WO2008064403A1 - Remote service authentication method - Google Patents
Remote service authentication method Download PDFInfo
- Publication number
- WO2008064403A1 WO2008064403A1 PCT/AU2007/001813 AU2007001813W WO2008064403A1 WO 2008064403 A1 WO2008064403 A1 WO 2008064403A1 AU 2007001813 W AU2007001813 W AU 2007001813W WO 2008064403 A1 WO2008064403 A1 WO 2008064403A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- authentication information
- authentication
- service
- address
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Definitions
- the present invention relates to authenticating a remote service to a user.
- the method of the present invention has particular application to authentication of web-based remote services such as on-line banking services, and it will be convenient to hereinafter describe it in this context. It is to be appreciated, however, that the method of the invention is not limited to this application and may be used to authenticate a wide variety of remote services.
- Conventional authentication methods and devices typically allow authentication of a user to a remote service.
- conventional authentication methods entail a remote service authenticating a user simply by requesting a password from the user.
- the user has no way to know whether he or she is really communicating with the desired or correct remote service.
- a remote computer is able to mimic the behaviour of the remote service, the user may be spoofed or "phished" into thinking that he or she is communicating with the correct remote service.
- an unsuspecting user may divulge information that they would otherwise only divulge to a legitimate remote service, such as, their user ID and password.
- a method of authenticating a remote service to a user including the following steps: receiving a network address having a unique identifier assigned to the user; using the address to communicate with an authentication service; receiving from the authentication service authentication information obtained by processing the unique identifier, the authentication information enabling the user to verify authenticity of the remote service.
- the authentication service may be part of the remote service or co- located on a single server with the remote service, or may be physically and logically separate from the remote service.
- the network address may be selected from one or more of the following address types: a uniform resource indicator; an email address; or a link address.
- a network address may include an Internet Protocol (IP) address.
- IP Internet Protocol
- the network address may be assigned or provided to the user by the remote service, or by an authentication service.
- the unique identifier assigned to the user may include, for example, an account number, an account name, a customer number, a one-time usable passcode, or a combination of a first identifier (such as an account number, an account name, a customer number or the like), which is a fixed identifier associated with the user, and a second identifier, which is a variable identifier, in the form of a one-time usable passcode.
- the network address includes the combination of a uniform resource indicator (URI), including the web address of the authentication service (which may or may not be part of the remote service), and a one-time useable passcode.
- the network address may include the combination of a uniform resource indicator (URI), a first identifier which is a fixed identifier associated with the user (such as an account number) and a second identifier in the form of a one-time useable pass code which is appended or concatenated to the URI and the first identifier to thereby form a one-time usable network address.
- URI uniform resource indicator
- the authentication information includes one or more of the following types: a character sequence; an image file; or an audio file.
- the user may receive the authentication information by means of an electronic communication, such a web page, SMS message, a voice mail message, or electronic mail.
- an electronic communication such as a web page, SMS message, a voice mail message, or electronic mail.
- the authentication information may be generated by the remote service or the authentication service. Alternatively, the authentication information may be selected by the remote service or authentication service based on information provided to the remote service or authentication service by the user.
- the authentication information transmitted to the user is varied for at least consecutive requests.
- the authentication information is one-time useable authentication information.
- the authentication service may detect the address type of the network address, or the user may indicate the type.
- the address type may include an "activated" address type or a user entered address type.
- an activated address type may include, for example, a uniform resource indicator which has been "activated” by a user using an input device (such as a mouse, keyboard, trackerball, touch-screen, joystick or the like) to select or enable the address, such as by clicking a mouse pointer over a hyperlink which activates the uniform resource indicator.
- a user entered address may include, for example, an address which has been manually entered (such as manually keyed) into the address entry field of a web-browser.
- the authentication service rejects the user's communication. In other words, in one embodiment the authentication service will not accept, and thus will not authenticate, a communication which has been initiated by "activating" an address and thus which represents an activated address type.
- a method for generating an authentication response to a communication from a user including a network address having a unique identifier assigned to the user including the following steps: receiving the communication and processing the unique identifier to obtain authentication information based on the unique identifier; communicating the authentication information to the user, the authentication information enabling the user to verify authenticity of the remote service.
- a system for generating an authentication response to a communication from a user including a network address having a unique identifier assigned to the user, the system including processor and associated memory device for storing a series of instructions to cause the processor to: receive the communication and process the unique identifier; obtain authentication information based on the unique identifier; communicate the authentication information to the user, the authentication information enabling the user to verify authenticity of the remote service.
- computer software for use in a system for generating an authentication response to a communication from a user including a network address having a unique identifier assigned to the user, the system including a processor and associated memory device for storing the computer software including a series of instructions to cause the processor to: receive the communication and process the unique identifier; obtain authentication information based on the unique identifier; communicate the authentication information to the user, the authentication information enabling the user to verify authenticity of the remote service.
- Figure 1 is a schematic diagram showing a computer-enabled system for authenticating a remote service to a user in accordance with one or more embodiments of the present invention
- Figure 2 is a flow diagram of a method for authenticating a remote service in accordance with an embodiment of the present invention.
- Figure 3 is a schematic diagram showing various functional elements of the computer-enabled system of Figure 1 in block form.
- the remote service is an e-commerce service, such as an on-line banking service.
- the proposed method of authenticating a remote service to a user will be applicable to a broad range of remote services, including on-line share trading, electronic messaging services (for example, email), marketing and promotional offers (such as special offer coupons), online retail services and the like.
- the system 100 includes a client user terminal 1 10 for access by a user 120, in communication with a first server 130 associated with a remote service 140 such as an on-line banking service.
- Server 130 may be associated with a database 150 for storing authentication information for authenticating the remote service 140 to a user 120.
- the client user terminal 1 10 and server 130 are interconnected by means of the Internet 160 or any other suitable communications network.
- a network address may be assigned to the user 120 by the remote service 140 itself or by another service such as, for example, an independent authentication service 210 that assigns network addresses and unique identifiers for use with different remote services.
- Independent authentication service 210 may be associated with a second server 170 further associated with a second database 180 for maintaining a record of users 120 and corresponding unique identifiers which are provided to the users by the authentication service 210.
- the second database 180 may be associated with the first server 130 disposing the need for second server 170.
- the authentication service 210 may receive and process the network address having the unique identifier from the user 120 to obtain authentication information and communicate the same to the user 120 to enable the user to verify authenticity of the remote service 140.
- a user 120 associated with client user terminal 1 10 is provided with a network address having a unique identifier which has been assigned to the user 120.
- the unique identifier may include, for example, an alphabetic, numeric, or alphanumeric identifier.
- the network address comprises a uniform resource indicator (URI) including the web address of the authentication service 210, which may or may not be part of the remote service 140, and a unique numeric identifier, for example, www.emue.com/12345678.
- the unique identifier includes a one-time useable passcode which may comprise the entire unique identifier or a portion of it.
- the unique identifier may include a number (such as an account or customer number) which is directly associated with user 120 and which is appended to, or concatenated with, the one-time usable passcode.
- an identifier may include a one-time useable pass code which is appended or concatenated to the URI to thereby form a onetime usable network address.
- Suitable devices for generating a one-time usable passcode may include, for example, an RSA SecurelD or VASCO token. Another device which is suitable for generating a one-time usable passcode is described in international patent application PCT/AU2005/001923, the contents of which are taken to be incorporated by this reference.
- the user 120 uses the network address having the unique identifier to send a communication requesting authentication of the remote service.
- the authentication service 210 receives the communication from the user 120, and processes the unique identifier to obtain authentication information corresponding to the user 120.
- the authentication information is received by the user 120 to enable the user 120 to verify authenticity of the remote service 140.
- the authentication information comprises a numeric verification code, for example, 87463968.
- the network address may be a uniform resource indicator (URI) that has been uniquely assigned and provided to the user 120 for authenticating the remote service 140.
- URI uniform resource indicator
- the remote service 140 or authentication service 210 assigns a unique URI to each user of the remote service 140.
- the term "uniquely assigned" is intended to convey that the network address is unique to each user 120 in terms of the remote service 140, and thus may be used to distinguish the user from other users of the same remote service 140. For instance, in a typical application, each user 120 is a registered user of the remote service 120 and thus each registered user is assigned a unique URI.
- the unique identifier may include the entire URI or, alternatively, it may include only a part of the URI such as the host, the port, the path, the query or the fragment, or combinations thereof.
- the network address could comprise an email address or a link address that has been assigned to the user 120 by the remote service 140 specifically for communicating with the authentication service 210.
- other forms of addresses may also be used, such as for example, a telephone number (in the case of PSTN or PLMN communication between the user and the remote service) or an IP address (in the case of data packet based communications between the user and the remote service).
