a portion thereof, from the user via the computer.
25. (canceled)
26. The method of claim 16 further comprising:
configuring the portable device to transmit the output to the server via a message delivery protocol.
27-29. (canceled)
30. The method of claim 16 wherein the output includes a digital signature associated with the user.
31. A method of providing authorization, the method comprising:
presenting an image to a user in connection with a transaction, the image having information embedded therein;
configuring a portable device to:
allow the user to capture the image, wherein the portable device comprises a camera and the image is captured by the camera;
store predetermined information related to the user;
capture input information from the user, the input information to be used to ensure that the user is authorized to use the portable device; and
generate an output based on the information embedded in the image and the predetermined information;
receiving the output generated by the portable device; and
evaluating the output to determine if the user has authorized the transaction.
32. (canceled)
33. The method of claim 31 further comprising:
configuring the portable device to generate the output using the input information captured from the user; and
configuring the portable device to decode the information embedded in the image for use in generating the output by using a cryptographic algorithm.
34-38. (canceled)
39. The method of claim 31 further comprising:
configuring the portable device to display the output to the user, wherein the output displayed to the user includes information relating to the transaction.
40-42. (canceled)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/837,736 US20110140834A1 (en) | 2004-11-08 | 2010-07-16 | Secure identification, verification and authorization using a secure portable device |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US62614604P | 2004-11-08 | 2004-11-08 | |
US63275604P | 2004-12-03 | 2004-12-03 | |
US8433305A | 2005-03-18 | 2005-03-18 | |
US12/837,736 US20110140834A1 (en) | 2004-11-08 | 2010-07-16 | Secure identification, verification and authorization using a secure portable device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US8433305A Continuation | 2004-11-08 | 2005-03-18 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110140834A1 true US20110140834A1 (en) | 2011-06-16 |
Family
ID=40973352
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/084,609 Active 2027-06-04 US7578436B1 (en) | 2004-11-08 | 2005-03-18 | Method and apparatus for providing secure document distribution |
US12/546,596 Expired - Lifetime US8342392B2 (en) | 2004-11-08 | 2009-08-24 | Method and apparatus for providing secure document distribution |
US12/837,736 Abandoned US20110140834A1 (en) | 2004-11-08 | 2010-07-16 | Secure identification, verification and authorization using a secure portable device |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/084,609 Active 2027-06-04 US7578436B1 (en) | 2004-11-08 | 2005-03-18 | Method and apparatus for providing secure document distribution |
US12/546,596 Expired - Lifetime US8342392B2 (en) | 2004-11-08 | 2009-08-24 | Method and apparatus for providing secure document distribution |
Country Status (1)
Country | Link |
---|---|
US (3) | US7578436B1 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120030048A1 (en) * | 2010-07-27 | 2012-02-02 | ReplyBuy, Inc. | System and method for enabling global and remote flash sale or daily deal commerce through unsecured electronic channels |
US20120096277A1 (en) * | 2009-04-20 | 2012-04-19 | Alter Core, S.L. | System and method for personal authentication using a mobile device |
US20120197488A1 (en) * | 2011-01-28 | 2012-08-02 | Samsung Electronics Co., Ltd. | Server and method of providing server-based car security service, car device and method of using server-based car security service, user device and method of using server-based car security service |
US20130198519A1 (en) * | 2011-12-30 | 2013-08-01 | Vasco Data Security, Inc. | Strong authentication token with visual output of pki signatures |
WO2013165759A1 (en) * | 2012-05-04 | 2013-11-07 | Paytel, Inc. | Quick transaction completion using mobile device |
CN103475623A (en) * | 2012-06-06 | 2013-12-25 | 朱俊宇 | Dynamic barcode authentication system and its authentication method |
US8667294B2 (en) * | 2011-08-30 | 2014-03-04 | Electronics And Telecommunications Research Institute | Apparatus and method for preventing falsification of client screen |
JP2014533410A (en) * | 2011-11-15 | 2014-12-11 | ジエマルト・エス・アー | Methods for registering and authenticating cardholders |
WO2016126384A1 (en) * | 2015-02-06 | 2016-08-11 | Qualcomm Incorporated | Apparatuses and methods for secure display on secondary display device |
WO2020191464A1 (en) * | 2019-03-28 | 2020-10-01 | Bankvault Pty Ltd | Computer systems and methods including html browser authorisation approaches |
US10963852B1 (en) | 2019-09-23 | 2021-03-30 | Capital One Services, Llc | Secure file transfer system using an ATM |
US11023117B2 (en) * | 2015-01-07 | 2021-06-01 | Byron Burpulis | System and method for monitoring variations in a target web page |
US11709660B1 (en) | 2022-10-12 | 2023-07-25 | Stodge Inc. | Integrated third-party application builder trigger for message flow |
