The present invention relates to an authentication system and method. The system and method are particularly relevant, but not limited to a SIM-based account authentication and will be described in such context.
The following discussion of the background to the invention is intended to facilitate an understanding of the present invention only. It should be appreciated that the discussion is not an acknowledgement or admission that any of the material referred to was published, known or part of the common general knowledge of the person skilled in the art in any jurisdiction as at the priority date of the invention.
Passwords or personal identification numbers (PINs) have been used for the authentication of transactions over various communication protocols, in particular financial transactions such as online banking. In recent years, for added security there are two-factor authentication mechanisms and associated procedures.
In general, the uses of PINs or passwords on an entry portal (web-based, POS-terminal-based) is single-factor authentication mechanism and are deemed to be inferior mechanisms compared to two-factor authentication.
Two-factor authentication, however, requires that a user have both “what you know” (PIN or Password) and “what you have” (card or device). Without the second factor, entry portal PIN/password authentication falls prey to human eavesdropping, and to virus key loggers and spyware.
In the case of authentication via generation of a one-time-password sent via a communication protocol such as SMS, this is indeed two-factor authentication with “what you know” (User ID) and “what you have” (mobile device). However, it is error-prone with the user having to type in the one-time password exactly as texted within a predetermined time, otherwise a new password has to be generated.
In addition to the commonly employed SMS based authentication, push-based PIN prompting via USSD (Unstructured Supplementary Service Data) is also a form of two-factor authentication with “what you know” (User ID, password) and “what you have” (mobile device). The use of Unstructured Supplementary Service Data (USSD), a protocol used by GSM cellular telephones to communicate with the service provider's computers, may be used as another way to authenticate. USSD provides another way is used by telecommunications system to provide quick interactive menus to subscribers; e.g., for roaming calls. It can be used to prompt for a PIN or password. However, USSD authentication lacks strong security, relying only on basic GSM encryption, which is now considered insufficient (algorithm A5/1 has been hacked since 2009 to allow eavesdropping in real-time).
There exists a need to improve push-based PIN prompting via USSD to improve the security of the same.
The invention seeks to improve on USSD-based PIN prompting by providing strong security over a plurality of communications channels including (but not limited to) SMS, GSM GPRS, 3G Data, and 802.11b/g/n Wi-Fi.
Throughout the specification, unless the context requires otherwise, the word “comprise” or variations such as “comprises” or “comprising”, will be understood to imply the inclusion of a stated integer or group of integers but not the exclusion of any other integer or group of integers.
Furthermore, throughout the specification, unless the context requires otherwise, the word “include” or variations such as “includes” or “including”, will be understood to imply the inclusion of a stated integer or group of integers but not the exclusion of any other integer or group of integers.
In accordance with a first aspect of the invention there is an authentication system comprising an authentication device, the authentication device comprising a subscriber identity module (SIM), the SIM operable to encrypt data in relation to a transaction for sending over a communication network; the encrypted data comprises information relating to the transaction, a personal identification number (PIN), and a digital signature; and an authentication host operable to receive encrypted data sent over the communication network, the authentication host operable to decrypt the data sent and process the transaction.
Preferably, the authentication host comprises a hardware security module (HSM) operable to decrypt the encrypted data.
Preferably, the HSM is operable to validate the digital signature.
Preferably, the HSM is operable to validate the PIN.
Preferably, the authentication host is operable to receive a transaction request from a merchant.
Preferably, upon receipt of the transaction request, the authentication host is operable to encrypt the transaction request and sends a prompt for identification to the authentication device.
Preferably, the authentication host comprises an account database for verifying the transaction request.
In accordance with a second aspect of the present invention there is provided an authentication device comprising a subscriber identity module (SIM), the SIM operable to encrypt and decrypt data in relation to a transaction for sending over a communication network, the SIM comprising at least two of the following authentication protocol:—Standard GSM or 3G Authentication Keys; GSM 03.48 Bearer Encryption Key; STK-based PIN Prompt; STK-based Transaction Data Prompt; ANSI X9.24 DUKPT 128-bit PIN Encryption Key; ANSI X9.24 DUKPT Plug-in; AES-128 Transaction Data Encryption Key; AES-128 Plug-in; AES-128 CBC-MAC Signature Key; and AES-128 CBC-MAC Plug-in.
Preferably, upon receipt of a request for authentication that includes a personal identification number from a user, the authentication device formats the personal identification number into a standard ISO format and encrypts the PIN using a DUKPT encryption key.
Preferably, the SIM is further operable to generate a transaction number to the PIN, and append the transaction number and PIN.
Preferably, the SIM is operable to timestamp the response to the request for authentication and generate a SIM signature key.