- the authentication information may include information that has been previously selected and/or entered by the user 120.
- the authentication information may include an image file (such as an image file for a photograph or symbol), a character sequence (such as a quotation or random sequence of letters and/or numbers), or even an audio or sound file (such as an mpeg file, a .wav file or the like) that has been selected or entered by the user 120.
- This enables the user 120 to enter or select information that is of significance to the user to enable the user to readily authenticate the remote service 140 if the authentication information provided to the user 120 includes information that has been personally selected by or entered by the user 120.
- the authentication information may be an image file, a character sequence or an audio file that is dynamically generated in response to receipt of the user communication. In this case the authentication service 210 will also inform the user 120 regarding the authentication information and how to verify that information.
- the authentication information comprises a web-page
- a unique web-page will be generated on the client computer 1 10 for consecutive user requests to access the remote service 140.
- the authentication information comprises an authentication code
- a different authentication code will be generated for each of consecutive requests.
- the authentication information may include one-time usable authentication information, such as an authentication code that is generated algorithmically by the remote service 140 or authentication service 210 in response to processing the unique identifier.
- the authentication information may include, or at least be contained in, a web-page that is communicated to the user 120 after processing the unique identifier. Accordingly, the authentication information is communicated via a bi-directional communication channel to the same device that was used to make the initial communication with the remote service 140. For example, where the client user terminal 1 10 is used to communicate with the remote service 140 via the Internet 160, the remote service 140 may communicate the authentication information back to the client user computer 1 10 in the form of a web-page. Alternatively, if the network address were to comprise an email address and the user 120 communicated with the remote service 140 via an electronic message or email, the authentication information may be communicated back to the user 120 by email via the Internet 160 or similar communications network.
- the web page or email communicated to the user 120 will include one or more features and/or characteristics that are recognizable to the user 120 as verifying authenticity of the remote service 140.
- the web page or email may include an image file, a symbol, a pattern, a graphic, a sign, an audio file or other object that that has been selected by, or provided to, the remote service 140 or authentication service 210 as corresponding to the unique identifier, and which is recognizable by the user 120 as a valid authentication response.
- "valid authentication response” denotes a response that contains authentication information that the user 120 recognizes as a response which confirms that the remote service 140 is legitimate.
- the user 120 communicates with the remote service 140 via the Internet 160 using the client terminal 1 10 using a network address containing a unique identifier.
- the authentication information is communicated to the user 120 via a second communication channel, such as for example a GSM or similar wireless network 190 to a different device such as, for example, a mobile telephone 200.
- the authentication information may be transmitted to a mobile telephone associated with the user 120 as a voice message or as a short message service (SMS) message.
- SMS short message service
- the use of the network address to authenticate the remote service 140 may include the user 120 entering the network address into a client computer 1 10 so as to request a web page from a server associated with the remote service 140.
- use of the network address may include the user 120 activating an address that has been sent to the user 120 in an electronic communication, such as an email message, short message service, multimedia service or the like.
- the user communication further includes information classifying how the network address was entered and/or activated by the user. For example, if the network address was entered by activating a link address contained in an email communicated to the user 120, the request information may classify the activation of that address as an activated address type.
- the activation of that network address may be classified as a user entered type.
- An embodiment of the present invention that provides a capacity to classify the network address as an entered or activated address is expected to provide additional advantages in that it may enable the remote service 140 to deny access to the remote service 140 in the event that the network address was not a user entered type. Denying access in this way is expected to provide additional security benefits to the user 120.
- Processing of the unique identifier to obtain corresponding authentication information for the user 120 may entail the responsible service (in other words, the remote service 140 or the authentication service 210) conducting a database lookup to retrieve authentication information associated with the unique identifier, and thus the user 120. This process may involve the remote service 140 communicating the unique identifier to an external authentication service and requesting authentication information from that service. Alternatively, the user 120 may communicate directly with an independent authentication service to verify authenticity of the remote service 140.
- the responsible service in other words, the remote service 140 or the authentication service 210) conducting a database lookup to retrieve authentication information associated with the unique identifier, and thus the user 120. This process may involve the remote service 140 communicating the unique identifier to an external authentication service and requesting authentication information from that service. Alternatively, the user 120 may communicate directly with an independent authentication service to verify authenticity of the remote service 140.
- the system 100 may be implemented using hardware, software or a combination thereof and may be implemented in one or more computer systems or processing systems.
- the functionality of the client user terminal 1 10, as well as the server 130, 170 may be provided by one or more computer systems capable of carrying out the above described functionality.
- the computer system 300 includes one or more processors, such as processor 310.
- the processor 310 is connected to a communication infrastructure 320.
- the computer system 300 may include a display interface 330 that forwards graphics, texts and other data from the communication infrastructure 320 for supply to the display unit 340.
- the computer system 300 may also include a main memory 350, preferably random access memory, and may also include a secondary memory 360.
- the secondary memory 360 may include, for example, a hard disk drive, magnetic tape drive, optical disk drive, etc.
- the removable storage drive 380 reads from and/or writes to a removable storage unit 390 in a well known manner.
- the removable storage unit 390 represents a floppy disk, magnetic tape, optical disk, etc.
- the removable storage unit 390 includes a computer usable storage medium having stored therein computer software in a form of a series of instructions to cause the processor 310 to carry out desired functionality.
- the secondary memory 360 may include other similar means for allowing computer programs or instructions to be loaded into the computer system 300. Such means may include, for example, a removable storage unit 400 and interface 410.
- the computer system 300 may also include a communications interface 420.
- Communications interface 420 allow software and data to be transferred between the computer system 300 and external devices. Examples of communication interface 420 may include a modem, a network interface, a communications port, a PCMIA slot and card etc.
- Software and data transferred via a communications interface 420 are in the form of signals 430 which may be electromagnetic, electronic, optical or other signals capable of being received by the communications interface 420.
- the signals are provided to communications interface 420 via a communications path 440 such as a wire or cable, fibre optics, phone line, cellular phone link, radio frequency or other communications channels.
- the invention is implemented primarily using computer software, in other embodiments the invention may be implemented primarily in hardware using, for example, hardware components such as an application specific integrated circuit (ASICs).
- ASICs application specific integrated circuit
- Implementation of a hardware state machine so as to perform the functions described herein will be apparent to persons skilled in the relevant art.
- the invention may be implemented using a combination of both hardware and software.
- the method provides a convenient means for authenticating a remote service to a user.
- the authentication information used to verify authenticity of the remote service is selected and/or provided by the user which means that the step of the user verifying authenticity of the service becomes intuitive.
- the method may be used to verify authenticity of the remote service to a large number of users, simply by providing each registered user of the service with an address having a unique identifier as part of the registration process.
- Use of one-time usable authentication information, or at least varying the authentication information for consecutive communications received from a user further enhances the level of security provided by the method.
Abstract
A method of authenticating a remote service to a user is disclosed. The method includes receiving a network address having a unique identifier assigned to the user and then using the address to communicate with an authentication service. Authentication information, which enables the user to verify authenticity of the remote service, is then received from the authentication service. The authentication information is obtained by processing the unique identifier. A system for authenticating a remote service to a user is also disclosed.
Description
REMOTE SERVICE AUTHENTICATION METHOD
This international patent application claims priority from Australian provisional patent application no. 2006906601 filed on 27 November 2006, the contents of which are to be taken as incorporated herein by this reference.
FIELD OF THE INVENTION
The present invention relates to authenticating a remote service to a user. The method of the present invention has particular application to authentication of web-based remote services such as on-line banking services, and it will be convenient to hereinafter describe it in this context. It is to be appreciated, however, that the method of the invention is not limited to this application and may be used to authenticate a wide variety of remote services.
BACKGROUND TO THE INVENTION
Conventional authentication methods and devices typically allow authentication of a user to a remote service. Typically, conventional authentication methods entail a remote service authenticating a user simply by requesting a password from the user. However, the user has no way to know whether he or she is really communicating with the desired or correct remote service. Thus, if a remote computer is able to mimic the behaviour of the remote service, the user may be spoofed or "phished" into thinking that he or she is communicating with the correct remote service. As a result, an unsuspecting user may divulge information that they would otherwise only divulge to a legitimate remote service, such as, their user ID and password.
It would be desirable to provide an authentication method that is suitable for at least authenticating a remote service to a user so that the user has some confidence that the remote service is legitimate. The discussion of the background to the invention herein is included to explain the context of the invention. This is not to be taken as an admission that any of the material referred was published, known or part of the common general knowledge as at the priority date of this application.