US12255860B2 (en) | 2022-10-12 | 2025-03-18 | Stodge Inc. | Integrated third-party application builder trigger for message flow |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7822688B2 (en) * | 2002-08-08 | 2010-10-26 | Fujitsu Limited | Wireless wallet |
US7801826B2 (en) | 2002-08-08 | 2010-09-21 | Fujitsu Limited | Framework and system for purchasing of goods and services |
US7784684B2 (en) * | 2002-08-08 | 2010-08-31 | Fujitsu Limited | Wireless computer wallet for physical point of sale (POS) transactions |
US7877605B2 (en) * | 2004-02-06 | 2011-01-25 | Fujitsu Limited | Opinion registering application for a universal pervasive transaction framework |
US7578436B1 (en) * | 2004-11-08 | 2009-08-25 | Pisafe, Inc. | Method and apparatus for providing secure document distribution |
US8813181B2 (en) * | 2005-03-07 | 2014-08-19 | Taun Eric Willis | Electronic verification systems |
US7483175B2 (en) * | 2005-09-16 | 2009-01-27 | Pitney Bowes Inc. | Method and system for printing secure value documents and non-secure documents utilizing the same printing device |
JP4655018B2 (en) * | 2006-04-03 | 2011-03-23 | ソニー株式会社 | Display device, data processing method and data processing system using the display device |
KR101130201B1 (en) * | 2006-11-27 | 2012-03-30 | 엘지전자 주식회사 | Log-in method using a image-code, and terminal thereof |
CN101212473A (en) * | 2006-12-31 | 2008-07-02 | 北京握奇数据系统有限公司 | Method and system for implementing interactive information by means of multimedia |
US20080276177A1 (en) * | 2007-05-03 | 2008-11-06 | Microsoft Corporation | Tag-sharing and tag-sharing application program interface |
DE102007021780A1 (en) * | 2007-05-07 | 2008-11-13 | Lindemeier, Franziska | Method and device for individual storage of public information |
US8869251B2 (en) * | 2007-06-01 | 2014-10-21 | Bank Of America Corporation | Remote provision of consistent one-time password functionality for disparate on-line resources |
US8791822B2 (en) * | 2008-02-07 | 2014-07-29 | International Business Machines Corporation | Embedded RFID verifiable currency |
US8710953B2 (en) * | 2009-06-12 | 2014-04-29 | Microsoft Corporation | Automatic portable electronic device configuration |
US20110035317A1 (en) * | 2009-08-07 | 2011-02-10 | Mark Carlson | Seedless anti phishing authentication using transaction history |
FR2959896B1 (en) * | 2010-05-06 | 2014-03-21 | 4G Secure | METHOD FOR AUTHENTICATING A USER REQUIRING A TRANSACTION WITH A SERVICE PROVIDER |
US8855300B2 (en) * | 2010-09-30 | 2014-10-07 | Google Inc. | Image-based key exchange |
US9667823B2 (en) | 2011-05-12 | 2017-05-30 | Moon J. Kim | Time-varying barcode in an active display |
CN102801574B (en) | 2011-05-27 | 2016-08-31 | 阿里巴巴集团控股有限公司 | The detection method of a kind of web page interlinkage, device and system |
JP2013020609A (en) * | 2011-06-13 | 2013-01-31 | Kazunori Fujisawa | Authentication system |
NO334144B1 (en) | 2011-09-12 | 2013-12-16 | Aker Subsea As | Underwater rotating device |
US8485438B2 (en) | 2011-09-19 | 2013-07-16 | Google Inc. | Mobile computing device authentication using scannable images |
US9110608B2 (en) * | 2011-09-30 | 2015-08-18 | Verizon Patent And Licensing Inc. | Method and system for secure mobile printing |
US9143936B2 (en) | 2012-03-06 | 2015-09-22 | Moon J. Kim | Mobile device digital communication and authentication methods |
US20220300596A1 (en) * | 2012-03-16 | 2022-09-22 | Traitware, Inc. | Authentication System |
US10503888B2 (en) | 2012-03-16 | 2019-12-10 | Traitware, Inc. | Authentication system |
GB2501069A (en) * | 2012-04-04 | 2013-10-16 | Pirean Software Llp | Authentication using coded images to derive an encrypted passcode |
CN103457922B (en) * | 2012-06-05 | 2017-01-25 | 腾讯科技(深圳)有限公司 | Electronic authentication client-side system, processing method, electronic authentication system and method |
US8789167B2 (en) * | 2012-08-24 | 2014-07-22 | Andrea Albani | Fraud-proof location identification system |
US20150278805A1 (en) * | 2012-10-01 | 2015-10-01 | Acuity Systems, Inc. | Authentication system |
CN103902916B (en) * | 2012-12-25 | 2017-03-01 | 联想(北京)有限公司 | A kind of data processing method and a kind of electronic equipment |
KR101789686B1 (en) * | 2013-06-12 | 2017-10-25 | 삼성전자주식회사 | User terminal appratus, server and customized service providing method |
KR102119895B1 (en) | 2013-07-15 | 2020-06-17 | 비자 인터네셔널 서비스 어소시에이션 | Secure remote payment transaction processing |
EP3033725A4 (en) | 2013-08-15 | 2017-05-03 | Visa International Service Association | Secure remote payment transaction processing using a secure element |
US9682590B1 (en) * | 2013-09-16 | 2017-06-20 | Amazon Technologies, Inc. | Printed document security |
CA2924683A1 (en) | 2013-09-20 | 2015-03-26 | Visa International Service Association | Secure remote payment transaction processing including consumer authentication |
CN104243026B (en) * | 2014-07-10 | 2016-05-04 | 腾讯科技(深圳)有限公司 | Method for sending information, message receiving method, device and system |
SE539192C2 (en) * | 2014-08-08 | 2017-05-09 | Identitrade Ab | Method and a system for authenticating a user |
EP3048776B2 (en) * | 2015-01-22 | 2021-03-17 | Nxp B.V. | Methods for managing content, computer program products and secure element |
US10165004B1 (en) * | 2015-03-18 | 2018-12-25 | Cequence Security, Inc. | Passive detection of forged web browsers |