In accordance with a third aspect of the invention there comprises an authentication host operable to receive a transaction request, and encrypt the transaction request to generate a prompt for identification; the authentication host comprises a hardware security module (HSM) for encrypting the prompt for identification; wherein the prompt for identification comprises a data packet comprising a transaction number, time stamp, and a digital signature.
In accordance with a fourth aspect of the invention there comprises an authentication method, the method comprising the steps of:—receiving a transaction request from a source; generating and encrypting a request for identification to be sent to an authentication device; at the authentication device, decrypting the request for identification; prompting the source to enter the identification;
wherein upon receiving the identification, encrypting the identification.
Preferably, the
In accordance with a fifth aspect of the present invention there is provided a Subscriber Identification module (SIM) for use in a mobile device to perform the function of an authentication device in accordance with the first or second aspect.
The present invention will now be described, by way of example only, with reference to the accompanying drawings, in which:
Other arrangements of the invention are possible and, consequently, the accompanying drawings are not to be understood as superseding the generality of the description of the invention.
In accordance with an embodiment of the invention and with reference to
The user device 12 functions as an authentication device 12 comprising a subscriber identity module (SIM), the SIM operable to encrypt/decrypt data in relation to a transaction for sending over a communication network; the encrypted/decrypted data comprises information relating to the transaction and a digital signature. In one embodiment, such data in relation to a transaction may be in the form of a request or prompt for identification.
The authentication device 12 is a mobile phone 12 having a SIM card 20. SIM card 20 comprises means for authentication and is hereinafter used interchangeably with the term ‘Crypto SIM’ 20. The Crypto SIM 20 comprises two or more of the following features:
The authentication device 12 may be either a Feature Phone, or a Smartphone that generates a response to a prompt for identification, such as a prompt for a PIN. Authentication device 12 may comprise a dedicated software application used for transaction (hereinafter referred to as a ‘Transaction Data Prompt app’). The transaction data prompt app may preferably be in its ARM-TrustZone®—protected Trusted Execution Environment for added security.
The host server 16 is a transaction facilitator such as, but not limited to an e-Money Card Host capable of providing services as detailed in Philippines patent number 1-2004-000286 titled “Method and System for Macropayment and Micropayment Using Cellphone-Linked Virtual Card Accounts”. In particular, the services include the processing of transaction requests. The host server 16 is also capable of providing and generating virtual or electronic debit/credit card accounts and electronic wallets linked to respective fund sources so as to facilitate the completion of online transactions.
Host server 16 functions as an authentication host. Authentication host 16 is operable to receive encrypted/decrypted data sent from the authentication device 12, and further operable to decrypt/encrypt the data sent and process the transaction request to generate a prompt for identification to the source of the transaction request.
Host server 16 may be in data communication with an account Database 24. Account database 24 comprises the data associated with subscribers of the host server 16, and may include personal information such as account number and card number. Additionally, host server 16 is in data communication with a Hardware Security Module (HSM) 18 for purpose of authentication. HSM 18 is further operable to encrypt the prompt for identification and decrypt a response to the prompt for identification.
To communicate with the host server 16, data communication between the user device 12 and the host server 16 may be via a communication network 14. The communication network 14 is typically a gateway to the host server 16. The communication network 14 may include GSM SMS, GSM GPRS, 3G Data, Wi-Fi, or other TCP/IP-based networks.
The invention is next described in the context of usage where a customer 30 performs a web-based purchase transaction. It is to be appreciated that for illustration purpose, the authentication device 12 is described separately from the device/interface used for generating a transaction request via, for example, a browser 50.
As shown in
With reference to
It is to be appreciated that the authentication system 10 is be able to handle the case where the customer fails to enter his PIN within a reasonable amount of time of, say, 30 seconds. An example of handling would be to abort the transaction.
To process various requests and replies (non-replies) from the various parties, the host server 16 comprises three algorithms as follows. The algorithms depends on record locks, timers, and the keeping of a status field that tracks the ‘PIN Prompt Display’ transaction as either ‘Pending’, ‘Lapsed’, or ‘Completed’.
It should be appreciated by the person skilled in the art that variations and combinations of features described above, not being alternatives or substitutes, may be combined to form yet further embodiments falling within the intended scope of the invention. In particular:
For the case where the authentication device 12 is integrated with the device (and browser) 50 used for performing the transactions, it is to be appreciated that the security of the transaction is further enhanced. In this case, the Purchase transaction request itself could be encrypted under the SIM's Transaction Data Encryption Key, instead of just under SSL on a laptop. The SIM is then used not just for 2-factor authentication but also for transaction data encryption.
Aside from on-site Point-of-Sale authentication, the other application that could be appreciated is off-site authentication; i.e., authentication of the cardholder far from the Point-of-Sale, or “Remote Purchase” as illustrated in the description.
Number | Date | Country | Kind |
---|---|---|---|
2014011308 | Feb 2014 | SG | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/SG2015/050019 | 2/11/2015 | WO | 00 |