SUMMARY OF THE INVENTION
According to an aspect of the present invention, there is provided a method of authenticating a remote service to a user, the method including the following steps: receiving a network address having a unique identifier assigned to the user; using the address to communicate with an authentication service; receiving from the authentication service authentication information obtained by processing the unique identifier, the authentication information enabling the user to verify authenticity of the remote service.
The authentication service may be part of the remote service or co- located on a single server with the remote service, or may be physically and logically separate from the remote service.
The network address may be selected from one or more of the following address types: a uniform resource indicator; an email address; or a link address.
It is to be appreciated that the above-listed address types are exemplary only, and other types of address types may also be suitable. For example, in one embodiment, a network address may include an Internet Protocol (IP) address.
In an embodiment, the network address may be assigned or provided to the user by the remote service, or by an authentication service. The unique identifier assigned to the user may include, for example, an account number, an account name, a customer number, a one-time usable passcode, or a combination of a first identifier (such as an account number, an account name, a customer number or the like), which is a fixed identifier associated with the user, and a second identifier, which is a variable identifier, in the form of a one-time usable passcode.
Thus, in one embodiment, the network address includes the combination of a uniform resource indicator (URI), including the web address of the authentication service (which may or may not be part of the remote service), and a one-time useable passcode. Alternatively, the network address
may include the combination of a uniform resource indicator (URI), a first identifier which is a fixed identifier associated with the user (such as an account number) and a second identifier in the form of a one-time useable pass code which is appended or concatenated to the URI and the first identifier to thereby form a one-time usable network address.
In an embodiment, the authentication information includes one or more of the following types: a character sequence; an image file; or an audio file.
It is to be appreciated that the above-listed types are exemplary only, and other types of authentication information may also be suitable.
The user may receive the authentication information by means of an electronic communication, such a web page, SMS message, a voice mail message, or electronic mail.
The authentication information may be generated by the remote service or the authentication service. Alternatively, the authentication information may be selected by the remote service or authentication service based on information provided to the remote service or authentication service by the user.
Preferably, the authentication information transmitted to the user is varied for at least consecutive requests.
More preferably, the authentication information is one-time useable authentication information. In an embodiment, in using the network address to communicate with the authentication service, the authentication service may detect the address type of the network address, or the user may indicate the type. By way of example, the address type may include an "activated" address type or a user entered address type. In this respect, an activated address type may include, for example, a uniform resource indicator which has been "activated" by a user using an input device (such as a mouse, keyboard, trackerball, touch-screen, joystick or the like) to select or enable the address, such as by clicking a mouse pointer over a hyperlink which activates the uniform resource indicator. On the other hand, a user entered address may include, for example, an
address which has been manually entered (such as manually keyed) into the address entry field of a web-browser.
In one embodiment, if the address type is an activated type address, the authentication service rejects the user's communication. In other words, in one embodiment the authentication service will not accept, and thus will not authenticate, a communication which has been initiated by "activating" an address and thus which represents an activated address type.
According to another aspect of the present invention, there is provided a method for generating an authentication response to a communication from a user including a network address having a unique identifier assigned to the user, the method including the following steps: receiving the communication and processing the unique identifier to obtain authentication information based on the unique identifier; communicating the authentication information to the user, the authentication information enabling the user to verify authenticity of the remote service.
According to yet another aspect of the present invention, there is provided a system for generating an authentication response to a communication from a user including a network address having a unique identifier assigned to the user, the system including processor and associated memory device for storing a series of instructions to cause the processor to: receive the communication and process the unique identifier; obtain authentication information based on the unique identifier; communicate the authentication information to the user, the authentication information enabling the user to verify authenticity of the remote service.
According to still another aspect of the present invention, there is provided computer software for use in a system for generating an authentication response to a communication from a user including a network address having a unique identifier assigned to the user, the system including a processor and associated memory device for storing the computer software including a series of instructions to cause the processor to: receive the communication and process the unique identifier; obtain authentication information based on the unique identifier;
communicate the authentication information to the user, the authentication information enabling the user to verify authenticity of the remote service.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will now be described in further detail by reference to the attached drawings illustrating example forms of the invention. It is to be understood that the particularity of the drawings does not supersede the generality of the invention. In the drawings:
Figure 1 is a schematic diagram showing a computer-enabled system for authenticating a remote service to a user in accordance with one or more embodiments of the present invention;
Figure 2 is a flow diagram of a method for authenticating a remote service in accordance with an embodiment of the present invention; and
Figure 3 is a schematic diagram showing various functional elements of the computer-enabled system of Figure 1 in block form.
DETAILED DESCRIPTION OF THE DRAWINGS In the following description, it will be convenient to describe various embodiments of the invention by reference to a typical application wherein the remote service is an e-commerce service, such as an on-line banking service. However, it is envisaged that the proposed method of authenticating a remote service to a user will be applicable to a broad range of remote services, including on-line share trading, electronic messaging services (for example, email), marketing and promotional offers (such as special offer coupons), online retail services and the like.
Referring firstly to Figure 1 , there is shown an example computer enabled system for authenticating a remote service to a user. In a first embodiment, the system 100 includes a client user terminal 1 10 for access by a user 120, in communication with a first server 130 associated with a remote service 140 such as an on-line banking service. Server 130 may be associated with a database 150 for storing authentication information for authenticating the remote service 140 to a user 120. The client user terminal
1 10 and server 130 are interconnected by means of the Internet 160 or any other suitable communications network.
A network address may be assigned to the user 120 by the remote service 140 itself or by another service such as, for example, an independent authentication service 210 that assigns network addresses and unique identifiers for use with different remote services. Independent authentication service 210 may be associated with a second server 170 further associated with a second database 180 for maintaining a record of users 120 and corresponding unique identifiers which are provided to the users by the authentication service 210. In another alternative embodiment, (not shown) the second database 180 may be associated with the first server 130 disposing the need for second server 170. In another embodiment, the authentication service 210 may receive and process the network address having the unique identifier from the user 120 to obtain authentication information and communicate the same to the user 120 to enable the user to verify authenticity of the remote service 140.
Referring now to Figure 2, at step 215, a user 120 associated with client user terminal 1 10 is provided with a network address having a unique identifier which has been assigned to the user 120. The unique identifier may include, for example, an alphabetic, numeric, or alphanumeric identifier.
In the illustrated example, the network address comprises a uniform resource indicator (URI) including the web address of the authentication service 210, which may or may not be part of the remote service 140, and a unique numeric identifier, for example, www.emue.com/12345678. In some embodiments, the unique identifier includes a one-time useable passcode which may comprise the entire unique identifier or a portion of it. For example, in one embodiment the unique identifier may include a number (such as an account or customer number) which is directly associated with user 120 and which is appended to, or concatenated with, the one-time usable passcode. For example, an identifier may include a one-time useable pass code which is appended or concatenated to the URI to thereby form a onetime usable network address. Suitable devices for generating a one-time usable passcode may include, for example, an RSA SecurelD or VASCO token. Another device which is suitable for generating a one-time usable
passcode is described in international patent application PCT/AU2005/001923, the contents of which are taken to be incorporated by this reference.
At step 220, the user 120 uses the network address having the unique identifier to send a communication requesting authentication of the remote service. At step 230, the authentication service 210 receives the communication from the user 120, and processes the unique identifier to obtain authentication information corresponding to the user 120. At step 240, the authentication information is received by the user 120 to enable the user 120 to verify authenticity of the remote service 140. In the illustrated example, the authentication information comprises a numeric verification code, for example, 87463968.
The network address may be a uniform resource indicator (URI) that has been uniquely assigned and provided to the user 120 for authenticating the remote service 140. Thus, in one embodiment the remote service 140 or authentication service 210 assigns a unique URI to each user of the remote service 140. The term "uniquely assigned" is intended to convey that the network address is unique to each user 120 in terms of the remote service 140, and thus may be used to distinguish the user from other users of the same remote service 140. For instance, in a typical application, each user 120 is a registered user of the remote service 120 and thus each registered user is assigned a unique URI.
In an embodiment in which the network address is a URI, the unique identifier may include the entire URI or, alternatively, it may include only a part of the URI such as the host, the port, the path, the query or the fragment, or combinations thereof. Alternatively, the network address could comprise an email address or a link address that has been assigned to the user 120 by the remote service 140 specifically for communicating with the authentication service 210. Of course, it will also be appreciated that other forms of addresses may also be used, such as for example, a telephone number (in the case of PSTN or PLMN communication between the user and the remote service) or an IP address (in the case of data packet based communications between the user and the remote service).