EP3955146A1 (en) | 2015-05-05 | 2022-02-16 | Ping Identity Corporation | Identity management service using a block chain |
US11418520B2 (en) | 2015-06-15 | 2022-08-16 | Cequence Security, Inc. | Passive security analysis with inline active security device |
US10931713B1 (en) | 2016-02-17 | 2021-02-23 | Cequence Security, Inc. | Passive detection of genuine web browsers based on security parameters |
WO2017147494A1 (en) | 2016-02-25 | 2017-08-31 | Trusona, Inc. | Anti-replay systems and methods |
WO2017152150A1 (en) | 2016-03-04 | 2017-09-08 | ShoCard, Inc. | Method and system for authenticated login using static or dynamic codes |
US10007826B2 (en) | 2016-03-07 | 2018-06-26 | ShoCard, Inc. | Transferring data files using a series of visual codes |
US10509932B2 (en) | 2016-03-07 | 2019-12-17 | ShoCard, Inc. | Large data transfer using visual codes with feedback confirmation |
WO2018022993A1 (en) | 2016-07-29 | 2018-02-01 | Trusona, Inc. | Anti-replay authentication systems and methods |
DE102016215915A1 (en) * | 2016-08-24 | 2018-03-01 | Siemens Aktiengesellschaft | Secure configuration of a device |
WO2018049234A1 (en) | 2016-09-09 | 2018-03-15 | Trusona, Inc. | Systems and methods for distribution of selected authentication information for a network of devices |
US10410017B2 (en) | 2016-09-30 | 2019-09-10 | The Toronto-Dominion Bank | Device lock bypass on selectable alert |
EP3552347A4 (en) | 2016-12-12 | 2020-08-12 | Trusona, Inc. | Methods and systems for network-enabled account creation using optical detection |
US10931686B1 (en) | 2017-02-01 | 2021-02-23 | Cequence Security, Inc. | Detection of automated requests using session identifiers |
US10498541B2 (en) | 2017-02-06 | 2019-12-03 | ShocCard, Inc. | Electronic identification verification methods and systems |
USRE49968E1 (en) | 2017-02-06 | 2024-05-14 | Ping Identity Corporation | Electronic identification verification methods and systems with storage of certification records to a side chain |
NL2019349B1 (en) * | 2017-07-26 | 2019-02-19 | Northend Systems B V | Methods and systems for providing access to confidential information |
WO2019113552A1 (en) | 2017-12-08 | 2019-06-13 | ShoCard, Inc. | Methods and systems for recovering data using dynamic passwords |
US11082221B2 (en) | 2018-10-17 | 2021-08-03 | Ping Identity Corporation | Methods and systems for creating and recovering accounts using dynamic passwords |
US10979227B2 (en) | 2018-10-17 | 2021-04-13 | Ping Identity Corporation | Blockchain ID connect |
US11829499B2 (en) * | 2020-03-26 | 2023-11-28 | Bank Of America Corporation | Securing PIN information using obfuscation by applying extra security layer |
US11170130B1 (en) | 2021-04-08 | 2021-11-09 | Aster Key, LLC | Apparatus, systems and methods for storing user profile data on a distributed database for anonymous verification |
DE102021127975A1 (en) | 2021-10-27 | 2023-04-27 | Bundesdruckerei Gmbh | Providing a digital document |
Citations (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4720860A (en) * | 1984-11-30 | 1988-01-19 | Security Dynamics Technologies, Inc. | Method and apparatus for positively identifying an individual |
US4885778A (en) * | 1984-11-30 | 1989-12-05 | Weiss Kenneth P | Method and apparatus for synchronizing generation of separate, free running, time dependent equipment |
US5221838A (en) * | 1990-12-24 | 1993-06-22 | Motorola, Inc. | Electronic wallet |
US5317626A (en) * | 1991-05-13 | 1994-05-31 | Brian Jaynes | Wake-up and reminder system for a telephone |
US5317636A (en) * | 1992-12-09 | 1994-05-31 | Arris, Inc. | Method and apparatus for securing credit card transactions |
US5570465A (en) * | 1993-07-22 | 1996-10-29 | Tsakanikas; Peter J. | Apparatus, method and system for printing of legal currency and negotiable instruments |
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5635906A (en) * | 1996-01-04 | 1997-06-03 | Joseph; Joseph | Retail store security apparatus |
US5670771A (en) * | 1995-09-05 | 1997-09-23 | Fujitsu Limited | Apparatus for reading a bar code |
US5862270A (en) * | 1995-12-08 | 1999-01-19 | Matsushita Electric Industrial Co., Ltd. | Clock free two-dimensional barcode and method for printing and reading the same |
US5873735A (en) * | 1994-12-28 | 1999-02-23 | Sharp Kabushiki Kaisha | Information reproducer and information creating unit |
US5956404A (en) * | 1996-09-30 | 1999-09-21 | Schneier; Bruce | Digital signature with auditing bits |
US6016476A (en) * | 1997-08-11 | 2000-01-18 | International Business Machines Corporation | Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security |
US20010013550A1 (en) * | 1998-09-28 | 2001-08-16 | Fujitsu Limited | Bar code reader and bar code reading method |
US6279830B1 (en) * | 1998-09-03 | 2001-08-28 | Denso Corporation | Two-dimensional code, reading and producing method and recording medium storing related software |
US20010025886A1 (en) * | 1998-06-12 | 2001-10-04 | Duanfeng He | Autodiscrimination and line drawing techniques for code readers |
US20010045461A1 (en) * | 2000-02-18 | 2001-11-29 | Frederick Schuessler | Composite code symbology |
US20020004902A1 (en) * | 2000-07-07 | 2002-01-10 | Eng-Whatt Toh | Secure and reliable document delivery |
US20020023215A1 (en) * | 1996-12-04 | 2002-02-21 | Wang Ynjiun P. | Electronic transaction systems and methods therefor |
