This invention relates to security and privacy. More particularly it relates to web based transaction authentication using a flexible quasi out of band authentication architecture.
The increasing sophistication of site specific attacks based on man-in-the-middle (MITM) and man-in-the-browser (MITB) techniques has profound implications for our current authentication techniques. Specifically, the strength of the initial login authentication is increasingly becoming less relevant as these attacks manipulate transactions after the legitimate user has provided the initial credentials to login. In reaction to this trend, leading organizations have begun deploying transaction authentication systems, such as EMV-CAP based token authenticators, or have been using out of band authentication (OOBA) techniques to ensure that the user actually intended the transaction being seen at the back end. However, such approaches are inherently not easy to use and consequently, even when deployed, are generally used only for high risk transactions or occasional events like profile changes. For the vast majority of transactions no current authentication solution provides a reasonable point in the “How easy? How secure? How costly?” trade-off.
In prior work (see the related applications identified above), we described innovations that address some of the problems with conventional authentication systems. Specifically, we introduced the notion of using quasi out of band authentication (QOOBA) techniques to ensure that the user actually intended the transaction being seen at the back end. We also described how these techniques can be used to provide a user with a one time password (OTP) to enable login into a web site (i.e. authentication of the user to the website), based on a secret shared between the web site and a QOOBA security server. Thus these techniques can be used to provide the security of one time passwords, but do not require a per user shared secret which all prior one time password systems have required.
The innovations described herein further extend our prior work to address the issue of providing an authentication solution for the vast majority of transactions at a reasonable point in the “How easy? How secure? How costly?” trade-off.
Accordingly, it is an objective of the present invention is directed to provide an improved authentication architecture capable of handling the vast majority of transactions at a reasonable point in the “How easy? How secure? How costly?” trade-off.
It is another objective of the present invention to provide a quasi out of band authentication architecture for secure and efficient login and transaction authentication that is easily implemented and allows merchants, banks and other website operators flexible control over the level of security.
Additional objects, advantages, novel features of the present invention will become apparent to those skilled in the art from this disclosure, including the following detailed description, as well as by practice of the invention. While the invention is described below with reference to preferred embodiment(s), it should be understood that the invention is not limited thereto. Those of ordinary skill in the art having access to the teachings herein will recognize additional implementations, modifications, and embodiments, as well as other fields of use, which are within the scope of the invention as disclosed and claimed herein and with respect to which the invention could be of significant utility.
First taking a network site perspective, in accordance with aspects of the invention, a network site, such as a merchant or bank website on the Internet, is operable to obtain approval by a user of network transactions, such as product purchases or bank account transfers, at different levels of security, e.g. a high security level, medium high security level and medium security level. For example, a high level of security may be required because of the value of the transaction or the location from which the transaction is being made, such an Internet Café. A medium high level of security may be required for most transaction, and a medium level of security may be required low value transaction made from the user's normal desktop computer.
User approval of the transaction is obtained by the network site selecting, based on a predetermined security level for a transaction, a form in which a transaction will be presented to the user from a group of transaction presentation forms including at least two of (i) a first form of presentation corresponding to presentation of the transaction in a browser pop-up window on a first network device associated with the user, such as the user's desktop executing a browser application like Internet Explorer™ (ii) a second form of presentation corresponding to presentation of the transaction in a security software application window on the first network device, such as the user's desktop executing a security application, and (iii) a third form of presentation corresponding to presentation of the transaction in a security application window on a second network device associated with the user and different than the first network device, such as an Apple IPhone™ or other smart phone, or indeed any mobile communications device, executing a security application. It should be noted that such applications on mobile communication devices are commonly referred to as “apps”.
For example, if it has been determined that a medium level of security applies to the transaction, the first form of presentation may be selected. Whereas, if it has been determined that a medium high level of security applies to the transaction, the second form of presentation may instead be selected. However, if it has been determined that a high level of security applies to the transaction, the third form of presentation may instead be selected.
