Claims
- 1. A method of establishing a secure channel between a user and a computer application comprising:
rendering to the user a randomly selected identifier; receiving input from the user based on both the randomly selected identifier and a secret identifier associated with the user; determining, based on the input whether the user demonstrates knowledge of the secret identifier; and authenticating or not authenticating the user based upon the outcome of said determining step.
- 2. The method of claim 1, wherein the input represents a difference between the secret identifier and the randomly selected identifier.
- 3. The method of claim 1, wherein the user inputs a sequence of data, the sequence of data indicating the difference between the secret identifier and the randomly selected identifier.
- 4. The method of claim 1, wherein the input represents a series of locations on the randomly selected identifier, the locations indicating the secret identifier.
- 5. The method of claim 1, wherein the randomly selected identifier is used only once.
- 6. The method of claim 1, wherein the randomly selected identifier is rendered as an image generated by a Reverse Turing Test (RTT).
- 7. The method of claim 1, wherein the randomly selected identifier is rendered as an image formatted using various styles.
- 8. A method for authenticating a user with a secure application in an insecure environment comprising the steps of:
generating a PIN that is associated with the user, the PIN being known by both the secure application and the user; requesting an operation such that the secure application renders a randomly generated identifier; sending the randomly generated identifier to a display device, which displays the randomly generated identifier to the user; receiving input in the form of at least one command such that at least one value is attributed to the at least one command, the at least one value having a relationship to the PIN; sending the at least one value to the secure application, wherein the secure application compares the at least one value to the PIN to determine if the at least one value corresponds to the PIN; and if the user input demonstrates knowledge of the PIN authenticating the user; and if the user input does not demonstrate knowledge of the PIN not authenticating the user.
- 9. The method of claim 8, wherein the command represents a relationship between the PIN and the randomly generated identifier.
- 10. The method of claim 8, wherein the command represents clicks in a sequence, the clicks indicating the difference between the PIN and the randomly generated identifier.
- 11. The method of claim 8, wherein the command represents a series of locations on the randomly generated identifier, the locations indicating the PIN.
- 12. The method of claim 8, wherein the randomly generated identifier is used only once.
- 13. A system for establishing a secure channel from a user to an application over which a PIN can be submitted comprising:
a display; a memory for storing information concerning the PIN; a processor configured for executing instructions stored in the memory wherein the memory stores instructions that:
generating a random identifier in response to a request using the PIN; rendering the random identifier to the user; receive information from the user; determine if the information received sufficiently demonstrates knowledge of the PIN.
- 14. The system of claim 13, wherein the information received represents a relationship between the value of the random identifier and the value of the PIN.
- 15. The system of claim 13, wherein the information received represents clicks in a sequence, the clicks indicating the difference between the value of the random identifier and the value of the PIN.
- 16. The system of claim 13, wherein the information represents a series of locations on the random identifier, the locations indicating the value of the PIN.
- 17. The system of claim 13, wherein the image is used only once.
- 18. The system of claim 13, wherein random identifier is rendered as an image generated by a Reverse Turing Test (RTT). 19. The system of claim 13, wherein the random identifier is rendered as an image formatted using various styles.
RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Application No. 60/375,021 entitled “Establishing a Secure Channel with a Human User,” filed Apr. 25, 2002, which is hereby incorporated by reference in its entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60375021 |
Apr 2002 |
US |