The authentication information may include information that has been previously selected and/or entered by the user 120. For example, the
authentication information may include an image file (such as an image file for a photograph or symbol), a character sequence (such as a quotation or random sequence of letters and/or numbers), or even an audio or sound file (such as an mpeg file, a .wav file or the like) that has been selected or entered by the user 120. This enables the user 120 to enter or select information that is of significance to the user to enable the user to readily authenticate the remote service 140 if the authentication information provided to the user 120 includes information that has been personally selected by or entered by the user 120. Alternatively, the authentication information may be an image file, a character sequence or an audio file that is dynamically generated in response to receipt of the user communication. In this case the authentication service 210 will also inform the user 120 regarding the authentication information and how to verify that information.
To enhance security, it is preferred that different authentication information be communicated to the user 120 at least each time consecutive user communications are received and processed. Thus, where, for example, the authentication information comprises a web-page, a unique web-page will be generated on the client computer 1 10 for consecutive user requests to access the remote service 140. Similarly, where the authentication information comprises an authentication code, a different authentication code will be generated for each of consecutive requests.
Alternatively, the authentication information may include one-time usable authentication information, such as an authentication code that is generated algorithmically by the remote service 140 or authentication service 210 in response to processing the unique identifier.
Referring back to Figure 1 , in an embodiment in which the network address comprises a URI, the authentication information may include, or at least be contained in, a web-page that is communicated to the user 120 after processing the unique identifier. Accordingly, the authentication information is communicated via a bi-directional communication channel to the same device that was used to make the initial communication with the remote service 140. For example, where the client user terminal 1 10 is used to communicate with the remote service 140 via the Internet 160, the remote service 140 may
communicate the authentication information back to the client user computer 1 10 in the form of a web-page. Alternatively, if the network address were to comprise an email address and the user 120 communicated with the remote service 140 via an electronic message or email, the authentication information may be communicated back to the user 120 by email via the Internet 160 or similar communications network.
The web page or email communicated to the user 120 will include one or more features and/or characteristics that are recognizable to the user 120 as verifying authenticity of the remote service 140. For example, the web page or email may include an image file, a symbol, a pattern, a graphic, a sign, an audio file or other object that that has been selected by, or provided to, the remote service 140 or authentication service 210 as corresponding to the unique identifier, and which is recognizable by the user 120 as a valid authentication response. In this respect, "valid authentication response" denotes a response that contains authentication information that the user 120 recognizes as a response which confirms that the remote service 140 is legitimate.
Still referring to Figure 1 , there is shown an alternative embodiment, in which the user 120 communicates with the remote service 140 via the Internet 160 using the client terminal 1 10 using a network address containing a unique identifier. However, in this case, the authentication information is communicated to the user 120 via a second communication channel, such as for example a GSM or similar wireless network 190 to a different device such as, for example, a mobile telephone 200. Accordingly, the authentication information may be transmitted to a mobile telephone associated with the user 120 as a voice message or as a short message service (SMS) message.
The use of the network address to authenticate the remote service 140 may include the user 120 entering the network address into a client computer 1 10 so as to request a web page from a server associated with the remote service 140. Alternatively, use of the network address may include the user 120 activating an address that has been sent to the user 120 in an electronic communication, such as an email message, short message service, multimedia service or the like.
In an embodiment, the user communication further includes information classifying how the network address was entered and/or activated by the user. For example, if the network address was entered by activating a link address contained in an email communicated to the user 120, the request information may classify the activation of that address as an activated address type. On the other hand, if the network address was manually entered into a user communications device (such as a client computer equipped with browsing software), the activation of that network address may be classified as a user entered type. An embodiment of the present invention that provides a capacity to classify the network address as an entered or activated address is expected to provide additional advantages in that it may enable the remote service 140 to deny access to the remote service 140 in the event that the network address was not a user entered type. Denying access in this way is expected to provide additional security benefits to the user 120.
Processing of the unique identifier to obtain corresponding authentication information for the user 120 may entail the responsible service (in other words, the remote service 140 or the authentication service 210) conducting a database lookup to retrieve authentication information associated with the unique identifier, and thus the user 120. This process may involve the remote service 140 communicating the unique identifier to an external authentication service and requesting authentication information from that service. Alternatively, the user 120 may communicate directly with an independent authentication service to verify authenticity of the remote service 140.
The system 100 may be implemented using hardware, software or a combination thereof and may be implemented in one or more computer systems or processing systems. In particular, the functionality of the client user terminal 1 10, as well as the server 130, 170 may be provided by one or more computer systems capable of carrying out the above described functionality.
Referring to Figure 3, the computer system 300 includes one or more processors, such as processor 310. The processor 310 is connected to a communication infrastructure 320. The computer system 300 may include a
display interface 330 that forwards graphics, texts and other data from the communication infrastructure 320 for supply to the display unit 340. The computer system 300 may also include a main memory 350, preferably random access memory, and may also include a secondary memory 360. The secondary memory 360 may include, for example, a hard disk drive, magnetic tape drive, optical disk drive, etc. The removable storage drive 380 reads from and/or writes to a removable storage unit 390 in a well known manner. The removable storage unit 390 represents a floppy disk, magnetic tape, optical disk, etc. As will be appreciated, the removable storage unit 390 includes a computer usable storage medium having stored therein computer software in a form of a series of instructions to cause the processor 310 to carry out desired functionality. In alternative embodiments, the secondary memory 360 may include other similar means for allowing computer programs or instructions to be loaded into the computer system 300. Such means may include, for example, a removable storage unit 400 and interface 410.
The computer system 300 may also include a communications interface 420. Communications interface 420 allow software and data to be transferred between the computer system 300 and external devices. Examples of communication interface 420 may include a modem, a network interface, a communications port, a PCMIA slot and card etc. Software and data transferred via a communications interface 420 are in the form of signals 430 which may be electromagnetic, electronic, optical or other signals capable of being received by the communications interface 420. The signals are provided to communications interface 420 via a communications path 440 such as a wire or cable, fibre optics, phone line, cellular phone link, radio frequency or other communications channels.
Although in the above described embodiments the invention is implemented primarily using computer software, in other embodiments the invention may be implemented primarily in hardware using, for example, hardware components such as an application specific integrated circuit (ASICs). Implementation of a hardware state machine so as to perform the functions described herein will be apparent to persons skilled in the relevant
art. In other embodiments, the invention may be implemented using a combination of both hardware and software.
It is an advantage of the present invention, that the method provides a convenient means for authenticating a remote service to a user. In some embodiments, the authentication information used to verify authenticity of the remote service is selected and/or provided by the user which means that the step of the user verifying authenticity of the service becomes intuitive. Moreover, the method may be used to verify authenticity of the remote service to a large number of users, simply by providing each registered user of the service with an address having a unique identifier as part of the registration process. Use of one-time usable authentication information, or at least varying the authentication information for consecutive communications received from a user, further enhances the level of security provided by the method. In conclusion, it must be appreciated that there may be other various and modifications to the configurations described herein which are also within the scope of the present invention.
Claims
1. A method of authenticating a remote service to a user, the method including the following steps: receiving a network address having a unique identifier assigned to the user; using the address to communicate with an authentication service; and receiving, from the authentication service, authentication information obtained by processing the unique identifier, the authentication information enabling the user to verify authenticity of the remote service.
2. A method according to claim 1 , wherein the network address is selected from one of the following address types: a uniform resource indicator; an email address; and a link address.
3. A method according to claim 1 or 2, wherein the network address is provided to the user by the remote service, or by an authentication service.
4. A method according to any one of claims 1 to 3, wherein the authentication information includes one or more of the following types: a character sequence; an image file; and an audio file.
5. A method according to any one of claims 1 to 4, wherein the user receives the authentication information by means of one of the following: a web page; an SMS message; a voice mail message; and electronic mail.
6. A method according to any one of claims 1 to 5, wherein the authentication information is generated by the remote service.
7. A method according to any one of claims 1 to 5, wherein the authentication information is generated by the authentication service.
8. A method according to any one of claims 1 to 5 wherein the authentication information is provided to the remote service or authentication service by the user.
9. A method according to any one of claims 1 to 8, wherein the authentication information transmitted to the user is varied for at least consecutive requests.
10. A method according to any one of claims 1 to 9, wherein the authentication information is one-time useable authentication information.
1 1. A method according to any one of claims 1 to 10, wherein in using the network address to communicate with the authentication service, the user indicates an address type to the authentication service, the address type being either an activated address type or a user entered address type.
12. A method according to any one of claims 1 to 10, wherein in using the network address to communicate with the authentication service, the authentication service detects address type of the network address, the address type being either an activated address type or a user entered address type.
13. A method according to claim 11 or 12, wherein if the network address is an activated type address, the authentication service rejects the user's communication.
