The present invention relates generally to user authentication techniques and more particularly, to methods and apparatus for authenticating a user using a question-response procedure.
A number of security issues arise when computers or other resources are accessible by humans. Most computers and computer networks incorporate computer security techniques, such as access control mechanisms, to prevent unauthorized users from accessing remote resources. Human authentication is the process of verifying the identity of a user in a computer system, often as a prerequisite to allowing access to resources in the system. A number of authentication protocols have been proposed or suggested to prevent the unauthorized access of remote resources. In one variation, each user has a password that is presumably known only to the authorized user and to the authenticating host. Before accessing the remote resource, the user must provide the appropriate password, to prove his or her authority.
A simple password mechanism, however, often does not provide sufficient security for a given application, since many users select a password that is easy to remember and therefore easy for an attacker to guess. In order to improve the security of passwords, the number of login attempts is often limited (to prevent an attacker from guessing a password) and users are often required to change their password periodically. Some systems use simple methods such as minimum password length and prohibition of dictionary words to evaluate a user selected password at the time the password is selected, to ensure that the password is not particularly susceptible to being guessed. In addition, many systems encrypt a password before it is transmitted from a user's terminal, to ensure that the password cannot be read when it is transmitted.
One-time, challenge-response passwords have been proposed as a mechanism for further increasing security. Generally, users are assigned a secret key, presumably known only to the user and the remote resource. The secret key may be stored, for example, on a pocket token or a computer-readable card. Upon attempting to access a desired remote resource, a random value, known as a “challenge,” is issued to the user. The user then generates an appropriate “response” to the challenge by encrypting the received challenge with the user's secret key (read from the pocket token or computer-readable card), using a known encryption algorithm, such as the data encryption standard (DES). The user transmits the calculated response to the desired remote resource, and obtains access to the requested resource if the response is accurate. In order to ensure that the pocket token or computer-readable card is being utilized by the associated authorized user, the security may be supplemented by requiring the user to enter a memorized PIN (personal identification number) or password.
In a call center environment, users are often authenticated using traditional query-directed authentication techniques by asking them personal questions, such as their social security number, date of birth or mother's maiden name. The query can be thought of as a hint to “pull” a fact from a user's long term memory. As such, the answer need not be memorized. Although convenient, traditional authentication protocols based on queries are not particularly secure. For example, most authentication systems employing this approach use a limited number of questions that are static and factual. Thus, the answers can generally be anticipated and easily learned by a potential attacker. Furthermore, the information is generally relayed by the user “in the open;” i.e., an attacker overhearing the call or looking over the shoulder of a user entering the information into a web browser can learn the personal information and thereafter obtain unauthorized access. A need therefore exists for an authentication technique that provides the convenience and familiarity of traditional query directed authentication with greater security.
Generally, a method and apparatus are disclosed for authenticating a user using a three party question protocol. The disclosed three party protocol verifies the identity of a user while maintaining the privacy of user information and providing increased security. During an enrollment phase, a user contacts a call center and if the user has not previously enrolled, the user is directed to a user verification server. The user verification server instructs the user to select a number of questions that the user will subsequently use for verification. The user selects questions and the questions including indices (identifiers) of the questions are stored at the user's location, for example, in a computer file or printed on paper. The user verification server also stores the questions that the user has chosen with corresponding question indices. The user verification server sends the question indices to the call center. The call center then sends these indices to the user and instructs the user to return corresponding answers or answer indices for each of the question indices back to the call center. At this stage, the user verification server has a record of the user along with question indices and textual questions that the user has selected. The call center has a list of question indices along with answers or answer indices to each question that the user has selected. The user has the question indices and textual questions that he or she has selected. The user also has knowledge of the answers for each question.
During a verification phase, the user contacts the call center and is first connected to an authentication module that is part of the call center. The authentication module asks the user to provide an asserted identity. The authentication module chooses a random selection of questions for that user. The authentication module provides the selected questions (or indices identifying the questions, for example, in a previously provided codebook) to the user. The user answers each question and returns to the authentication module either the textual answer or an index of that answer. The authentication module compares received answers or answer indices for each question index against stored answers and if the number of correctly matching answers exceeds a threshold, then the user is verified. Otherwise, the user fails verification. After verification, the user is transferred from the authentication module of the call center to a human agent for further processing.
A more complete understanding of the present invention, as well as further features and advantages of the present invention, will be obtained by reference to the following detailed description and drawings.
The present invention recognizes that authentication schemes based on queries are convenient and familiar. According to one aspect of the present invention, an authentication scheme is provided that extends query directed authentication to provide a three party protocol for verifying the identity of a user that maintains the privacy of user information and provides increased security.
The invention consists of independent enrollment and verification parts, shown in
The verification part of the invention is shown in
In a variation of the verification part of the invention, if a user does not have the list of questions corresponding to question indices for the call center 130 because he or she has lost them or for another reason, then the user 110 can obtain these questions again from the user verification server 300 (step 2.5). The user does so by asserting an identity to the user verification server, providing a PIN or password, and stating the call center for which list of questions she needs. Thereupon, the user verification server resends to the user the list of questions and question indices.