US20020020747A1 (en) * | 2000-04-06 | 2002-02-21 | Hitomi Wakamiya | Method of and apparatus for reading a two-dimensional bar code symbol and data storage medium |
US20020023027A1 (en) * | 2000-08-18 | 2002-02-21 | Grant Simonds | Method and system of effecting a financial transaction |
US20020041712A1 (en) * | 1998-05-05 | 2002-04-11 | Alex Roustaei | Apparatus and method for decoding damaged optical codes |
US20020060246A1 (en) * | 2000-11-20 | 2002-05-23 | Gobburu Venkata T. | Method and apparatus for acquiring, maintaining, and using information to be communicated in bar code form with a mobile communications device |
US20020079370A1 (en) * | 1998-03-11 | 2002-06-27 | Wood Robert J. | Illumination source for optical reading apparatus |
US6446869B1 (en) * | 2000-02-10 | 2002-09-10 | Ncr Corporation | Ambient light blocking apparatus for a produce recognition system |
US20020145038A1 (en) * | 1996-06-26 | 2002-10-10 | O'hagan Timothy P. | Electronic shopping system |
US20020169988A1 (en) * | 2000-12-22 | 2002-11-14 | Vandergeest Ron J. | Method and apparatus for providing user authentication using a back channel |
US20020170966A1 (en) * | 1995-07-27 | 2002-11-21 | Hannigan Brett T. | Identification document including embedded data |
US20020191764A1 (en) * | 1999-12-06 | 2002-12-19 | Yoshihiro Hori | Data distribution system and recording device for use therein |
US20030014315A1 (en) * | 1999-12-03 | 2003-01-16 | Harri Jaalinoja | Method and a system for obtaining services using a cellular telecommunication system |
US6512919B2 (en) * | 1998-12-14 | 2003-01-28 | Fujitsu Limited | Electronic shopping system utilizing a program downloadable wireless videophone |
US6542933B1 (en) * | 1999-04-05 | 2003-04-01 | Neomedia Technologies, Inc. | System and method of using machine-readable or human-readable linkage codes for accessing networked data resources |
US20030065805A1 (en) * | 2000-06-29 | 2003-04-03 | Barnes Melvin L. | System, method, and computer program product for providing location based services and mobile e-commerce |
US20030080191A1 (en) * | 2001-10-26 | 2003-05-01 | Allen Lubow | Method and apparatus for applying bar code information to products during production |
US20030161475A1 (en) * | 2002-02-28 | 2003-08-28 | Crumly James D. | Encryption of digitized physical information based on physical tags |
US20030182242A1 (en) * | 2000-06-01 | 2003-09-25 | Scott Andrew Ewart | Token delivery system |
US20040026510A1 (en) * | 2002-08-07 | 2004-02-12 | Shenzhen Syscan Technology Co., Limited. | Methods and systems for encoding and decoding data in 2D symbology |
US20040035935A1 (en) * | 2002-05-30 | 2004-02-26 | Sadao Takahashi | 2-Dimensional code pattern, 2-dimensional code pattern supporting medium, 2-dimensional code pattern generating method, and 2-dimensional code reading apparatus and method |
US20040046025A1 (en) * | 2002-07-12 | 2004-03-11 | Ali Lebaschi | Bar code scanner and method |
US20040064704A1 (en) * | 2002-09-27 | 2004-04-01 | Monis Rahman | Secure information display and access rights control |
US20040065739A1 (en) * | 2002-10-03 | 2004-04-08 | Yihong Xu | Barcode having enhanced visual quality and systems and methods thereof |
US20040089727A1 (en) * | 2000-05-25 | 2004-05-13 | Izhak Baharav | Method and apparatus for generating and decoding a visually significant barcode |
US6757826B1 (en) * | 1998-04-14 | 2004-06-29 | Citicorp Development Center, Inc. | Digital graphic signature system |
US20040125402A1 (en) * | 2002-09-13 | 2004-07-01 | Yoichi Kanai | Document printing program, document protecting program, document protecting system, document printing apparatus for printing out a document based on security policy |
US6764009B2 (en) * | 2001-05-30 | 2004-07-20 | Lightwaves Systems, Inc. | Method for tagged bar code data interchange |
US20040143559A1 (en) * | 2003-01-17 | 2004-07-22 | Ayala Francisco J. | System and method for developing artificial intelligence |
US20040199427A1 (en) * | 2001-07-11 | 2004-10-07 | Van Der Loo Franciscus Gerardus Antonius | Automatic check-out system |
US20040199721A1 (en) * | 2003-03-12 | 2004-10-07 | Power Data Communication Co., Ltd. | Multi-transmission interface memory card |
US20040199778A1 (en) * | 2001-05-21 | 2004-10-07 | Wernet Paul G. | Method and system for increasing the accuracy and security of data capture from a paper form |
US20040267663A1 (en) * | 2003-04-09 | 2004-12-30 | Michael Karns | Electronic payment system |
US20050029354A1 (en) * | 2003-08-05 | 2005-02-10 | Didier Frantz | System associating sets of data into one barcode |
US6863218B2 (en) * | 2002-07-18 | 2005-03-08 | Sharp Kabushiki Kaisha | Two-dimensional code reading apparatus, two-dimensional code reading process, two-dimensional code reading program and recording medium for said program, portable terminal and digital camera |
US20050061892A1 (en) * | 2000-06-30 | 2005-03-24 | Paul Lapstun | Two-dimensional code with locator and orientation components |
US20050109846A1 (en) * | 2001-11-09 | 2005-05-26 | Allen Lubow | System and method for generating a combined bar code image |
US6907527B1 (en) * | 2000-10-17 | 2005-06-14 | International Business Machines Corporation | Cryptography-based low distortion robust data authentication system and method therefor |