14. A method for generating an authentication response to a communication from a user, the communication including a network address having a unique identifier assigned to the user, the method including the following steps: receiving the communication and processing the unique identifier to obtain authentication information based on the unique identifier; communicating the authentication information to the user, the authentication information enabling the user to verify authenticity of the remote service.
15. A system for generating an authentication response to a communication from a user, the communication including an address having a unique identifier assigned to the user, the system including a processor and associated memory device for storing a series of instructions to cause the processor to: receive the communication and process the unique identifier; obtain authentication information based on the unique identifier; and communicate the authentication information to the user, the authentication information enabling the user to verify authenticity of the remote service.
16. Computer software for use in a system for generating an authentication response to a communication from a user including a network address having a unique identifier assigned to the user, the system including a processor and associated memory device for storing the computer software including a series of instructions to cause the processor to: receive the communication and process the unique identifier; obtain authentication information based on the unique identifier; and communicate the authentication information to the user, the authentication information enabling the user to verify authenticity of the remote service.
17. A method of authenticating a remote service to a user substantially as herein before described with reference to any one of the embodiments shown in the drawings.
18. A system for generating an authentication response to a user communication substantially as herein before described with reference to any one of the embodiments shown in the drawings.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2006906601 | 2006-11-27 | ||
AU2006906601A AU2006906601A0 (en) | 2006-11-27 | Remote service authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008064403A1 true WO2008064403A1 (en) | 2008-06-05 |
Family
ID=39467339
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2007/001813 WO2008064403A1 (en) | 2006-11-27 | 2007-11-27 | Remote service authentication method |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2008064403A1 (en) |
Cited By (104)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7784687B2 (en) | 2007-12-24 | 2010-08-31 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDS, magnetic emulators, magnetic decoders, and other components |
USD643063S1 (en) | 2010-07-09 | 2011-08-09 | Dynamics Inc. | Interactive electronic card with display |
US8066191B1 (en) | 2009-04-06 | 2011-11-29 | Dynamics Inc. | Cards and assemblies with user interfaces |
USD651237S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD651238S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD652075S1 (en) | 2010-07-02 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card |
USD652449S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD652448S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD652867S1 (en) | 2010-07-02 | 2012-01-24 | Dynamics Inc. | Multiple button interactive electronic card |
USD653288S1 (en) | 2010-07-09 | 2012-01-31 | Dynamics Inc. | Multiple button interactive electronic card |
USD665022S1 (en) | 2010-07-09 | 2012-08-07 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD665447S1 (en) | 2010-07-09 | 2012-08-14 | Dynamics Inc. | Multiple button interactive electronic card with light source and display |
USD666241S1 (en) | 2010-07-09 | 2012-08-28 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD670332S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD670331S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD670330S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD670329S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD670759S1 (en) | 2010-07-02 | 2012-11-13 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
US8322623B1 (en) | 2010-07-26 | 2012-12-04 | Dynamics Inc. | Systems and methods for advanced card printing |
USD672389S1 (en) | 2010-07-02 | 2012-12-11 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD673606S1 (en) | 2012-08-27 | 2013-01-01 | Dynamics Inc. | Interactive electronic card with display and buttons |
US8348172B1 (en) | 2010-03-02 | 2013-01-08 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
USD674013S1 (en) | 2010-07-02 | 2013-01-08 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD675256S1 (en) | 2012-08-27 | 2013-01-29 | Dynamics Inc. | Interactive electronic card with display and button |
USD676487S1 (en) | 2012-08-27 | 2013-02-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD676904S1 (en) | 2011-05-12 | 2013-02-26 | Dynamics Inc. | Interactive display card |
US8393546B1 (en) | 2009-10-25 | 2013-03-12 | Dynamics Inc. | Games, prizes, and entertainment for powered cards and devices |
US8393545B1 (en) | 2009-06-23 | 2013-03-12 | Dynamics Inc. | Cards deployed with inactivated products for activation |
WO2013100967A1 (en) | 2011-12-28 | 2013-07-04 | Intel Corporation | Web authentication using client platform root of trust |
US8485446B1 (en) | 2011-03-28 | 2013-07-16 | Dynamics Inc. | Shielded magnetic stripe for magnetic cards and devices |
USD687094S1 (en) | 2010-07-02 | 2013-07-30 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD687095S1 (en) | 2012-08-27 | 2013-07-30 | Dynamics Inc. | Interactive electronic card with buttons |
USD687490S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD687487S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD687489S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD687488S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
US8511574B1 (en) | 2009-08-17 | 2013-08-20 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US8523059B1 (en) | 2009-10-20 | 2013-09-03 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US8561894B1 (en) | 2010-10-20 | 2013-10-22 | Dynamics Inc. | Powered cards and devices designed, programmed, and deployed from a kiosk |
USD692053S1 (en) | 2012-08-27 | 2013-10-22 | Dynamics Inc. | Interactive electronic card with display and button |
US8567679B1 (en) | 2011-01-23 | 2013-10-29 | Dynamics Inc. | Cards and devices with embedded holograms |
US8579203B1 (en) | 2008-12-19 | 2013-11-12 | Dynamics Inc. | Electronic magnetic recorded media emulators in magnetic card devices |
USD694322S1 (en) | 2012-08-27 | 2013-11-26 | Dynamics Inc. | Interactive electronic card with display buttons |
US8602312B2 (en) | 2010-02-16 | 2013-12-10 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
USD695636S1 (en) | 2012-08-27 | 2013-12-17 | Dynamics Inc. | Interactive electronic card with display and buttons |
US8622309B1 (en) | 2009-04-06 | 2014-01-07 | Dynamics Inc. | Payment cards and devices with budgets, parental controls, and virtual accounts |
US8628022B1 (en) | 2011-05-23 | 2014-01-14 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US8727219B1 (en) | 2009-10-12 | 2014-05-20 | Dynamics Inc. | Magnetic stripe track signal having multiple communications channels |
US8827153B1 (en) | 2011-07-18 | 2014-09-09 | Dynamics Inc. | Systems and methods for waveform generation for dynamic magnetic stripe communications devices |
US8888009B1 (en) | 2012-02-14 | 2014-11-18 | Dynamics Inc. | Systems and methods for extended stripe mechanisms for magnetic cards and devices |
US8931703B1 (en) | 2009-03-16 | 2015-01-13 | Dynamics Inc. | Payment cards and devices for displaying barcodes |
US8960545B1 (en) | 2011-11-21 | 2015-02-24 | Dynamics Inc. | Data modification for magnetic cards and devices |
US9010644B1 (en) | 2012-11-30 | 2015-04-21 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US9010647B2 (en) | 2012-10-29 | 2015-04-21 | Dynamics Inc. | Multiple sensor detector systems and detection methods of magnetic cards and devices |
USD729869S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
US9033218B1 (en) | 2012-05-15 | 2015-05-19 | Dynamics Inc. | Cards, devices, systems, methods and dynamic security codes |
USD729870S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
USD729871S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD730439S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with buttons |
USD730438S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with display and button |
US9053398B1 (en) | 2010-08-12 | 2015-06-09 | Dynamics Inc. | Passive detection mechanisms for magnetic cards and devices |
US9064195B2 (en) | 2012-06-29 | 2015-06-23 | Dynamics Inc. | Multiple layer card circuit boards |
USD737373S1 (en) | 2013-09-10 | 2015-08-25 | Dynamics Inc. | Interactive electronic card with contact connector |
USD750168S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and button |
USD750166S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD750167S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD751639S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
USD751640S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
US9306666B1 (en) | 2009-10-08 | 2016-04-05 | Dynamics Inc. | Programming protocols for powered cards and devices |
US9329619B1 (en) | 2009-04-06 | 2016-05-03 | Dynamics Inc. | Cards with power management |
US9413744B2 (en) | 2013-10-25 | 2016-08-09 | Alibaba Group Holding Limited | Method and system for authenticating service |
