The disclosure below relates to technically inventive, non-routine solutions that are necessarily rooted in computer technology and that produce concrete technical improvements. In particular, the disclosure below relates to techniques for activity authentication using a time-based one-time password or other code.
As recognized herein, online digital transactions and other activities are becoming more and more ubiquitous. But as also recognized herein, these digital transactions are prone to fraud and, at the very least, can lack authorization from whomever is supposed to authorize them. As further recognized herein, if certain digital information is hacked, there is no way of gaining complete control of the information again and the information can then be freely used without authorization across the Internet. There are currently no adequate solutions to the foregoing computer-related, technological problems.
Accordingly, in one aspect a device includes at least one processor and storage accessible to the at least one processor. The storage includes instructions executable by the at least one processor to identify a time-based one-time password (TOTP) associated with a transaction. The instructions are also executable to authenticate the transaction via the TOTP using a public key associated with a first party to the transaction and using one or more of data related to a name of the first party to the transaction, data related to an amount of the transaction, data related to a date of the transaction, and/or data related to an account number associated with the transaction. Based on the authentication, the instructions are then executable to process the transaction.
In various example implementations, the TOTP may be authenticated using a hash of the amount of the transaction, where the hash may be indicated in a Merkle tree accessed by the device. The Merkle tree may be a sparse Merkle tree, for example, and the public key may be identified from the sparse Merkle tree. The TOTP itself may be a six-digit TOTP in various examples.
Also in various example implementations, the TOTP may be authenticated using a first hash of the amount of the transaction as indicated in a first distributed Merkle tree and using a second hash of the amount of the transaction as indicated in a second distributed Merkle tree different from the first distributed Merkle tree.
Additionally, in some examples the transaction may be authenticated using each of the data related to the name of the first party to the transaction, the data related to the amount of the transaction, the data related to the date of the transaction, and the data related to the account number associated with the transaction.
Still further, in certain example implementations the transaction may also be authenticated using data related to a name of a second party to the transaction, where the second party may be different from the first party and where the first and second parties may be on opposing ends of the transaction.
Additionally, if desired the transaction may be authenticated using data related to a number of funds available as indicated via a Merkle tree.
Moreover, in certain example embodiments the TOTP may be a first cryptographic hash of a second cryptographic hash of the name of the first party to the transaction, a third cryptographic hash of the amount of the transaction, a fourth cryptographic of the date of the transaction, and/or a fifth cryptographic hash of the account number associated with the transaction.
In another aspect, a method includes identifying a hash associated with a transaction. The method also includes verifying the transaction via the hash using a key associated with a first party to the transaction and using one or more of data related to a name of the first party to the transaction, data related to an amount of the transaction, data related to a date of the transaction, and/or data related to an account number associated with the transaction. Based on the verification, the method then includes processing the transaction.
In certain examples, the hash may be a time-based one-time password (TOTP). Also in certain examples, the transaction may be verified using each of the data related to the name of the first party to the transaction, the data related to the amount of the transaction, the data related to the date of the transaction, and the data related to the account number associated with the transaction.
If desired, in some implementations the hash may be a first hash and the method may include accessing a sparse Merkle tree to verify the first hash using a second hash of the amount of the transaction as indicated in the sparse Merkle tree. The key may also be identified from the sparse Merkle tree in certain examples.
Still further, in some example embodiments the transaction may be a first transaction, the first transaction may be a current transaction that is the subject of the verification, and the transaction may also be verified using data related to a second transaction that is a past transaction.
Still further, in some examples the transaction may also be verified using data related to an address associated with the first party.
In still another aspect, at least one computer readable storage medium (CRSM) that is not a transitory signal includes instructions executable by at least one processor to identify a hash associated with a transaction. The instructions are also executable to authenticate the transaction via the hash using a key associated with a first party to the transaction and using one or more of data related to a name of the first party to the transaction, data related to an amount of the transaction, data related to a date of the transaction, and/or data related to an account number associated with the transaction. Based on the authentication, the instructions are then executable to process the transaction.
In certain example embodiments, the hash may be a time-based one-time password (TOTP) and the transaction may be authenticated using the TOTP and a sparse hash tree. Also in certain examples, the transaction may be a digital transaction.
The details of present principles, both as to their structure and operation, can best be understood in reference to the accompanying drawings, in which like reference numerals refer to like parts, and in which:
Among other things, the detailed description below relates to use of a one-time digital token such as a TOTP signature to sign checks and online transactions for payment validation and processing using zero-knowledge proof. A sparse Merkle tree with privacy indexes may be used to allow TOTP verification by independent (or interested) services. The transaction may be an e-commerce transaction, electronic funds transfer, cryptocurrency transaction, or other type of transaction.