The network site also selects, based on the predetermined security level for the transaction, a type of approval of the transaction required from the user from a group of transaction approval types including at least two of (i) a first type approval requiring no action by the user after presentation of the transaction, which can be viewed as a passive approval because the user need do nothing after the presentation of the transaction to approve that transaction, and only needs to take action if he or she wishes to deny approval of that transaction, (ii) a second type approval requiring the user to actively approve the presented transaction, for example by using his or her mouse to click on an “Approved” button presented with the transaction, and (iii) a third a third type approval requiring the user to sign the presented transaction, e.g. with an electronic signature. These three types of approval are sometimes characterized as “Inform”, “Consent”, and “Sign”, respectively.
The network site transmits the transaction, the selected transaction presentation form, and the selected type of user transaction approval, to obtain approval of the transaction by the user. Preferably, the transaction, the selected transaction presentation form, and the selected type of user transaction approval, are transmitted to the user via a security server to obtain authorization of a user.
According to other preferred aspects of the invention, if the selected type of user transaction approval is the third type approval, the network site receives, from the user, a personal identification number (PIN) that serves as a signature of the user on the transaction. The network site computes a validation PIN based on a secret shared only by the network site and the security server, and not by the user, and compares the received PIN and the computed PIN. Only if the received PIN and the computed PIN match, is the received PIN accepted by the network site as approval of the transaction by the user.
According to still other preferred aspects of the invention, if the selected type of user transaction approval is the second type approval, the network site receives an indication that the user has approved or denied approval of the presented transaction from the security server.
According to yet other preferred aspects of the invention, the network site also transmits the transaction, i.e. the unapproved transaction, to the user for presentation in a browser window on the first network device, e.g. the user's desktop. It should be understood that the browser window referred to here, and the browser pop-up window referred to above are two separate and distinct types of windows that can commonly be displayed by browser applications. If the network site receives comfort indicia of the user from the security server, the network site also transmits the received comfort indicia and the approved transaction to the user for presentation in the browser window.
According to further aspects of the invention, the above functionality can be implemented in an article of manufacture having processor readable storage medium, with stored logic configured to be readable by a processor and thereby cause the processor to operate so as to perform the functions described above.
Now taking a security server, rather than network site, perspective, in accordance with aspects of the invention a security server operates to present network transactions requiring different levels of security for approval by a user by initially receiving a transaction having a predetermined security level from a network site transacting with the user.
The security server presents the transaction to the user in one of a group of presentation forms including at least two of (i) a first form of presentation corresponding to presentation of the transaction in a browser pop-up window on a network device associated with the user, e.g. the user's desktop computer, (ii) a second form of presentation corresponding to presentation of the transaction in a security software application window on the network device, and (iii) a third form of presentation corresponding to presentation of the transaction in a security application window on another different network device associated with the user, e.g. the user's mobile communication device. The one presentation form corresponds to a predetermined security level for the transaction.
The security server also requests one of a group of transaction approval types including at least two of (i) a first type approval requiring no action by the user after presentation of the transaction, (ii) a second type approval requiring the user to actively approve the presented transaction, and (iii) a third a third type approval requiring the user to sign the presented transaction selecting. The one transaction approval type also corresponds to the predetermined security level for the transaction.
Preferably, the security server receives an identifier of the one transaction presentation form and the one transaction approval type from the network site;
According to other aspects of the invention, if the one transaction approval type is the third type approval, the security server computes a personal identification number (PIN) based on a secret shared only by the network site and the security server, and not by the user, and presents the computed PIN to the user for use as a signature of the user on the transaction.
According to still other aspects of the invention, if the one transaction approval type is the second type approval, the security server receives an identifier of the one transaction presentation form and the one transaction approval type from the network site, It also receives an indication of approval of the presented transaction from the user, and transmits the received indication of approval to the network site.
In accordance with yet other aspects of the invention, the security server receives comfort indicia from the user, and presents the received comfort indicia to the user in the one presentation form, with the transaction.
Here again, according to further aspects of the invention the above functionality relating to the operation of the security server can be implemented in an article of manufacture having processor readable storage medium, with stored logic configured to be readable by a processor and thereby cause the processor to operate so as to perform the functions described above.
