The present invention relates generally to the field of secure access to network systems, and, more specifically, to an authentication token to control system access.
As a result of the ever increasing use of electronic systems for handling sensitive information (e.g., computerized banking, secure networks, etc.), the need to provide adequate security is greater than at any time prior to today. Assuring that access to such systems will be restricted to only those properly authorized is an essential element of today's networks. As a result, several methods of restricting access and verifying user identity have been developed.
One such device that has been used to aid in maintaining security to both public and private networks is a key fob. A key fob is a type of security device or token that has a built-in authentication mechanism. For example, a typical key fob is a small portable device that provides authentication using an authentication code. The key fob generates the authentication code and displays the code to the user via a display located on the key fob. The user can enter the code into the system, which recognizes the access code generated and provides system access. Typically, a key fob is used in conjunction with a password or personal identification number (PIN). This helps to ensure that the authorized user is in possession of the key fob. By requiring both the key fob and the PIN, a two-factor authentication process is created.
Key fob devices are typically stand-alone devices, meaning that the key fob device operates by itself without needing a special reader to retrieve the information. The information is provided via a display located on the key fob itself. However, because key fob devices typically contain a display output, they are typically slightly larger than many individuals prefer to carry. They are typically designed to be attached to a key chain and carried in one's pocket, but because of their size and thickness, they are typically not conducive to carrying in one's wallet.
Another type of device that has been used to provide user authentication in conjunction with network systems is a smart card. Smart cards are plastic devices that typically resemble credit cards. A microchip is typically embedded within the card. Information is stored on the microchip that enables the smart card to be used for authentication purposes. For example, the smart card can interact with a card reader to exchange data (e.g., an encrypted key or other challenge/response process) to provide user authentication. Similar to key fob devices, smart cards may often be used in combination with a PIN to provide an additional layer of security. By requiring a user to enter a PIN, the probability that the card is being used by someone other than the authorized user is reduced.
Smart cards are typically thinner than key fob devices, and thus are more conducive to carrying in one's wallet. Smart cards, however, are not stand alone devices. Smart cards require special readers into which the smart card is inserted in order to perform the authentication process.
Prior to the present invention, a need existed for an authentication device that can operate as a stand-alone device without the form factor limitations of key fob devices. The present invention fulfills this need, among others.
An multi-function token is advantageously provided for user authentication that can function both in a stand-alone mode or in conjunction with a reader.
In an exemplary embodiment, the token comprises a body with a front and rear face, a microchip embedded in the body, an interface to the microchip on the front face of the body, and a display on the front face of said body. An authentication code is optically output via the display.
In an exemplary embodiment, the token is the size of a standard credit card and includes a pseudorandom number generator. The authentication code may be based, all or in part, on the numbers generated by the pseudorandom number generator. Additionally, the token may include one or more magnetic stripes for providing additional functions, such as credit or debit card functions.
Additional objects, advantages, and novel features of the invention will be set forth in part in the description, examples, and figures which follow, all of which are intended to be for illustrative purposes only, and not intended in any way to limit the invention, and in part will become apparent to the skilled in the art on examination of the following, or may be learned by practice of the invention.
For the purpose of illustrating the invention, there is shown in the drawings one exemplary implementation; however, it is understood that this invention is not limited to the precise arrangements and instrumentalities shown.
In the exemplary embodiment of the present invention, an multi-function authentication token is provided. Referring to
A smart card interface pad 20 resides on a front face 12 of body 10. Smart card interface pad 20 provides an interface to an embedded microchip (not shown in
The embedded microchip in body 10 provides a dual purpose. First, the microchip may provide any of the functions currently associated with smart cards. For example, smart cards have been used to provide personal medical information for use at doctor's offices or hospitals, to track transit pass information for subways, trains, and buses, to provide calling card features, etc. Additionally, token 1 may be used to authenticate user identity when used in conjunction with a reader apparatus in the manner typically used by existing smart cards.
In addition to providing smart card functions, the microchip embedded in body 10 is used to operate a pseudorandom number generator. The pseudorandom number generator may be based on various parameters. For example, the pseudorandom number generator may be time-based, transaction-based, environmentally-based, based on information received via wireless RF transmission, or any combination of these. Additional parameters for operating a pseudorandom number generator are known to one of skill in the art and could be incorporated into token 1. The microchip also may be programmed to alter and/or update the pseudorandom number generator. Access to the microchip for programming is provided via interface pad 20. Interface pad 20 is affixed to the token 1 in any area where electrical contact can be made, or alternatively, is located in an area where wireless signals can be received (e.g., interface pad 20 can further include a built-in antenna).
The generated number is displayed on a display 30 located on front face 15 of body 10. Display 30 produces an optical output, e.g., the generated number, that can be read by the card holder. Display 30 is typically a liquid crystal display (LCD) similar to the types currently used in small applications such as calculators and watches. Display 30 is typically powered by a small flexible power source, typically a thin-film Lithium Ion battery, which can be the same power source used to power the embedded microchip or could be an additional secondary power source. In the embodiment illustrated in
Display 30 enables token 1 to be used in a stand-alone mode. Token 1 can output an authentication code via display 30, which can be used as a passcode for login and identification. The authentication code can also be communicated directly via a reader or via wireless transmission. Because the authentication code is generated by token 1 independent from any other device in accordance with a predetermined criteria, it can be used as a passcode without requiring a special reader apparatus. In an exemplary embodiment, the authentication code is generated by the pseudorandom number generator based on information stored in the microchip. Alternatively, the authentication code may be generated by the pseudorandom number generator based on information provided via interface pad 20 or via wireless connection. This process is typically referred to as a challenge/response. The authentication code can be based solely on the received information or can be based on a combination of the received information and information stored on the microchip.
Additionally, in an exemplary embodiment, token 1 includes one or more magnetic strips. Referring to
The exemplary embodiment of the present invention allows for a multi-purpose authentication token to be used to both provide system access as well as to provide smart card and magnetic stripe card functions. A variety of modifications to the embodiment described will be apparent to those skilled in the art from the disclosure provided herein. Thus, the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof and, accordingly, reference should be made to the appended claims, rather than to the foregoing specification, as indicating the scope of the invention.
The present invention claims priority to U.S. Provisional Application No. 60/574,367, filed on May 25, 2004, which is fully incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60574367 | May 2004 | US |