For placement of funds data and possibly other data into the Merkle tree, zero-knowledge proofs (ZKPs) may be used (e.g., for security and privacy). Thus, data loaded into the Merkle tree can be in the form of ZKPs that allow validation of available funds without giving up specific information of the available funds to unauthorized parties. Example ZKPs that may be used include zk-SNARKS, zk-STARKS, and bulletproofs ZKPS systems.
Prior to delving further into the details of the instant techniques, note with respect to any computer systems discussed herein that a system may include server and client components, connected over a network such that data may be exchanged between the client and server components. The client components may include one or more computing devices including televisions (e.g., smart TVs, Internet-enabled TVs), computers such as desktops, laptops and tablet computers, so-called convertible devices (e.g., having a tablet configuration and laptop configuration), and other mobile devices including smart phones. These client devices may employ, as non-limiting examples, operating systems from Apple Inc. of Cupertino CA, Google Inc. of Mountain View, CA, or Microsoft Corp. of Redmond, WA. A Unix® or similar such as Linux® operating system may be used. These operating systems can execute one or more browsers such as a browser made by Microsoft or Google or Mozilla or another browser program that can access web pages and applications hosted by Internet servers over a network such as the Internet, a local intranet, or a virtual private network.
As used herein, instructions refer to computer-implemented steps for processing information in the system. Instructions can be implemented in software, firmware or hardware, or combinations thereof and include any type of programmed step undertaken by components of the system; hence, illustrative components, blocks, modules, circuits, and steps are sometimes set forth in terms of their functionality.
A processor may be any single- or multi-chip processor that can execute logic by means of various lines such as address lines, data lines, and control lines and registers and shift registers. Moreover, any logical blocks, modules, and circuits described herein can be implemented or performed with a system processor, a digital signal processor (DSP), a field programmable gate array (FPGA) or other programmable logic device such as an application specific integrated circuit (ASIC), discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A processor can also be implemented by a controller or state machine or a combination of computing devices. Thus, the methods herein may be implemented as software instructions executed by a processor, suitably configured application specific integrated circuits (ASIC) or field programmable gate array (FPGA) modules, or any other convenient manner as would be appreciated by those skilled in those art. Where employed, the software instructions may also be embodied in a non-transitory device that is being vended and/or provided that is not a transitory, propagating signal and/or a signal per se (such as a hard disk drive, CD ROM or Flash drive). The software code instructions may also be downloaded over the Internet. Accordingly, it is to be understood that although a software application for undertaking present principles may be vended with a device such as the system 100 described below, such an application may also be downloaded from a server to a device over a network such as the Internet.
Software modules and/or applications described by way of flow charts and/or user interfaces herein can include various sub-routines, procedures, etc. Without limiting the disclosure, logic stated to be executed by a particular module can be redistributed to other software modules and/or combined together in a single module and/or made available in a shareable library. Also, the user interfaces (UI)/graphical UIs described herein may be consolidated and/or expanded, and UI elements may be mixed and matched between UIs.
Logic when implemented in software, can be written in an appropriate language such as but not limited to hypertext markup language (HTML)-5, Java®/JavaScript, C# or C++, and can be stored on or transmitted from a computer-readable storage medium such as a random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), a hard disk drive or solid state drive, compact disk read-only memory (CD-ROM) or other optical disk storage such as digital versatile disc (DVD), magnetic disk storage or other magnetic storage devices including removable thumb drives, etc.
In an example, a processor can access information over its input lines from data storage, such as the computer readable storage medium, and/or the processor can access information wirelessly from an Internet server by activating a wireless transceiver to send and receive data. Data typically is converted from analog signals to digital by circuitry between the antenna and the registers of the processor when being received and from digital to analog when being transmitted. The processor then processes the data through its shift registers to output calculated data on output lines, for presentation of the calculated data on the device.
Components included in one embodiment can be used in other embodiments in any appropriate combination. For example, any of the various components described herein and/or depicted in the Figures may be combined, interchanged or excluded from other embodiments.
“A system having at least one of A, B, and C” (likewise “a system having at least one of A, B, or C” and “a system having at least one of A, B, C”) includes systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.