General Overview Of QOOBA
In prior work we have described how the introduction of a network based security server, which has an independent channel to a window displayed on a user device, can be used in conjunction with a user's browser, computer software or smart phone or other mobile communications device application, and the web site they are visiting to provide user authentication for login or transaction authorization via one or more user network device.
QOOBA is an innovative approach to create a solution that can be used to authenticate every transaction in a manner that will feel natural to users. The central idea is to create a small secure window, the QOOBA Window, that has an independent encrypted channel to a secure server (the QOOBA Server). The QOOBA Window can be implemented as a zero-download browser pop-up (the QOOBA Pop-up Window), as a small desktop application (the QOOBA Software Window) or as an app on a smart phone (the QOOBA Phone Window). An important aspect to the innovation is that, unlike as with soft tokens, the QOOBA Window does not require secure storage of long term secrets. Rather, it is “activated” during login by using out of band authentication. As a user transacts at a web site, (e.g. a merchant or bank website, that is part of the QOOBA Network, the transactions that the web site believes the user intends are sent securely via the user's browser to the QOOBA Server which displays the transaction in the QOOBA Window. The user is also optionally shown a transaction signature that the user can cut and paste from the QOOBA Window into their browser to authenticate to the website for login or transaction authorization purposes.
Overview Of The Flexible QOOBA Architecture
The QOOBA solution has the following benefits in terms of ease of use, total cost of ownership and, of particular interest here, security.
First, with regard to ease of use, the user has no new device to carry or password to remember, beyond having access to the phone used for out of band authentication. The user does not have to enter any cryptic transaction code into a device and type the result into the browser. Instead, the user sees the entire transaction in their QOOBA Window and can copy and paste the transaction signature with a few clicks.
Second, with regard to total cost of ownership, the QOOBA architecture significantly reduces total lifecycle costs. It requires no new hardware and, unlike a soft token, does not require per user provisioning and management of secrets. Further, as all communications between the web site and the QOOBA server can occur via the browser, the integration requirements at the web site are extremely light. The overall costs of the QOOBA solution are designed to be significantly less than an equivalent soft token deployment, and far less than that of a physical token.
Finally, in terms of security, as will be further discussed below, the level of assurance depends on the form factor of the QOOBA Window that is used. The smartphone based QOOBA Window, i.e. the QOOBA Phone Window, provides the highest assurance, but even the zero download pop-up, i.e. the QOOBA Pop-up Window, significantly raises the bar for an attacker. The software QOOBA window, i.e. the QOOBA Software Window, is likely to be satisfactory for almost all risk levels.
Further, by implementing the QOOBA solution using the flexible architecture described below, the web sites in the QOOBA Network are allowed to request or select the form factor appropriate for the transaction. For instance, a user can simultaneously have a QOOBA Window on their smartphone as well as on their desktop. While most transactions can be sent to their desktop QOOBA Software Window (which is far more convenient), the highest risk transactions can be sent to their smartphone QOOBA Phone Window.
The Flexible QOOBA Architecture
The flexible QOOBA architecture will now be described in greater detail and its security properties analyzed.
The QOOBA Network
Referring now to
As described in more detail in the related applications referenced above, the user activates the QOOBA Window 110, typically by using out of band authentication 165, and establishes a temporary session with the QOOBA Server 125. Websites 150a-c participating in the QOOBA Network go through a onetime set up process to establish a shared secret with the QOOBA Server 125. When the user is at any of the websites 150a-c, he/she can use the QOOBA API 155 to request transaction authentication by sending the encrypted transaction to the QOOBA Server 125 via user's Browser Window 112.
The QOOBA Windows
The QOOBA Server 125 will display the transaction to the user in the QOOBA Window 110, and if requested, also display in the QOOBA Window 110 a transaction signature derived from the transaction, the secret shared between the QOOBA Server 125 and the applicable website 150a, 150b or 150c, and other information. The user is optionally given the choice of accepting or rejecting the transaction. Acceptance can be signaled passively by taking no action, by clicking OK within the QOOBA Window 110, or by copying and pasting the transaction signature from the QOOBA Window 110 into the web application displayed in the Browser Window 112. If the transaction signature from the QOOBA Window 110 is pasted into the web application displayed in the Browser Window 112, the web site can verify the signature using the transaction, the secret shared between the QOOBA Server 125 and the applicable website 150a, 150b or 150c, and other information, as has been described in more detail in the related applications referenced above.