US20050132194A1 (en) * | 2003-12-12 | 2005-06-16 | Ward Jean R. | Protection of identification documents using open cryptography |
US20050149487A1 (en) * | 1998-10-01 | 2005-07-07 | Feyzi Celik | Method and apparatus for storing and retrieving business contact information in a computer system |
US6937989B2 (en) * | 1999-12-22 | 2005-08-30 | Eastman Kodak Company | Method of permitting group access to electronically stored images and transaction card used in the method |
US20050199721A1 (en) * | 2004-03-15 | 2005-09-15 | Zhiguo Chang | 2D coding and decoding barcode and its method thereof |
US6993573B2 (en) * | 2003-06-06 | 2006-01-31 | Neomedia Technologies, Inc. | Automatic access of internet content with a camera-enabled cell phone |
US20060045164A1 (en) * | 2004-08-31 | 2006-03-02 | Schuh William C | System and method of compensation for device mounting and thermal transfer error |
US20060054695A1 (en) * | 2002-04-23 | 2006-03-16 | Hiroshi Owada | Dynamic bar code display apparatus, dynamic bar code generation method, and storage medium generation dynamic bar code |
US7021534B1 (en) * | 2004-11-08 | 2006-04-04 | Han Kiliccote | Method and apparatus for providing secure document distribution |
US20060118631A1 (en) * | 2001-10-26 | 2006-06-08 | Allen Lubow | Method and apparatus for applying bar code information to products during production |
US20060157575A1 (en) * | 2005-01-14 | 2006-07-20 | John Lockhart | Methods and apparatus for an automatic temperature-controlled valve |
US20060196950A1 (en) * | 2005-02-16 | 2006-09-07 | Han Kiliccote | Method and system for creating and using redundant and high capacity barcodes |
US7114656B1 (en) * | 2000-01-27 | 2006-10-03 | Ecr Software Corporation | Fixed self-checkout station with cradle for communicating with portable self-scanning units |
US7207481B2 (en) * | 2003-09-23 | 2007-04-24 | Secure Symbology, Inc. | Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method |
US20070109262A1 (en) * | 2000-12-06 | 2007-05-17 | Matsushita Electric Industrial Co., Ltd. | Ofdm signal transmission system, portable terminal, and e-commerce system |
US20070152060A1 (en) * | 2005-12-16 | 2007-07-05 | Pisafe | Method and system for creating and using barcodes |
US7266693B1 (en) * | 2007-02-13 | 2007-09-04 | U.S. Bancorp Licensing, Inc. | Validated mutual authentication |
US20070205283A1 (en) * | 2004-06-07 | 2007-09-06 | Nokia Corporation | Indicia reader with synchronized light source and associated methods and computer program product |
US7379921B1 (en) * | 2004-11-08 | 2008-05-27 | Pisafe, Inc. | Method and apparatus for providing authentication |
US7380708B1 (en) * | 2004-11-08 | 2008-06-03 | Pisafe, Inc. | Method and apparatus for providing secure document distribution |
US7537153B2 (en) * | 2004-05-03 | 2009-05-26 | De La Rue International, Limited | Method and computer program product for electronically managing payment media |
US7578436B1 (en) * | 2004-11-08 | 2009-08-25 | Pisafe, Inc. | Method and apparatus for providing secure document distribution |
US7711961B2 (en) * | 2003-08-27 | 2010-05-04 | Sony Corporation | Electronic apparatus and authenticating method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004126763A (en) | 2002-09-30 | 2004-04-22 | Canon Inc | Access authentication method, program for realizing the same, and access authentication system |
US20060157574A1 (en) | 2004-12-21 | 2006-07-20 | Canon Kabushiki Kaisha | Printed data storage and retrieval |
-
2005
- 2005-03-18 US US11/084,609 patent/US7578436B1/en active Active
-
2009
- 2009-08-24 US US12/546,596 patent/US8342392B2/en not_active Expired - Lifetime
-
2010
- 2010-07-16 US US12/837,736 patent/US20110140834A1/en not_active Abandoned
Patent Citations (82)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4885778A (en) * | 1984-11-30 | 1989-12-05 | Weiss Kenneth P | Method and apparatus for synchronizing generation of separate, free running, time dependent equipment |
US4720860A (en) * | 1984-11-30 | 1988-01-19 | Security Dynamics Technologies, Inc. | Method and apparatus for positively identifying an individual |
US5221838A (en) * | 1990-12-24 | 1993-06-22 | Motorola, Inc. | Electronic wallet |
US5317626A (en) * | 1991-05-13 | 1994-05-31 | Brian Jaynes | Wake-up and reminder system for a telephone |
US5317636A (en) * | 1992-12-09 | 1994-05-31 | Arris, Inc. | Method and apparatus for securing credit card transactions |
US5570465A (en) * | 1993-07-22 | 1996-10-29 | Tsakanikas; Peter J. | Apparatus, method and system for printing of legal currency and negotiable instruments |
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5873735A (en) * | 1994-12-28 | 1999-02-23 | Sharp Kabushiki Kaisha | Information reproducer and information creating unit |
US20020170966A1 (en) * | 1995-07-27 | 2002-11-21 | Hannigan Brett T. | Identification document including embedded data |
US5670771A (en) * | 1995-09-05 | 1997-09-23 | Fujitsu Limited | Apparatus for reading a bar code |
US5862270A (en) * | 1995-12-08 | 1999-01-19 | Matsushita Electric Industrial Co., Ltd. | Clock free two-dimensional barcode and method for printing and reading the same |
US5635906A (en) * | 1996-01-04 | 1997-06-03 | Joseph; Joseph | Retail store security apparatus |
US20020145038A1 (en) * | 1996-06-26 | 2002-10-10 | O'hagan Timothy P. | Electronic shopping system |
US5956404A (en) * | 1996-09-30 | 1999-09-21 | Schneier; Bruce | Digital signature with auditing bits |