The term “circuit” or “circuitry” may be used in the summary, description, and/or claims. As is well known in the art, the term “circuitry” includes all levels of available integration, e.g., from discrete logic circuits to the highest level of circuit integration such as VLSI, and includes programmable logic components programmed to perform the functions of an embodiment as well as general-purpose or special-purpose processors programmed with instructions to perform those functions.
Now specifically in reference to
As shown in
In the example of
The core and memory control group 120 include one or more processors 122 (e.g., single core or multi-core, etc.) and a memory controller hub 126 that exchange information via a front side bus (FSB) 124. As described herein, various components of the core and memory control group 120 may be integrated onto a single processor die, for example, to make a chip that supplants the “northbridge” style architecture.
The memory controller hub 126 interfaces with memory 140. For example, the memory controller hub 126 may provide support for DDR SDRAM memory (e.g., DDR, DDR2, DDR3, etc.). In general, the memory 140 is a type of random-access memory (RAM). It is often referred to as “system memory.”
The memory controller hub 126 can further include a low-voltage differential signaling interface (LVDS) 132. The LVDS 132 may be a so-called LVDS Display Interface (LDI) for support of a display device 192 (e.g., a CRT, a flat panel, a projector, a touch-enabled light emitting diode (LED) display or other video display, etc.). A block 138 includes some examples of technologies that may be supported via the LVDS interface 132 (e.g., serial digital video, HDMI/DVI, display port). The memory controller hub 126 also includes one or more PCI-express interfaces (PCI-E) 134, for example, for support of discrete graphics 136. Discrete graphics using a PCI-E interface has become an alternative approach to an accelerated graphics port (AGP). For example, the memory controller hub 126 may include a 16-lane (×16) PCI-E port for an external PCI-E-based graphics card (including, e.g., one of more GPUs). An example system may include AGP or PCI-E for support of graphics.
In examples in which it is used, the I/O hub controller 150 can include a variety of interfaces. The example of
The interfaces of the I/O hub controller 150 may provide for communication with various devices, networks, etc. For example, where used, the SATA interface 151 provides for reading, writing or reading and writing information on one or more drives 180 such as HDDs, SDDs or a combination thereof, but in any case the drives 180 are understood to be, e.g., tangible computer readable storage mediums that are not transitory, propagating signals. The I/O hub controller 150 may also include an advanced host controller interface (AHCI) to support one or more drives 180. The PCI-E interface 152 allows for wireless connections 182 to devices, networks, etc. The USB interface 153 provides for input devices 184 such as keyboards (KB), mice and various other devices (e.g., cameras, phones, storage, media players, etc.).
In the example of
The system 100, upon power on, may be configured to execute boot code 190 for the BIOS 168, as stored within the SPI Flash 166, and thereafter processes data under the control of one or more operating systems and application software (e.g., stored in system memory 140). An operating system may be stored in any of a variety of locations and accessed, for example, according to instructions of the BIOS 168.
Additionally, though not shown for simplicity, in some embodiments the system 100 may include a gyroscope that senses and/or measures the orientation of the system 100 and provides related input to the processor 122, as well as an accelerometer that senses acceleration and/or movement of the system 100 and provides related input to the processor 122. Still further, the system 100 may include an audio receiver/microphone that provides input from the microphone to the processor 122 based on audio that is detected, such as via a user providing audible input to the microphone. The system 100 may also include a camera that gathers one or more images and provides the images and related input to the processor 122. The camera may be a thermal imaging camera, an infrared (IR) camera, a digital camera such as a webcam, a three-dimensional (3D) camera, and/or a camera otherwise integrated into the system 100 and controllable by the processor 122 to gather still images and/or video. Also, the system 100 may include a global positioning system (GPS) transceiver that is configured to communicate with at least one satellite to receive/identify geographic position information and provide the geographic position information to the processor 122. However, it is to be understood that another suitable position receiver other than a GPS receiver may be used in accordance with present principles to determine the location of the system 100.
It is to be understood that an example client device or other machine/computer may include fewer or more features than shown on the system 100 of
Turning now to
Now in reference to
As shown in
Accordingly, a banking/transaction application executing at Steve Rodriguez's client device, and/or a remotely-located server operated by an entity that controls Steve's account into which the funds are being transferred, may autonomously authenticate the transaction using the TOTP/code 406 and then present a GUI like the GUI 500 of
Still in reference to
Accordingly, reference will now be made to
Before moving on to
Now in reference to
As shown in
Once the TOTP has been generated responsive to selection of the selector 606, the GUI 600 may dynamically update to present the generated code via indication 608 so that the end-user may then write the code on a physical check, attach it to the electronic transaction via selector 612, or enter it elsewhere electronically for an electronic funds transfer. The indication 608 may even be accompanied by an indication 610 of an amount of time or time frame during which the generated code remains valid, which in the present example is two weeks.