The user interface to the QOOBA Server 125 remains largely constant regardless of the browser and/or operating system (OS) being used and the form factor of the QOOBA Window 110. The only use-case in which the user experience deviates is when the user is browsing on a smartphone, where the QOOBA experience is optimized for the device.
As noted above, the QOOBA Window 110 can be implemented in one of at least three form factors, a browser pop-up, which we commonly refer to as the QOOBA Pop-up Window, does not require any software download, a small application that is installed on the desktop, which we commonly refer to as the QOOBA Software Window, or as a smart phone app, which we commonly refer to as the QOOBA Phone Window.
The same user might well be using different form factors at different times. For instance, a user who has the software QOOBA Window installed, and uses that most of the time, might use the browser pop-up QOOBA Window while at some other desktop (roaming). For certain high risk transactions, the website might require showing the transaction on the smartphone QOOBA Window, while most transactions are shown in the desktop window. The look and feel of the QOOBA Window 110 is entirely customizable by the particular QOOBA Network. An implementation for a bank intended solely for its own websites might look and feel very different from an implementation by a payment service that offers authentication into various eCommerce websites 150a-c. While we are describing numerous elements, it should be understood that most of them are optional.
Unlike a soft token, the QOOBA Window 110 itself does not contain any user secrets. There is provision to personalize it for the user, and perhaps eventually there will be QOOBA Windows with different “skins”. Depending on the form factor, the QOOBA Window 110 can be automatically started for the user at boot up time, or must be manually started by the user clicking on an application icon, e.g. for the software or smartphone versions, or on a bookmark, e.g. for the pop-up version.
An example of this is shown in
The encryption is at two levels. First, all traffic is run over SSL. Second all traffic is also encrypted at the application level using a key derived from the PIN. We also note that other, non-OOBA, forms of authentication can be used at this step; for instance to integrate the QOOBA solution with existing one-time-password (OTP) deployments. The analysis here however assumes that OOBA is used.
As shown in
It should be noted that, as the QOOBA Window 110 and the QOOBA Server 125 will be communicating over SSL, it is highly preferred and hence recommended that EV-SSL certificates be used. Both SSL and EV-SSL certificates are also well known and understood by those skilled in the art.
An example of a QOOBA Window 110 displaying a transaction is depicted in
It should be understood that there are two modes in which the QOOBA Window 110 can operate. A PUSH mode, in which the transaction and PIN are simply pushed to the QOOBA Window 110 without any action from the user, and a PULL mode, in which the user must click on a “get transaction” button (not shown) to retrieve the transaction and PIN. While the former is more convenient for the user, there are some situations where the PULL mode is more apropos.
For instance, in the iPhone implementation of the QOOBA Window 110, the PULL mode is used as smartphone apps, in all except the most recent release of that OS, does not permit multi-tasking.
The QOOBA Server
Turning now to the QOOBA Server 125. The QOOBA Server 125 has two primary functions. The first is to interact with the user and OOBA Service 165 to activate QOOBA Window 110 for the user. The other is to interact with pre-registered web sites 150a-c to receive transactions and display them to the user in the QOOBA Window 110.
The QOOBA Server 125 does not maintain any user information. This means that the QOOBA Server 125 has to be provided the phone number, e.g. the number of the smartphone 175, for the user, either by the user or by performing a look up based on a UserID of the user. The QOOBA Server 125 will then interact with the OOBA service 165 to send the user a QOOBA Server PIN (not shown) that is used to set up a secure session between the QOOBA Server 125 and QOOBA Window 110.
Websites that are part of the QOOBA Network served by the QOOBA Server 125, such as websites 150a-c, must be pre-registered with the QOOBA Server 125. The QOOBA Server shares a secret-key with the server at each of the pre-registered websites 150a-c. While we have not described the use of public key cryptography for key exchange, the QOOBA Network is easily adaptable to make use of such cryptography. The QOOBA Server 125 can be implemented as an on-premise solution or as a service available through our OOBA partner.