USD764584S1 (en) | 2013-03-04 | 2016-08-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD765173S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with display and button |
USD765174S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with button |
USD767024S1 (en) | 2013-09-10 | 2016-09-20 | Dynamics Inc. | Interactive electronic card with contact connector |
USD777252S1 (en) | 2013-03-04 | 2017-01-24 | Dynamics Inc. | Interactive electronic card with buttons |
US9619741B1 (en) | 2011-11-21 | 2017-04-11 | Dynamics Inc. | Systems and methods for synchronization mechanisms for magnetic cards and devices |
US9646240B1 (en) | 2010-11-05 | 2017-05-09 | Dynamics Inc. | Locking features for powered cards and devices |
US9659246B1 (en) | 2012-11-05 | 2017-05-23 | Dynamics Inc. | Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices |
USD792512S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
US9710745B1 (en) | 2012-02-09 | 2017-07-18 | Dynamics Inc. | Systems and methods for automated assembly of dynamic magnetic stripe communications devices |
USD792511S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD792513S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
US9734669B1 (en) | 2012-04-02 | 2017-08-15 | Dynamics Inc. | Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality |
US9818125B2 (en) | 2011-02-16 | 2017-11-14 | Dynamics Inc. | Systems and methods for information exchange mechanisms for powered cards and devices |
US9836680B1 (en) | 2011-03-03 | 2017-12-05 | Dynamics Inc. | Systems and methods for advanced communication mechanisms for magnetic cards and devices |
US9916992B2 (en) | 2012-02-20 | 2018-03-13 | Dynamics Inc. | Systems and methods for flexible components for powered cards and devices |
US9961086B2 (en) | 2015-12-18 | 2018-05-01 | Ebay Inc. | Dynamic content authentication for secure merchant-customer communications |
US10022884B1 (en) | 2010-10-15 | 2018-07-17 | Dynamics Inc. | Systems and methods for alignment techniques for magnetic cards and devices |
US10032049B2 (en) | 2016-02-23 | 2018-07-24 | Dynamics Inc. | Magnetic cards and devices for motorized readers |
US10055614B1 (en) | 2010-08-12 | 2018-08-21 | Dynamics Inc. | Systems and methods for advanced detection mechanisms for magnetic cards and devices |
US10062024B1 (en) | 2012-02-03 | 2018-08-28 | Dynamics Inc. | Systems and methods for spike suppression for dynamic magnetic stripe communications devices |
USD828870S1 (en) | 2012-08-27 | 2018-09-18 | Dynamics Inc. | Display card |
US10095970B1 (en) | 2011-01-31 | 2018-10-09 | Dynamics Inc. | Cards including anti-skimming devices |
US10108891B1 (en) | 2014-03-21 | 2018-10-23 | Dynamics Inc. | Exchange coupled amorphous ribbons for electronic stripes |
US10504105B2 (en) | 2010-05-18 | 2019-12-10 | Dynamics Inc. | Systems and methods for cards and devices operable to communicate to touch sensitive displays |
US10693263B1 (en) | 2010-03-16 | 2020-06-23 | Dynamics Inc. | Systems and methods for audio connectors for powered cards and devices |
US10949627B2 (en) | 2012-12-20 | 2021-03-16 | Dynamics Inc. | Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices |
US11100431B2 (en) | 2011-05-10 | 2021-08-24 | Dynamics Inc. | Systems and methods for mobile authorizations |
US11126997B1 (en) | 2012-10-02 | 2021-09-21 | Dynamics Inc. | Cards, devices, systems, and methods for a fulfillment system |
US11409971B1 (en) | 2011-10-23 | 2022-08-09 | Dynamics Inc. | Programming and test modes for powered cards and devices |
US11418483B1 (en) | 2012-04-19 | 2022-08-16 | Dynamics Inc. | Cards, devices, systems, and methods for zone-based network management |
US11551046B1 (en) | 2011-10-19 | 2023-01-10 | Dynamics Inc. | Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices |
US11961147B1 (en) | 2013-04-12 | 2024-04-16 | K. Shane Cupp | Cards, devices, systems, and methods for financial management services |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040187027A1 (en) * | 2003-03-18 | 2004-09-23 | Man Chan | Remote access authorization of local content |
US20060050688A1 (en) * | 2004-09-03 | 2006-03-09 | Zoom Telephonics, Inc. | Method and apparatus for user authentication |
WO2006042480A2 (en) * | 2004-10-22 | 2006-04-27 | Metaswarm (Hongkong) Ltd. | System and method for investigating phishing web sites |
US20060143695A1 (en) * | 2004-12-27 | 2006-06-29 | Amiram Grynberg | Anonymous Spoof resistant authentication and enrollment methods |
WO2006066322A1 (en) * | 2004-12-21 | 2006-06-29 | Emue Holdings Pty Ltd | Authentication device and/or method |
US20060190533A1 (en) * | 2005-02-21 | 2006-08-24 | Marvin Shannon | System and Method for Registered and Authenticated Electronic Messages |
US20060248205A1 (en) * | 2002-10-25 | 2006-11-02 | Randle William M | A Secure Virtual Network Layer and Virtual Network Manager that Establishes a Comprehensive Business Reporting and Security Infrastructure as an Integral Part of the Network |
US20060265508A1 (en) * | 2005-05-02 | 2006-11-23 | Angel Franklin J | System for administering a multiplicity of namespaces containing state information and services |
-
2007
- 2007-11-27 WO PCT/AU2007/001813 patent/WO2008064403A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060248205A1 (en) * | 2002-10-25 | 2006-11-02 | Randle William M | A Secure Virtual Network Layer and Virtual Network Manager that Establishes a Comprehensive Business Reporting and Security Infrastructure as an Integral Part of the Network |
US20040187027A1 (en) * | 2003-03-18 | 2004-09-23 | Man Chan | Remote access authorization of local content |
US20060050688A1 (en) * | 2004-09-03 | 2006-03-09 | Zoom Telephonics, Inc. | Method and apparatus for user authentication |
WO2006042480A2 (en) * | 2004-10-22 | 2006-04-27 | Metaswarm (Hongkong) Ltd. | System and method for investigating phishing web sites |
WO2006066322A1 (en) * | 2004-12-21 | 2006-06-29 | Emue Holdings Pty Ltd | Authentication device and/or method |
US20060143695A1 (en) * | 2004-12-27 | 2006-06-29 | Amiram Grynberg | Anonymous Spoof resistant authentication and enrollment methods |
US20060190533A1 (en) * | 2005-02-21 | 2006-08-24 | Marvin Shannon | System and Method for Registered and Authenticated Electronic Messages |
US20060265508A1 (en) * | 2005-05-02 | 2006-11-23 | Angel Franklin J | System for administering a multiplicity of namespaces containing state information and services |
Cited By (188)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8881989B2 (en) | 2007-12-24 | 2014-11-11 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US9547816B2 (en) | 2007-12-24 | 2017-01-17 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US8011577B2 (en) | 2007-12-24 | 2011-09-06 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US8020775B2 (en) | 2007-12-24 | 2011-09-20 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US10223631B2 (en) | 2007-12-24 | 2019-03-05 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US8074877B2 (en) | 2007-12-24 | 2011-12-13 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US11037045B2 (en) | 2007-12-24 | 2021-06-15 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US9639796B2 (en) | 2007-12-24 | 2017-05-02 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US9684861B2 (en) | 2007-12-24 | 2017-06-20 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic decoders, and other components |
US9697454B2 (en) | 2007-12-24 | 2017-07-04 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US8608083B2 (en) | 2007-12-24 | 2013-12-17 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US9704089B2 (en) | 2007-12-24 | 2017-07-11 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US9704088B2 (en) | 2007-12-24 | 2017-07-11 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US10255545B2 (en) | 2007-12-24 | 2019-04-09 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US9805297B2 (en) | 2007-12-24 | 2017-10-31 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US9010630B2 (en) | 2007-12-24 | 2015-04-21 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US10325199B2 (en) | 2007-12-24 | 2019-06-18 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magentic decoders, and other components |
US10430704B2 (en) | 2007-12-24 | 2019-10-01 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US8286876B2 (en) | 2007-12-24 | 2012-10-16 | Dynamics Inc. | Cards and devices with magnetic emulators and magnetic reader read-head detectors |
US8875999B2 (en) | 2007-12-24 | 2014-11-04 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US11238329B2 (en) | 2007-12-24 | 2022-02-01 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US8517276B2 (en) | 2007-12-24 | 2013-08-27 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US9004368B2 (en) | 2007-12-24 | 2015-04-14 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US8973824B2 (en) | 2007-12-24 | 2015-03-10 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US10032100B2 (en) | 2007-12-24 | 2018-07-24 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US8668143B2 (en) | 2007-12-24 | 2014-03-11 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US11062195B2 (en) | 2007-12-24 | 2021-07-13 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US7784687B2 (en) | 2007-12-24 | 2010-08-31 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDS, magnetic emulators, magnetic decoders, and other components |