Note here that should the user then go back and change data entered into one or more of the fields 602, 604 (or any other fields that may be presented), the user would then have to select the selector 606 again to generate a new code that is derived from whatever data is currently entered into the fields 602, 604, etc. This is due to the TOTP being a hash of the transaction details themselves as will be described in more detail below, and so by changing or adding to the transaction details the hash would change according to the current transaction details.
Before describing
Thus, an authenticated mobile application executing at the payor's client device may be used to calculate the digital token value (e.g., 6-digit TOTP). The token may thus be used in combination with private and public keys installed on the payor's client device (e.g., via the mobile application during a registration process) for transaction verification.
Cryptographic methods may therefore be used to generate the TOTP, where the TOTP may be calculated as follows in certain example embodiments: TOTP (Hashing function (attributes, ECDH (mobile_private_key, system_public_key))). The hash function that is used may be SHA-1 or another suitable hash function, including other algorithms from the SHA family or even another algorithm such as MD5, BLAKE, etc. If the resulting hash value is larger than the desired number of digits, the hash value may then be truncated using a compression function into a six-digit TOTP (or TOTP of another desired number of digits). And also note here for completeness that ECDH stands for elliptic-curve Diffie-Hellman (ECDH), a key agreement protocol that may be used consistent with present principles.
Then, to verify the payment on the other end of the transaction, the payee's own mobile application and/or payee's financial institution may calculate the symmetric function as follows: TOTP (Hashing function (attributes, ECDH (mobile_public_key, system_private_key))).
Additionally, note that in some examples a distributed verification system may be used to further ensure data integrity and robust TOTP verification. Accordingly, to ensure a distributed nature of the calculations, two or more distributed sparse Merkle trees stored at different client devices and/or servers may be used, where the TOTP is verified using each distributed Merkle tree. Notwithstanding, in other examples a centralized Merkle tree may also be used for a desired implementation. In either case, the Merkle tree(s) may store the public key of the payor along with the hashes of the attributes themselves (referred to as privacy indices below), thereby allowing any payment processor to locate the record(s) and verify the payor's TOTP/signature through zero-knowledge proof.
Thus, note here that the privacy indices can be hashes of respective payment attributes such as current transaction/payment amount, current transaction date, account number from which the current payment is being made, expiration date if the account number is a credit or debit card number for which a credit/debit card expiration date has been established, amount of funds currently available in the relevant account, first name and family name/surname of the payor, first name and family name/surname of the payee on the opposing end of the transaction, address of the payor (e.g., mailing address or business address), and other attributes as described herein. For even greater digital security, each/all of the foregoing from the preceding sentence may be used for TOTP generation and verification in certain specific example implementations.
Also for even greater digital security, another example privacy index that can be included in the Merkle tree(s) may be one or more hashes of respective amounts of one or more respective past transactions between the same two parties (and/or past transactions to which the payor themselves was a party at least). Additionally or alternatively, a single hash of all transactions between the two (or more) parties may be included in the Merkle tree(s) for enhanced digital security.
Moreover, the Merkle tree(s) may be periodically signed by the payor's financial institution or a third party verification service maintaining the Merkle tree(s) (such as once every day) to help ensure integrity, immutability and authenticity of the hashes/records that the tree(s) store, with the individual records being digitally signed by the payor's financial institution. The appropriate entity itself may be granted the ability to validate/sign the data in the Merkle tree(s) via the payor registering their client device or even financial account with the entity maintaining the Merkle tree(s) so that the information can be uploaded directly from the payor's client device and/or from the payor financial institution's own device/server. For example, the payor's client device or financial institution computer may upload hashes of previous transactions and other information to the Merkle tree(s). Furthermore, to validate that funds are actually available for the transaction being performed, the payor financial institution's computer/server may also update the Merkel tree(s) after each past completed transaction with a current account balance for the payee's institution to then validate whether the requisite funds actually currently exist in the payor's account to complete the current payment (e.g., the payor financial institution's computer may upload a hash of the current account balance of the payor's checking account or credit card available credit limit for verification via the TOTP to demonstrate that the payor actually has the requisite funds available to complete the transaction).