The QOOBA API
Participating websites 150a-c execute the QOOBA API 155 to use the QOOBA network. The details of the QOOBA API 155 will be well understood by those skilled in the art from the functional description provided above as well as below, and can be easily implemented using well known and routinely used programming techniques. Accordingly, the details are not described herein because they are unnecessary to those skilled in the relevant area of art and are therefore considered beyond the scope of this document.
The functional steps that the website performs in accordance with the QOOBA API 155 are as follows.
This application is a continuation of application Ser. No. 13/081,150, filed Apr. 6, 2011, which claims priority based on Provisional U.S. Application Ser. No. 61/334,776, filed May 14, 2010. This application is related to issued application Ser. No. 13/081,067, filed Apr. 6, 2011 (now U.S. Pat. No. 8,719,905) and entitled “SECURE AND EFFICIENT LOGIN AND TRANSACTION AUTHENTICATION USING IPHONES™ AND OTHER SMART MOBILE COMMUNICATION DEVICES”, which claims priority based on Provisional U.S. Application Ser. No. 61/327,723, filed Apr. 26, 2010. This application is also related to pending application Ser. No. 12/938,161, filed Nov. 2, 2010 and entitled “A NEW METHOD FOR SECURE SITE AND USER AUTHENTICATION”, which claims priority based on Provisional U.S. Application Ser. No. 61/257,207, filed Nov. 2, 2009 and entitled “Project Seal”. This application is also related to pending application Ser. No. 13/006,806, filed Jan. 14, 2011 and entitled “A NEW METHOD FOR SECURE USER AND SITE AUTHENTICATION”, which is a continuation of pending application Ser. No. 12/938,161. This application is also related to pending application Ser. No. 13/011,587, filed Jan. 21, 2011, and entitled A NEW METHOD FOR SECURE USER AND TRANSACTION AUTHENTICATION AND RISK MANAGEMENT”, which claims priority based on Provisional U.S. Application Ser. No. 61/298,551, filed Jan. 27, 2010 and entitled “Authentication—The Game Changer”. This application is also related to application Ser. No. 13/011,739, filed Jan. 21, 2011, and entitled A NEW METHOD FOR SECURE USER AND TRANSACTION AUTHENTICATION AND RISK MANAGEMENT”, which is a continuation-in-part of pending application Ser. No. 13/011,587. The contents of the above identified applications are hereby incorporated herein in their entirety by reference.
Number | Name | Date | Kind |
---|---|---|---|
8136148 | Chayanam et al. | Mar 2012 | B1 |
20020095507 | Jerdonek | Jul 2002 | A1 |
20030028451 | Ananian | Feb 2003 | A1 |
20040030934 | Mizoguchi et al. | Feb 2004 | A1 |
20040210536 | Gudelj et al. | Oct 2004 | A1 |
20040225878 | Costa-Requana et al. | Nov 2004 | A1 |
20040242238 | Wang et al. | Dec 2004 | A1 |
20050135242 | Larsen et al. | Jun 2005 | A1 |
20050172229 | Reno et al. | Aug 2005 | A1 |
20050254653 | Potashnik et al. | Nov 2005 | A1 |
20060168259 | Spilotro et al. | Jul 2006 | A1 |
20060168663 | Viljoen et al. | Jul 2006 | A1 |
20060235795 | Johnson et al. | Oct 2006 | A1 |
20070011724 | Gonzalez et al. | Jan 2007 | A1 |
20070067828 | Bychkov | Mar 2007 | A1 |
20070074276 | Harrison et al. | Mar 2007 | A1 |
20070079135 | Saito | Apr 2007 | A1 |
20070157304 | Logan et al. | Jul 2007 | A1 |