US20020023215A1 (en) * | 1996-12-04 | 2002-02-21 | Wang Ynjiun P. | Electronic transaction systems and methods therefor |
US6016476A (en) * | 1997-08-11 | 2000-01-18 | International Business Machines Corporation | Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security |
US20020079370A1 (en) * | 1998-03-11 | 2002-06-27 | Wood Robert J. | Illumination source for optical reading apparatus |
US6757826B1 (en) * | 1998-04-14 | 2004-06-29 | Citicorp Development Center, Inc. | Digital graphic signature system |
US20020041712A1 (en) * | 1998-05-05 | 2002-04-11 | Alex Roustaei | Apparatus and method for decoding damaged optical codes |
US6685095B2 (en) * | 1998-05-05 | 2004-02-03 | Symagery Microsystems, Inc. | Apparatus and method for decoding damaged optical codes |
US20010025886A1 (en) * | 1998-06-12 | 2001-10-04 | Duanfeng He | Autodiscrimination and line drawing techniques for code readers |
US6279830B1 (en) * | 1998-09-03 | 2001-08-28 | Denso Corporation | Two-dimensional code, reading and producing method and recording medium storing related software |
US20010013550A1 (en) * | 1998-09-28 | 2001-08-16 | Fujitsu Limited | Bar code reader and bar code reading method |
US20050149487A1 (en) * | 1998-10-01 | 2005-07-07 | Feyzi Celik | Method and apparatus for storing and retrieving business contact information in a computer system |
US6512919B2 (en) * | 1998-12-14 | 2003-01-28 | Fujitsu Limited | Electronic shopping system utilizing a program downloadable wireless videophone |
US6542933B1 (en) * | 1999-04-05 | 2003-04-01 | Neomedia Technologies, Inc. | System and method of using machine-readable or human-readable linkage codes for accessing networked data resources |
US20030014315A1 (en) * | 1999-12-03 | 2003-01-16 | Harri Jaalinoja | Method and a system for obtaining services using a cellular telecommunication system |
US20020191764A1 (en) * | 1999-12-06 | 2002-12-19 | Yoshihiro Hori | Data distribution system and recording device for use therein |
US6950800B1 (en) * | 1999-12-22 | 2005-09-27 | Eastman Kodak Company | Method of permitting group access to electronically stored images and transaction card used in the method |
US6937989B2 (en) * | 1999-12-22 | 2005-08-30 | Eastman Kodak Company | Method of permitting group access to electronically stored images and transaction card used in the method |
US7114656B1 (en) * | 2000-01-27 | 2006-10-03 | Ecr Software Corporation | Fixed self-checkout station with cradle for communicating with portable self-scanning units |
US6446869B1 (en) * | 2000-02-10 | 2002-09-10 | Ncr Corporation | Ambient light blocking apparatus for a produce recognition system |
US20010045461A1 (en) * | 2000-02-18 | 2001-11-29 | Frederick Schuessler | Composite code symbology |
US20020020747A1 (en) * | 2000-04-06 | 2002-02-21 | Hitomi Wakamiya | Method of and apparatus for reading a two-dimensional bar code symbol and data storage medium |
US20040089727A1 (en) * | 2000-05-25 | 2004-05-13 | Izhak Baharav | Method and apparatus for generating and decoding a visually significant barcode |
US20030182242A1 (en) * | 2000-06-01 | 2003-09-25 | Scott Andrew Ewart | Token delivery system |
US20030065805A1 (en) * | 2000-06-29 | 2003-04-03 | Barnes Melvin L. | System, method, and computer program product for providing location based services and mobile e-commerce |
US20050061892A1 (en) * | 2000-06-30 | 2005-03-24 | Paul Lapstun | Two-dimensional code with locator and orientation components |
US20020004902A1 (en) * | 2000-07-07 | 2002-01-10 | Eng-Whatt Toh | Secure and reliable document delivery |
US6988199B2 (en) * | 2000-07-07 | 2006-01-17 | Message Secure | Secure and reliable document delivery |
US20020023027A1 (en) * | 2000-08-18 | 2002-02-21 | Grant Simonds | Method and system of effecting a financial transaction |
US6907527B1 (en) * | 2000-10-17 | 2005-06-14 | International Business Machines Corporation | Cryptography-based low distortion robust data authentication system and method therefor |
US20020060246A1 (en) * | 2000-11-20 | 2002-05-23 | Gobburu Venkata T. | Method and apparatus for acquiring, maintaining, and using information to be communicated in bar code form with a mobile communications device |
US6736322B2 (en) * | 2000-11-20 | 2004-05-18 | Ecrio Inc. | Method and apparatus for acquiring, maintaining, and using information to be communicated in bar code form with a mobile communications device |
US20070109262A1 (en) * | 2000-12-06 | 2007-05-17 | Matsushita Electric Industrial Co., Ltd. | Ofdm signal transmission system, portable terminal, and e-commerce system |
US20020169988A1 (en) * | 2000-12-22 | 2002-11-14 | Vandergeest Ron J. | Method and apparatus for providing user authentication using a back channel |
US20040199778A1 (en) * | 2001-05-21 | 2004-10-07 | Wernet Paul G. | Method and system for increasing the accuracy and security of data capture from a paper form |
US6764009B2 (en) * | 2001-05-30 | 2004-07-20 | Lightwaves Systems, Inc. | Method for tagged bar code data interchange |
US20040199427A1 (en) * | 2001-07-11 | 2004-10-07 | Van Der Loo Franciscus Gerardus Antonius | Automatic check-out system |
US20030080191A1 (en) * | 2001-10-26 | 2003-05-01 | Allen Lubow | Method and apparatus for applying bar code information to products during production |