With the foregoing in mind, reference is now made specifically to
In any case, beginning at block 700, the device may identify a digital or other transaction, such as based on user input from a payor to perform the transaction. The logic may then proceed to block 702 where the device may generate a TOTP, such as a six-digit TOTP in particular as this has been found to be a manageable number of digits that strikes a balance between a TOTP short enough for ease of use by the average person and still being robust enough to establish a reliable mode of verification. However, a TOTP of another number of digits may also be used as appropriate. And again note that the TOTP may be generated from hashes of the various attributes of the transaction, including but not limited to payment amount, payor address, payor name, etc.
From block 702 the logic may then proceed to block 704 where the device may also upload the hashes of the various attributes to one or more hash trees such as one or more distributed sparse Merkle trees so that the payee's mobile device/financial institution can eventually authenticate/verify the TOTP itself. Then at block 706 the device executing the logic of
Moving on to
Beginning at block 800, the device may identify the transaction and TOTP. For example, if the transaction is fully digital the device may receive a message, funds transfer ledger, etc. indicating the transaction being made. Otherwise, the device may identify the transaction and TOTP by, for example, executing optical character recognition (OCR) on a photograph of the check being cashed (or other tangible instrument being used as method of payment, such as a money order), where the photograph itself may have been taken by the payee end-user using their client device's camera and mobile application executing at their client device.
From block 800 the logic may then proceed to block 802 where the device may authenticate/verify the transaction via the TOTP itself using the public key of the payor/payor's client device or mobile application and also using the hashes from the Merkle tree(s) of the payor. The storage location and/or identity of the Merkle tree(s) may be indicated in the transaction details provided with the transaction, and/or may be looked up by name of the payor or other payor details. The logic may then proceed to block 804 where, assuming successful authentication/validation, the device may process or complete the transaction. Part of processing the transaction may include the payee's financial institution not just processing the payment itself but also electronically notifying the payor's financial institution that the corresponding funds are no longer available for other transactions by the payor since the current transaction is being processed by the payee's institution. In response, this may cause the payor financial institution's device to provide an updated hash to the relevant Merkle tree(s) of the current account balance after the current transaction amount has been deducted from the payor's account (or added to the payor's account, if the account was for a credit card for example).
Also note for completeness that if the authentication were not successful, at block 804 the device may decline to process or complete the transaction and may also transmit an electronic message to one or both of the payor and payee's financial institutions notifying them that the transaction was not authenticated, which may then be used by the institution(s) for further investigation to determine if fraudulent activity has occurred.
Continuing the detailed description in reference to
The settings GUI 900 may be presented to set or enable one or more settings of the device or transaction system to operate consistent with present principles. It may be reached by navigating an app menu or a settings menu of the mobile application that is being used consistent with present principles. Also note that in the example shown, each option discussed below may be selected by directing touch or cursor input to the respective check box adjacent to the respective option.
Accordingly, as shown in
The GUI 900 may further include an option 904 that may be selected to set or enable the device to specifically use a hash of a current account balance or amount of funds available for the TOTP and also for upload to a Merkle tree(s) (possibly along with upload timestamp) for a payee device to then verify that the funds for the transaction are actually available as described herein. Also if desired, the GUI 900 may include one or more respective additional options 906 that may be selectable to select other respective attributes that may be used to generate a TOTP consistent with present principles. Thus, any attribute discussed herein may be listed as a respective option 906, though only payor address and payor name are actually shown on the face of
Still further, in some examples the GUI 900 may also include a setting 908 at which a desired number of digits that are to be used for the TOTPs may be established. In the present example, a user has directed numerical input to input box 910 to establish the number of digits as six.
Additionally, the GUI 900 may also include a setting 912 at which a desired length of time that the TOTP remains valid may be established. In the present example, the user has directed numerical input to input box 914 to establish the length of time as fourteen days, though another increment of time may also be used for establishing the length of time.
It may now be appreciated that present principles provide for an improved computer-based user interface that increases the functionality and ease of use of the devices disclosed herein while also improving digital security for transactions using time-limited TOTPs. The disclosed concepts are rooted in computer technology for computers to carry out their functions.
It is to be understood that whilst present principals have been described with reference to some example embodiments, these are not intended to be limiting, and that various alternative arrangements may be used to implement the subject matter claimed herein. Components included in one embodiment can be used in other embodiments in any appropriate combination. For example, any of the various components described herein and/or depicted in the Figures may be combined, interchanged or excluded from other embodiments.