20070174904 | Park | Jul 2007 | A1 |
20070186095 | Ganesan et al. | Aug 2007 | A1 |
20070198437 | Eisner et al. | Aug 2007 | A1 |
20070279227 | Juels | Dec 2007 | A1 |
20070283273 | Woods | Dec 2007 | A1 |
20080028447 | O'Malley et al. | Jan 2008 | A1 |
20080034216 | Law | Feb 2008 | A1 |
20080052180 | Lawhorn | Feb 2008 | A1 |
20080109657 | Bejaj et al. | May 2008 | A1 |
20080120707 | Ramia | May 2008 | A1 |
20080172730 | Sandhu et al. | Jul 2008 | A1 |
20080254765 | Eliaz | Oct 2008 | A1 |
20090037983 | Chiruvolu et al. | Feb 2009 | A1 |
20090093300 | Lutnick et al. | Apr 2009 | A1 |
20090119754 | Schubert | May 2009 | A1 |
20090119776 | Palnitkar et al. | May 2009 | A1 |
20090119785 | Challener et al. | May 2009 | A1 |
20090132813 | Schibuk | May 2009 | A1 |
20090235339 | Mennes et al. | Sep 2009 | A1 |
20090249076 | Reed et al. | Oct 2009 | A1 |
20090249077 | Gargaro et al. | Oct 2009 | A1 |
20090254572 | Redlich et al. | Oct 2009 | A1 |
20090259588 | Lindsay | Oct 2009 | A1 |
20090259848 | Williams et al. | Oct 2009 | A1 |
20090265768 | Labaton | Oct 2009 | A1 |
20090288159 | Husemann et al. | Nov 2009 | A1 |
20090328168 | Lee | Dec 2009 | A1 |
20100017860 | Ishida | Jan 2010 | A1 |
20100024022 | Wells et al. | Jan 2010 | A1 |
20100041391 | Spivey et al. | Feb 2010 | A1 |
20100235897 | Mason et al. | Sep 2010 | A1 |
20100262834 | Freeman et al. | Oct 2010 | A1 |
20100268831 | Scott et al. | Oct 2010 | A1 |
20110153496 | Royyuru | Jun 2011 | A1 |
20110161989 | Russo et al. | Jun 2011 | A1 |
20110208801 | Thorkelsson et al. | Aug 2011 | A1 |
20120005483 | Patvarczki et al. | Jan 2012 | A1 |
20120124651 | Ganesan et al. | May 2012 | A1 |
Number | Date | Country |
---|---|---|
1 237 108 | Sep 2002 | EP |
11-338933 | Dec 1999 | JP |
2002-259344 | Sep 2002 | JP |
2005-209083 | Aug 2004 | JP |
WO 02091144 | Nov 2002 | WO |
WO 2007107868 | Sep 2007 | WO |
Entry |
---|
Written Opinion mailed Jan. 16, 2014 in connection with Singapore Application No. 201206961-3. |
Gralla, P. How the Internet Works, 2006, Que, pp. 346-347. |
WOT online). Against Intuition Inc., 2006 [retrieved on Aug. 24, 2012). Retrieved from the Internet: URL:web.archive.org/web/20061127233933/http://www.mywot.com/en/wot/help/wot—symbols—explained/, pp. 1-3. |
International Search Report and Written Opinion, PCT/US2012/032840, Jun. 20, 2012. |
PCT International Search Report and Written Opinion issued in International Application No. PCT/US11/22482 on Jan. 26, 2011. |
International Search Report/Written Opinion, PCT/US2011/023525, mailed Apr. 5, 2011. |
International Search Report/Written Opinion, PCT/US2011/022486, mailed Apr. 20, 2011. |
International Search Report/Written Opinion, PCT/US2011/023528, mailed Apr. 27, 2011. |
International Search Report/Written Opinion, PCT/US2011/032295, mailed Jun. 13, 2011. |
International Search Report/Written Opinion, PCT/US2011/032271, mailed Jul. 11, 2011. |
EPO Extended Search Report dated May 26, 2014 in corresponding European Application No. 11780988.9. |
Number | Date | Country | |
---|---|---|---|
20140289132 A1 | Sep 2014 | US |
Number | Date | Country | |
---|---|---|---|
61334776 | May 2010 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13081150 | Apr 2011 | US |
Child | 14282169 | US |