US20060118631A1 (en) * | 2001-10-26 | 2006-06-08 | Allen Lubow | Method and apparatus for applying bar code information to products during production |
US20050109846A1 (en) * | 2001-11-09 | 2005-05-26 | Allen Lubow | System and method for generating a combined bar code image |
US20030161475A1 (en) * | 2002-02-28 | 2003-08-28 | Crumly James D. | Encryption of digitized physical information based on physical tags |
US20060054695A1 (en) * | 2002-04-23 | 2006-03-16 | Hiroshi Owada | Dynamic bar code display apparatus, dynamic bar code generation method, and storage medium generation dynamic bar code |
US20040035935A1 (en) * | 2002-05-30 | 2004-02-26 | Sadao Takahashi | 2-Dimensional code pattern, 2-dimensional code pattern supporting medium, 2-dimensional code pattern generating method, and 2-dimensional code reading apparatus and method |
US20040046025A1 (en) * | 2002-07-12 | 2004-03-11 | Ali Lebaschi | Bar code scanner and method |
US6863218B2 (en) * | 2002-07-18 | 2005-03-08 | Sharp Kabushiki Kaisha | Two-dimensional code reading apparatus, two-dimensional code reading process, two-dimensional code reading program and recording medium for said program, portable terminal and digital camera |
US20040026510A1 (en) * | 2002-08-07 | 2004-02-12 | Shenzhen Syscan Technology Co., Limited. | Methods and systems for encoding and decoding data in 2D symbology |
US20040125402A1 (en) * | 2002-09-13 | 2004-07-01 | Yoichi Kanai | Document printing program, document protecting program, document protecting system, document printing apparatus for printing out a document based on security policy |
US20040064704A1 (en) * | 2002-09-27 | 2004-04-01 | Monis Rahman | Secure information display and access rights control |
US20040065739A1 (en) * | 2002-10-03 | 2004-04-08 | Yihong Xu | Barcode having enhanced visual quality and systems and methods thereof |
US20040143559A1 (en) * | 2003-01-17 | 2004-07-22 | Ayala Francisco J. | System and method for developing artificial intelligence |
US20040199721A1 (en) * | 2003-03-12 | 2004-10-07 | Power Data Communication Co., Ltd. | Multi-transmission interface memory card |
US20040267663A1 (en) * | 2003-04-09 | 2004-12-30 | Michael Karns | Electronic payment system |
US6993573B2 (en) * | 2003-06-06 | 2006-01-31 | Neomedia Technologies, Inc. | Automatic access of internet content with a camera-enabled cell phone |
US20050029354A1 (en) * | 2003-08-05 | 2005-02-10 | Didier Frantz | System associating sets of data into one barcode |
US7711961B2 (en) * | 2003-08-27 | 2010-05-04 | Sony Corporation | Electronic apparatus and authenticating method |
US7207481B2 (en) * | 2003-09-23 | 2007-04-24 | Secure Symbology, Inc. | Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method |
US20050132194A1 (en) * | 2003-12-12 | 2005-06-16 | Ward Jean R. | Protection of identification documents using open cryptography |
US20070114285A1 (en) * | 2004-03-15 | 2007-05-24 | Shenzhen Syscan Technology Co., Ltd. | 2D coding and decoding barcode and its method thereof |
US20050199721A1 (en) * | 2004-03-15 | 2005-09-15 | Zhiguo Chang | 2D coding and decoding barcode and its method thereof |
US7537153B2 (en) * | 2004-05-03 | 2009-05-26 | De La Rue International, Limited | Method and computer program product for electronically managing payment media |
US20070205283A1 (en) * | 2004-06-07 | 2007-09-06 | Nokia Corporation | Indicia reader with synchronized light source and associated methods and computer program product |
US20060045164A1 (en) * | 2004-08-31 | 2006-03-02 | Schuh William C | System and method of compensation for device mounting and thermal transfer error |
US7021534B1 (en) * | 2004-11-08 | 2006-04-04 | Han Kiliccote | Method and apparatus for providing secure document distribution |
US7379921B1 (en) * | 2004-11-08 | 2008-05-27 | Pisafe, Inc. | Method and apparatus for providing authentication |
US7380708B1 (en) * | 2004-11-08 | 2008-06-03 | Pisafe, Inc. | Method and apparatus for providing secure document distribution |
US7578436B1 (en) * | 2004-11-08 | 2009-08-25 | Pisafe, Inc. | Method and apparatus for providing secure document distribution |
US20060157575A1 (en) * | 2005-01-14 | 2006-07-20 | John Lockhart | Methods and apparatus for an automatic temperature-controlled valve |
US20060196950A1 (en) * | 2005-02-16 | 2006-09-07 | Han Kiliccote | Method and system for creating and using redundant and high capacity barcodes |
US20070152060A1 (en) * | 2005-12-16 | 2007-07-05 | Pisafe | Method and system for creating and using barcodes |
US7266693B1 (en) * | 2007-02-13 | 2007-09-04 | U.S. Bancorp Licensing, Inc. | Validated mutual authentication |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120096277A1 (en) * | 2009-04-20 | 2012-04-19 | Alter Core, S.L. | System and method for personal authentication using a mobile device |
US10319011B2 (en) * | 2010-07-27 | 2019-06-11 | ReplyBuy, Inc. | System and method for enabling global and remote flash sale or daily deal commerce through unsecured electronic channels |
US20120030048A1 (en) * | 2010-07-27 | 2012-02-02 | ReplyBuy, Inc. | System and method for enabling global and remote flash sale or daily deal commerce through unsecured electronic channels |
US11227319B1 (en) | 2010-07-27 | 2022-01-18 | Airship Group, Inc. | System and method for enabling global and remote flash sale or daily deal commerce through unsecured electronic channels |