US10198687B2 (en) | 2007-12-24 | 2019-02-05 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US10467521B2 (en) | 2007-12-24 | 2019-11-05 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US11494606B2 (en) | 2007-12-24 | 2022-11-08 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US10997489B2 (en) | 2007-12-24 | 2021-05-04 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US8382000B2 (en) | 2007-12-24 | 2013-02-26 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US10095974B1 (en) | 2007-12-24 | 2018-10-09 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US8733638B2 (en) | 2007-12-24 | 2014-05-27 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magentic decoders, and other components |
US8413892B2 (en) | 2007-12-24 | 2013-04-09 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US8424773B2 (en) | 2007-12-24 | 2013-04-23 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US8459548B2 (en) | 2007-12-24 | 2013-06-11 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US10496918B2 (en) | 2007-12-24 | 2019-12-03 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using the same |
US8485437B2 (en) | 2007-12-24 | 2013-07-16 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US10579920B2 (en) | 2007-12-24 | 2020-03-03 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US8579203B1 (en) | 2008-12-19 | 2013-11-12 | Dynamics Inc. | Electronic magnetic recorded media emulators in magnetic card devices |
US8931703B1 (en) | 2009-03-16 | 2015-01-13 | Dynamics Inc. | Payment cards and devices for displaying barcodes |
US8066191B1 (en) | 2009-04-06 | 2011-11-29 | Dynamics Inc. | Cards and assemblies with user interfaces |
US8757499B2 (en) | 2009-04-06 | 2014-06-24 | Dynamics Inc. | Laminated cards with manual input interfaces |
US8622309B1 (en) | 2009-04-06 | 2014-01-07 | Dynamics Inc. | Payment cards and devices with budgets, parental controls, and virtual accounts |
US8590796B1 (en) | 2009-04-06 | 2013-11-26 | Dynamics Inc. | Cards having dynamic magnetic stripe communication devices fabricated from multiple boards |
US9329619B1 (en) | 2009-04-06 | 2016-05-03 | Dynamics Inc. | Cards with power management |
US8282007B1 (en) | 2009-04-06 | 2012-10-09 | Dynamics Inc. | Laminated cards with manual input interfaces |
US10176419B1 (en) | 2009-04-06 | 2019-01-08 | Dynamics Inc. | Cards and assemblies with user interfaces |
US10948964B1 (en) | 2009-04-06 | 2021-03-16 | Dynamics Inc. | Cards with power management |
US9928456B1 (en) | 2009-04-06 | 2018-03-27 | Dynamics Inc. | Cards and assemblies with user interfaces |
US8172148B1 (en) | 2009-04-06 | 2012-05-08 | Dynamics Inc. | Cards and assemblies with user interfaces |
US8393545B1 (en) | 2009-06-23 | 2013-03-12 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US9064255B1 (en) | 2009-06-23 | 2015-06-23 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US8757483B1 (en) | 2009-06-23 | 2014-06-24 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US11144909B1 (en) | 2009-06-23 | 2021-10-12 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US8511574B1 (en) | 2009-08-17 | 2013-08-20 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US9953255B1 (en) | 2009-08-17 | 2018-04-24 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US9852368B1 (en) | 2009-08-17 | 2017-12-26 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US11003970B1 (en) | 2009-08-17 | 2021-05-11 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US9306666B1 (en) | 2009-10-08 | 2016-04-05 | Dynamics Inc. | Programming protocols for powered cards and devices |
US8727219B1 (en) | 2009-10-12 | 2014-05-20 | Dynamics Inc. | Magnetic stripe track signal having multiple communications channels |
US9292843B1 (en) | 2009-10-20 | 2016-03-22 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US8523059B1 (en) | 2009-10-20 | 2013-09-03 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US10181097B1 (en) | 2009-10-20 | 2019-01-15 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US8814050B1 (en) | 2009-10-20 | 2014-08-26 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US8393546B1 (en) | 2009-10-25 | 2013-03-12 | Dynamics Inc. | Games, prizes, and entertainment for powered cards and devices |
US9652436B1 (en) | 2009-10-25 | 2017-05-16 | Dynamics Inc. | Games, prizes, and entertainment for powered cards and devices |
US9373069B2 (en) | 2010-02-16 | 2016-06-21 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
US8602312B2 (en) | 2010-02-16 | 2013-12-10 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
US9875437B2 (en) | 2010-02-16 | 2018-01-23 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
US10482363B1 (en) | 2010-03-02 | 2019-11-19 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US8348172B1 (en) | 2010-03-02 | 2013-01-08 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US8746579B1 (en) | 2010-03-02 | 2014-06-10 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US8573503B1 (en) | 2010-03-02 | 2013-11-05 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US10693263B1 (en) | 2010-03-16 | 2020-06-23 | Dynamics Inc. | Systems and methods for audio connectors for powered cards and devices |
US11120427B2 (en) | 2010-05-18 | 2021-09-14 | Dynamics Inc. | Systems and methods for cards and devices operable to communicate via light pulsing |
US10504105B2 (en) | 2010-05-18 | 2019-12-10 | Dynamics Inc. | Systems and methods for cards and devices operable to communicate to touch sensitive displays |
USD652867S1 (en) | 2010-07-02 | 2012-01-24 | Dynamics Inc. | Multiple button interactive electronic card |
USD687094S1 (en) | 2010-07-02 | 2013-07-30 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD674013S1 (en) | 2010-07-02 | 2013-01-08 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD672389S1 (en) | 2010-07-02 | 2012-12-11 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD670759S1 (en) | 2010-07-02 | 2012-11-13 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD652075S1 (en) | 2010-07-02 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card |
USD652449S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD652448S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD665022S1 (en) | 2010-07-09 | 2012-08-07 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD653288S1 (en) | 2010-07-09 | 2012-01-31 | Dynamics Inc. | Multiple button interactive electronic card |
USD792512S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD792511S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD792513S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD665447S1 (en) | 2010-07-09 | 2012-08-14 | Dynamics Inc. | Multiple button interactive electronic card with light source and display |
USD651238S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD651237S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD643063S1 (en) | 2010-07-09 | 2011-08-09 | Dynamics Inc. | Interactive electronic card with display |
USD666241S1 (en) | 2010-07-09 | 2012-08-28 | Dynamics Inc. | Multiple button interactive electronic card with light source |
US8322623B1 (en) | 2010-07-26 | 2012-12-04 | Dynamics Inc. | Systems and methods for advanced card printing |
US10055614B1 (en) | 2010-08-12 | 2018-08-21 | Dynamics Inc. | Systems and methods for advanced detection mechanisms for magnetic cards and devices |
US9053398B1 (en) | 2010-08-12 | 2015-06-09 | Dynamics Inc. | Passive detection mechanisms for magnetic cards and devices |
US10022884B1 (en) | 2010-10-15 | 2018-07-17 | Dynamics Inc. | Systems and methods for alignment techniques for magnetic cards and devices |
US8561894B1 (en) | 2010-10-20 | 2013-10-22 | Dynamics Inc. | Powered cards and devices designed, programmed, and deployed from a kiosk |
US9646240B1 (en) | 2010-11-05 | 2017-05-09 | Dynamics Inc. | Locking features for powered cards and devices |
US10176423B1 (en) | 2011-01-23 | 2019-01-08 | Dynamics Inc. | Cards and devices with embedded holograms |
US8944333B1 (en) | 2011-01-23 | 2015-02-03 | Dynamics Inc. | Cards and devices with embedded holograms |
US8567679B1 (en) | 2011-01-23 | 2013-10-29 | Dynamics Inc. | Cards and devices with embedded holograms |
US9721201B1 (en) | 2011-01-23 | 2017-08-01 | Dynamics Inc. | Cards and devices with embedded holograms |
US10095970B1 (en) | 2011-01-31 | 2018-10-09 | Dynamics Inc. | Cards including anti-skimming devices |
US9818125B2 (en) | 2011-02-16 | 2017-11-14 | Dynamics Inc. | Systems and methods for information exchange mechanisms for powered cards and devices |
US9836680B1 (en) | 2011-03-03 | 2017-12-05 | Dynamics Inc. | Systems and methods for advanced communication mechanisms for magnetic cards and devices |
US10990867B1 (en) | 2011-03-03 | 2021-04-27 | Dynamics Inc. | Systems and methods for advanced communication mechanisms for magnetic cards and devices |
US8485446B1 (en) | 2011-03-28 | 2013-07-16 | Dynamics Inc. | Shielded magnetic stripe for magnetic cards and devices |
US11100431B2 (en) | 2011-05-10 | 2021-08-24 | Dynamics Inc. | Systems and methods for mobile authorizations |
US11501217B2 (en) | 2011-05-10 | 2022-11-15 | Dynamics Inc. | Systems and methods for a mobile electronic wallet |
USD670329S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD670330S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD676904S1 (en) | 2011-05-12 | 2013-02-26 | Dynamics Inc. | Interactive display card |
USD670332S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD670331S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
