Strong authentication token usable with a plurality of independent application providers

a technology of strong authentication and application providers, applied in the field of electronic transaction security, can solve the problems that passwords or signatures can in general not convey all the information contained in cryptograms to the authentication server, and achieve the effect of reducing their costs and high costs

Active Publication Date: 2011-04-28
ONESPAN NORTH AMERICA INC
View PDF11 Cites 76 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides a way to allow multiple organizations to access a single strong authentication token used for accessing various applications on a network. It also includes fuzzy authentications that require less effort than traditional methods like public key certificates. Additionally, there is a method where the strength of each authentication token is determined based on factors like the type of service provided by the issuer and the number of times they were pressed. This helps reduce costs compared to traditional methods. Overall, the technical effect of this invention is improved efficiency and flexibility in providing secured services across multiple networks.

Problems solved by technology

The technical problem addressed in this patent text relates to improving the security of strong authentication tokens during transactions. Current methods involve requiring physical connections between the token and the issuer, making them difficult to integrate within existing computers without compromising their privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strong authentication token usable with a plurality of independent application providers
  • Strong authentication token usable with a plurality of independent application providers
  • Strong authentication token usable with a plurality of independent application providers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]FIG. 1 illustrates a preferred method according to the invention to generate a dynamic credential for a specific application provider or application provider group comprising the steps of:[0050]obtaining an indicator of the application provider or application provider group (step 110);[0051]capturing the value of at least one dynamic variable (step 120);[0052]retrieving one or more secret values (step 130);[0053]cryptographically combining said application provider indicator, said dynamic value and said one or more secret values (step 140) using a symmetric cryptographic algorithm; and[0054]transforming the result of said cryptographic combination into a dynamic credential (step 150) which in a typical case is different from the result of the cryptographic combination.

[0055]In one embodiment the dynamic variable may comprise a time related value. In a specific embodiment the dynamic variable comprises the value of a real-time clock. In another embodiment the dynamic variable comp

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention defines a strong authentication token for generating different dynamic credentials for different application providers comprising an input interface providing an output representing an application provider indicator; a secret key storage for storing one or more secret keys; a variability source for providing a dynamic variable value; a key providing agent for providing an application provider specific key as a function of said application provider indicator using one or more keys stored in said secret key storage; a cryptographic agent for cryptographically combining said application provider specific key with said dynamic variable value using symmetric cryptography; a transformation agent coupled to said cryptographic agent for transforming an output of said cryptographic agent to produce a dynamic credential; and an output interface to output said dynamic credential.
The present invention defines furthermore a method to manage the secret keys of strong authentication tokens that can generate dynamic credentials for more than one supported application provider or application provider group using different secret keys for each supported application provider or application provider group comprising generating for each of a batch of strong authentication tokens a token specific master key; personalising each token of said batch with the token specific master key associated with said token; generating for each of a plurality of supported application providers or application provider groups a set of application provider specific token keys, one application provider specific token key for each token of said batch, whereby each application provider specific token key of each of said sets is derived from that token's token specific master key and a unique identifier or indicator of that application provider or application provider group; providing to each application provider or an entity that is responsible for the verification on behalf of said application provider of the dynamic credentials that are generated for said application provider, the corresponding set of application provider specific token keys.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ONESPAN NORTH AMERICA INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products