For example, as discussed below in conjunction with
It is noted that the questions employed by the user verification server 300 may be opinion questions, trivial facts, or indirect facts as described in our U.S. patent application Ser. No. ______ entitled “Method and Apparatus for Authenticating a User Using Query Directed Passwords” (Attorney Docket Number 502078), filed simultaneously herewith and incorporated by reference herein. Alternatively, the questions can be conventional query directed passwords, such as the user's social security number, date of birth or mother's maiden name. The pool of questions should be large enough that if a question is compromised, it can be easily withdrawn and new questions added.
As shown in
The question index provided to the user 10 during step 640 may be a written list of questions that the user is given, for example, in a codebook, after registering and choosing questions with the user verification server 300. Each question has a number, which is an index to the questions. The question numbers, however, need not be sequential and can be changed regularly and randomly for security sake. Since the numbers are written down, changing the numbers does not inconvenience the user. A codebook contains the questions selected by a given user and the corresponding possible multiple choice answers. The codebook may be embodied in paper or electronic form. The user has the “key” to the codebook, which is knowledge of the answers to the selected questions. In other words, the codebook itself is a form of “what you have” and the answers are a form of “what you know” authentication. Thus, if the codebook is lost, the answers are not evident (in a similar manner to losing a secure token, without losing the PIN). If the codebook is lost, the user will eventually recognize that the codebook is lost and cancel the current password. Following an enrollment process, a given user, James Smith, can be presented with a wallet card containing the user's questions and multiple choice answers. Thereafter, during a verification process, the user is challenged with only the question indices (numbers) of the subset, M, of questions. The user uses the question indices as an index into the wallet card to identify the questions that should be answered for the corresponding question text. The user may respond with either the answer or the index to the answer. In the preferred embodiment, the user determines the appropriate answers to the requested questions and returns only the multiple choice index of the correct answers. Thus, if someone overhears the question numbers included in the challenge or the multiple choice answers included in the response, they will not obtain the text of the question or the text of the answer, respectively.
Thus, the present invention protects the user identity information in multiple ways. First, even over insecure lines, as most telephone calls are today, the personal information can remain private. In addition, only the user will know the text of both the selected questions and correct answers. This protects against a common problem where an insider steals information to impersonate a user. The agents of the call center 130 will only know the indices to the questions and answers but not know the text to the questions, so there is no awkwardness of the user in sharing this information. These indices may change between different call centers, so two call centers cannot collude to apply stolen verification answers of one to another. The User Verification Center only knows the selected questions and question indices for a user as applied to a particular call center, but does not know the user's chosen answers.
In the preferred embodiment, the authentication between the user and the call center is automated via an interactive voice response (IVR) system. The questions are listed by the call center via speech synthesis and the answer indices are returned by the user via keypad entries on the telephone. Elimination of a human operator in the authentication process saves money for performing authentication to the call center. In addition, if the user forgets the questions, interaction between user and User Verification Center is also done automatically (without human assistance). The question indices and questions are read via speech synthesis by User Verification Center to user.
Although this invention is illustrated via the primary applications of call centers and web contact centers, it should be understood that the present invention pertains to any three-party protocol where person A must prove his or her identity to an authenticating entity B, and there is a third-party authentication service entity C that provides added security to the protocol. This is a more general description of the protocol, where person A corresponds to the user 10 in
Note that all interactions in this invention where “call center” is used could equally be well be done not by telephone but by Web interaction.
As is known in the art, the methods and apparatus discussed herein may be distributed as an article of manufacture that itself comprises a computer readable medium having computer readable code means embodied thereon. The computer readable program code means is operable, in conjunction with a computer system, to carry out all or some of the steps to perform the methods or create the apparatuses discussed herein. The computer readable medium may be a recordable medium (e.g., floppy disks, hard drives, compact disks, or memory cards) or may be a transmission medium (e.g., a network comprising fiber-optics, the world-wide web, cables, or a wireless channel using time-division multiple access, code-division multiple access, or other radio-frequency channel). Any medium known or developed that can store information suitable for use with a computer system may be used. The computer-readable code means is any mechanism for allowing a computer to read instructions and data, such as magnetic variations on a magnetic media or height variations on the surface of a compact disk.
The computer systems and servers described herein each contain a memory that will configure associated processors to implement the methods, steps, and functions disclosed herein. The memories could be distributed or local and the processors could be distributed or singular. The memories could be implemented as an electrical, magnetic or optical memory, or any combination of these or other types of storage devices. Moreover, the term “memory” should be construed broadly enough to encompass any information able to be read from or written to an address in the addressable space accessed by an associated processor. With this definition, information on a network is still within a memory because the associated processor can retrieve the information from the network.
It is to be understood that the embodiments and variations shown and described herein are merely illustrative of the principles of this invention and that various modifications may be implemented by those skilled in the art without departing from the scope and spirit of the invention.
The present application is related to U.S. patent application Ser. No. ______ entitled “Method and Apparatus for Authenticating a User Using Query Directed Passwords” (Attorney Docket Number 502078), incorporated by reference herein.