US10936926B1 (en) | 2011-05-23 | 2021-03-02 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US9349089B1 (en) | 2011-05-23 | 2016-05-24 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US9881245B1 (en) | 2011-05-23 | 2018-01-30 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US8628022B1 (en) | 2011-05-23 | 2014-01-14 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US8827153B1 (en) | 2011-07-18 | 2014-09-09 | Dynamics Inc. | Systems and methods for waveform generation for dynamic magnetic stripe communications devices |
US11551046B1 (en) | 2011-10-19 | 2023-01-10 | Dynamics Inc. | Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices |
US11409971B1 (en) | 2011-10-23 | 2022-08-09 | Dynamics Inc. | Programming and test modes for powered cards and devices |
US11941469B1 (en) | 2011-11-21 | 2024-03-26 | Dynamics Inc. | Systems and methods for synchronization mechanisms for magnetic cards and devices |
US9619741B1 (en) | 2011-11-21 | 2017-04-11 | Dynamics Inc. | Systems and methods for synchronization mechanisms for magnetic cards and devices |
US10169693B1 (en) | 2011-11-21 | 2019-01-01 | Dynamics Inc. | Data modification for magnetic cards and devices |
US8960545B1 (en) | 2011-11-21 | 2015-02-24 | Dynamics Inc. | Data modification for magnetic cards and devices |
WO2013100967A1 (en) | 2011-12-28 | 2013-07-04 | Intel Corporation | Web authentication using client platform root of trust |
CN104025503B (en) * | 2011-12-28 | 2017-07-28 | 英特尔公司 | Use the webpage certification of client platform root of trust |
CN104025503A (en) * | 2011-12-28 | 2014-09-03 | 英特尔公司 | Web authentication using client platform root of trust |
US9887997B2 (en) | 2011-12-28 | 2018-02-06 | Intel Corporation | Web authentication using client platform root of trust |
EP2798772A4 (en) * | 2011-12-28 | 2015-10-21 | Intel Corp | Web authentication using client platform root of trust |
US10062024B1 (en) | 2012-02-03 | 2018-08-28 | Dynamics Inc. | Systems and methods for spike suppression for dynamic magnetic stripe communications devices |
US9710745B1 (en) | 2012-02-09 | 2017-07-18 | Dynamics Inc. | Systems and methods for automated assembly of dynamic magnetic stripe communications devices |
US8888009B1 (en) | 2012-02-14 | 2014-11-18 | Dynamics Inc. | Systems and methods for extended stripe mechanisms for magnetic cards and devices |
US9916992B2 (en) | 2012-02-20 | 2018-03-13 | Dynamics Inc. | Systems and methods for flexible components for powered cards and devices |
US9734669B1 (en) | 2012-04-02 | 2017-08-15 | Dynamics Inc. | Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality |
US11418483B1 (en) | 2012-04-19 | 2022-08-16 | Dynamics Inc. | Cards, devices, systems, and methods for zone-based network management |
US9033218B1 (en) | 2012-05-15 | 2015-05-19 | Dynamics Inc. | Cards, devices, systems, methods and dynamic security codes |
US10395156B1 (en) | 2012-05-15 | 2019-08-27 | Dynamics Inc. | Cards, devices, systems, methods and dynamic security codes |
US9064195B2 (en) | 2012-06-29 | 2015-06-23 | Dynamics Inc. | Multiple layer card circuit boards |
USD687490S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD694322S1 (en) | 2012-08-27 | 2013-11-26 | Dynamics Inc. | Interactive electronic card with display buttons |
USD729869S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
USD687487S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD828870S1 (en) | 2012-08-27 | 2018-09-18 | Dynamics Inc. | Display card |
USD673606S1 (en) | 2012-08-27 | 2013-01-01 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD729870S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
USD729871S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD695636S1 (en) | 2012-08-27 | 2013-12-17 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD687095S1 (en) | 2012-08-27 | 2013-07-30 | Dynamics Inc. | Interactive electronic card with buttons |
USD730439S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with buttons |
USD675256S1 (en) | 2012-08-27 | 2013-01-29 | Dynamics Inc. | Interactive electronic card with display and button |
USD692053S1 (en) | 2012-08-27 | 2013-10-22 | Dynamics Inc. | Interactive electronic card with display and button |
USD676487S1 (en) | 2012-08-27 | 2013-02-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD730438S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with display and button |
USD687488S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD687489S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
US11126997B1 (en) | 2012-10-02 | 2021-09-21 | Dynamics Inc. | Cards, devices, systems, and methods for a fulfillment system |
US9010647B2 (en) | 2012-10-29 | 2015-04-21 | Dynamics Inc. | Multiple sensor detector systems and detection methods of magnetic cards and devices |
US10922597B1 (en) | 2012-11-05 | 2021-02-16 | Dynamics Inc. | Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices |
US9659246B1 (en) | 2012-11-05 | 2017-05-23 | Dynamics Inc. | Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices |
US11023796B1 (en) | 2012-11-30 | 2021-06-01 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US9010644B1 (en) | 2012-11-30 | 2015-04-21 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US10311349B1 (en) | 2012-11-30 | 2019-06-04 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US9646750B1 (en) | 2012-11-30 | 2017-05-09 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US10949627B2 (en) | 2012-12-20 | 2021-03-16 | Dynamics Inc. | Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices |
USD750168S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and button |
USD765174S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with button |
USD751639S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
USD750167S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD764584S1 (en) | 2013-03-04 | 2016-08-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD777252S1 (en) | 2013-03-04 | 2017-01-24 | Dynamics Inc. | Interactive electronic card with buttons |
USD750166S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD765173S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with display and button |
USD751640S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
US11961147B1 (en) | 2013-04-12 | 2024-04-16 | K. Shane Cupp | Cards, devices, systems, and methods for financial management services |
USD767024S1 (en) | 2013-09-10 | 2016-09-20 | Dynamics Inc. | Interactive electronic card with contact connector |
USD737373S1 (en) | 2013-09-10 | 2015-08-25 | Dynamics Inc. | Interactive electronic card with contact connector |
US9894053B2 (en) * | 2013-10-25 | 2018-02-13 | Alibaba Group Holding Limited | Method and system for authenticating service |
US9413744B2 (en) | 2013-10-25 | 2016-08-09 | Alibaba Group Holding Limited | Method and system for authenticating service |
US10108891B1 (en) | 2014-03-21 | 2018-10-23 | Dynamics Inc. | Exchange coupled amorphous ribbons for electronic stripes |
US11062188B1 (en) | 2014-03-21 | 2021-07-13 | Dynamics Inc | Exchange coupled amorphous ribbons for electronic stripes |
US9961086B2 (en) | 2015-12-18 | 2018-05-01 | Ebay Inc. | Dynamic content authentication for secure merchant-customer communications |
US10032049B2 (en) | 2016-02-23 | 2018-07-24 | Dynamics Inc. | Magnetic cards and devices for motorized readers |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008064403A1 (en) | Remote service authentication method | |
JP5719871B2 (en) | Method and apparatus for preventing phishing attacks | |
US10395246B2 (en) | System and method for verifying identity information using a social networking application | |
US8079069B2 (en) | Cardspace history validator | |
JP4616352B2 (en) | User confirmation apparatus, method and program | |
KR100858144B1 (en) | User authentication method in internet site using mobile and device thereof | |
US20160203312A1 (en) | Methods, systems, and computer program products for recovering a password using user-selected third party authorization | |
US20080141353A1 (en) | Using audio in n-factor authentication | |
US20150154389A1 (en) | System and method for managing application program access to a protected resource residing on a mobile device | |
EP1632877A1 (en) | Authentication of handheld devices for access to applications | |
EP2082558A2 (en) | System and method for authenticating remote server access | |
JP2002215582A (en) | Method and device for authentication | |
JP2007264835A (en) | Authentication method and system | |
JP2012519328A (en) | User confirmation using information such as location display or user identity | |
JP2010518506A (en) | Mixed payment and communication service method and system | |
JP2011100489A (en) | User confirmation device and method, and program | |
US20070028105A1 (en) | Apparatus and method for providing security in computing and communication environments | |
CN106685945B (en) | Service request processing method, service handling number verification method and terminal thereof | |
US20070050371A1 (en) | Interacting with an online database through a variety of communications media | |
KR20140138480A (en) | Apparatus for verifying website and method thereof | |
CN105991619A (en) | Safety authentication method and device | |
JP2002245006A (en) | Authentication system, authentication method, program, and recording medium therefor | |
US20100125738A1 (en) | Systems and methods for transferring information | |
KR100609701B1 (en) | An transaction certification method and system to protect privacy on electronic transaction details | |
EP3151519B1 (en) | An intelligent system of unified content posting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07815614 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07815614 Country of ref document: EP Kind code of ref document: A1 |