US20120197488A1 (en) * | 2011-01-28 | 2012-08-02 | Samsung Electronics Co., Ltd. | Server and method of providing server-based car security service, car device and method of using server-based car security service, user device and method of using server-based car security service |
US9544305B2 (en) * | 2011-01-28 | 2017-01-10 | Samsung Electronics Co., Ltd. | Server and method of providing server-based car security service, car device and method of using server-based car security service, user device and method of using server-based car security service |
US8667294B2 (en) * | 2011-08-30 | 2014-03-04 | Electronics And Telecommunications Research Institute | Apparatus and method for preventing falsification of client screen |
JP2014533410A (en) * | 2011-11-15 | 2014-12-11 | ジエマルト・エス・アー | Methods for registering and authenticating cardholders |
US20130198519A1 (en) * | 2011-12-30 | 2013-08-01 | Vasco Data Security, Inc. | Strong authentication token with visual output of pki signatures |
US8966268B2 (en) * | 2011-12-30 | 2015-02-24 | Vasco Data Security, Inc. | Strong authentication token with visual output of PKI signatures |
WO2013165759A1 (en) * | 2012-05-04 | 2013-11-07 | Paytel, Inc. | Quick transaction completion using mobile device |
CN103475623A (en) * | 2012-06-06 | 2013-12-25 | 朱俊宇 | Dynamic barcode authentication system and its authentication method |
US11023117B2 (en) * | 2015-01-07 | 2021-06-01 | Byron Burpulis | System and method for monitoring variations in a target web page |
US20210286935A1 (en) * | 2015-01-07 | 2021-09-16 | Byron Burpulis | Engine, System, and Method of Providing Automated Risk Mitigation |
US9619636B2 (en) | 2015-02-06 | 2017-04-11 | Qualcomm Incorporated | Apparatuses and methods for secure display on secondary display device |
WO2016126384A1 (en) * | 2015-02-06 | 2016-08-11 | Qualcomm Incorporated | Apparatuses and methods for secure display on secondary display device |
WO2020191464A1 (en) * | 2019-03-28 | 2020-10-01 | Bankvault Pty Ltd | Computer systems and methods including html browser authorisation approaches |
US10963852B1 (en) | 2019-09-23 | 2021-03-30 | Capital One Services, Llc | Secure file transfer system using an ATM |
US11709660B1 (en) | 2022-10-12 | 2023-07-25 | Stodge Inc. | Integrated third-party application builder trigger for message flow |
US12255860B2 (en) | 2022-10-12 | 2025-03-18 | Stodge Inc. | Integrated third-party application builder trigger for message flow |
Also Published As
Publication number | Publication date |
---|---|
US7578436B1 (en) | 2009-08-25 |
US8342392B2 (en) | 2013-01-01 |
US20100191972A1 (en) | 2010-07-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7379921B1 (en) | Method and apparatus for providing authentication | |
US7314167B1 (en) | Method and apparatus for providing secure identification, verification and authorization | |
US7021534B1 (en) | Method and apparatus for providing secure document distribution | |
US7578436B1 (en) | Method and apparatus for providing secure document distribution | |
US7380708B1 (en) | Method and apparatus for providing secure document distribution | |
US11895225B2 (en) | Systems and methods for trustworthy electronic authentication using a computing device | |
US7505941B2 (en) | Methods and apparatus for conducting electronic transactions using biometrics | |
US8423476B2 (en) | Methods and apparatus for conducting electronic transactions | |
US8060413B2 (en) | System and method for making electronic payments from a wireless mobile device | |
US9858567B2 (en) | Dynamic card verification values and credit transactions | |
EP1710980B1 (en) | Authentication services using mobile device | |
US8079082B2 (en) | Verification of software application authenticity | |
US20110238573A1 (en) | Cardless atm transaction method and system | |
US20100153273A1 (en) | Systems for performing transactions at a point-of-sale terminal using mutating identifiers | |
WO2010105331A1 (en) | System and method for cardless secure on-line credit card/debit card purchasin | |
WO2012167941A1 (en) | Method to validate a transaction between a user and a service provider | |
US20230252463A1 (en) | System and method for secure web service access control | |
EP2533486A1 (en) | Method to validate a transaction between a user and a service provider | |
CA3154449C (en) | A digital, personal and secure electronic access permission | |
KR20130095363A (en) | A cash remittance method based on digital codes using hash function and electronic signature | |
US20120290483A1 (en) | Methods, systems and nodes for authorizing a securized exchange between a user and a provider site | |
US20040015688A1 (en) | Interactive authentication process | |
JP2024507012A (en) | Payment cards, authentication methods, and use for remote payments | |
EP1172776A2 (en) | Interactive authentication process | |
CA2658661A1 (en) | System and method for cardless secure on-line credit card/debit card purchasing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PISAFE, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KILICCOTE, HAN;REEL/FRAME:026354/0339 Effective date: 20070225 |
|
AS | Assignment |
Owner name: OVERTOUCH REMOTE L.L.C., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PISAFE, INC.;REEL/FRAME:026723/0600 Effective date: 20110602 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |