The present invention relates generally to authentication or verification of a person's identity for security purposes, and more particularly to a method for on-screen authentication using a secret visual message.
An authentication factor is used to authenticate or verify a person's identity for security purposes. Two-factor authentication uses two different factors to authenticate the person. Using two factors as opposed to one delivers a higher level of authentication assurance. Using more than one factor is referred to as strong authentication.
Currently, two-factor authentication can be achieved in several ways:
However, two-factor authentication a not pervasive because of cost effectiveness. Adding the second authentication factor increases implementation and maintenance costs. Most two-factor authentication systems are proprietary and currently charge an annual fee of $50 to $100 (USD) per user. In addition, hardware token deployment is logistically challenging, hardware tokens may get damaged or lost, and hardware token issuance in large industries such as banking or even within large enterprises needs to be managed. Moreover, end users with SMS token devices also face several problems such as when a token device is forgotten, misplaced, damaged, lost or the like. Another operational limitation with SMS messaging arises when a user might not be able to receive a SMS messages overseas.
Therefore, there is a need to manage two-factor authentication that is convenient to use, requires relative low operational cost, secure to phishing site attacks and the like.
An aspect of the invention is a method of authenticating a user, comprising: providing a user key to an authentication authority; providing a transmission message from the authentication authority in response to the user key; providing a secret message using the transmission message; displaying the secret message to the user using a display screen; and providing a user response to the authentication authority in response to the user observing the secret message.
The secret message can be a pseudo-random alphanumeric code and can be part of an (m,n)-threshold secret sharing scheme, wherein m is the number of parts required to recover a secret and n is the total number parts.
The display screen can be a flat-panel display screen, an LCD screen and/or a mobile phone screen.
The user response can be the secret message.
The authentication authority can provide the user key to the user. In addition, the authentication authority can provide the transmission message to the user using the Internet, and the user can provide the user response to the authentication authority using the Internet.
The method can be a two-factor authentication scheme, wherein the user key is the first factor and the user response is the second factor.
An aspect of the invention is a method of authenticating a user, comprising providing a visual overlay from an authentication authority; providing a user key to the authentication authority; providing a background message from the authentication authority in response to the user key; displaying the background message on a display screen while the visual overlay is positioned over, aligned with and attached to the display screen; displaying a secret message to the user using the visual overlay and the background message; and providing a user response to the authentication authority in response to the user observing the secret message.
The visual overlay can include a visual matrix pattern such as a pseudo-random visual matrix pattern. The visual overlay can also include a transparent medium, wherein the visual matrix pattern is non-transparent and the visual matrix pattern is printed on the transparent medium. The authentication authority can print the visual matrix pattern on the transparent medium, or alternatively, the user can print the visual matrix pattern on the transparent medium.
The visual overlay can allow the user to observe a first selected portion of the display screen without allowing the user to observe a second selected portion of the display screen. In addition, the first selected portion of the display screen can display the secret message within the background message, the first selected portion of the display screen can be a window within the second selected portion of the display screen, the visual overlay can allow the user to observe a third selected portion of the display screen, and the user can enter the user response into the third selected portion of the display screen.
The visual overlay can be a part of an (m,n)-threshold secret sharing scheme, wherein m is the number of parts required to recover a secret and n is the total number parts. In addition, the visual overlay can have substantially the same size as the display screen.
The user response can be the secret message.
The authentication authority can provide the user key to the user and provide the visual overlay to the user in response to the user key from the user. In addition, the authentication authority can provide the background message to the user using the Internet, and the user can provide the user response to the authentication authority using the Internet.
The method can be a two-factor authentication scheme, wherein the user key is the first factor and the user response is the second factor.
An aspect of the invention is method of authenticating a user, comprising providing a user key from an authentication authority to the user; then providing the user key from the user to the authentication authority a first time; providing a visual overlay from the authentication authority to the user in response to the user key provided the first time; then providing the user key from the user to the authentication authority a second time; providing a background message from the authentication authority to the user in response to the user key provided the second time; displaying the background message on a display screen facing the user while the visual overlay is positioned over, aligned with and attached to the display screen; displaying a secret message to the user using the visual overlay and the background message; and then providing a user response from the user to the authentication authority in response to the user observing the secret message.
The encoded message can be displayed on the display screen and prompt the user to decode the encoded message, and the encoded message can be decoded in response to the user.
The secret message can be a part of an (m,n)-threshold secret sharing scheme, wherein m is the number of parts required to recover a secret and n is the total number parts.
The user response can be the secret message.
The authentication authority can provide the user key to the user. In addition, the authentication authority can provide the encoded message to the user using the Internet, and the user can provide the user response to the authentication authority using the Internet.
The method can be a two-factor authentication scheme, wherein the user key is the first factor and the user response is the second factor.
An aspect of the invention is a method of authenticating a user, comprising providing a user key to the authentication authority; encoding a secret message at the authentication authority in response to the user key, thereby providing an encoded message; providing the encoded message from the authentication authority in response to the user key; decoding the encoded message, thereby providing the secret message; displaying the secret message on a display screen to the user in response to decoding the encoded message; and providing a user response to the authentication authority in response to the user observing the secret message on the display screen.
An aspect of the invention is a method of authenticating a user, comprising providing a user key from an authentication authority to the user; then providing the user key from the user to the authentication authority; encoding a secret message at the authentication authority in response to the user key, thereby providing an encoded message; providing the encoded message from the authentication authority to the user in response to the user key from the user; displaying the encoded message on a display screen, thereby prompting the user to decode the encoded message; decoding the encoded message in response to the user observing the encoded message on the display screen, thereby providing the secret message; displaying the secret message on a display screen in response to decoding the encoded message; and providing a user response from the user to the authentication authority in response to the user observing the secret message on the display screen.
An aspect of the invention is a method of authenticating a user, comprising providing a user key to an authentication authority; providing a transmission message from the authentication authority in response to the user key; providing a secret message using the transmission message; displaying the secret message to the user using a display screen; and providing a user response to the authentication authority in response to the user observing the encrypted secret message by using a mobile phone with the decryption key.
An aspect of the invention is a method of authenticating a user, comprising providing a private key from an authentication authority; providing a user key to the authentication authority; providing a background message from the authentication authority in response to the user key; displaying the background message on a display screen while the mobile phone with the user private key is used to capture the background message on the display screen; displaying a secret message to the user using the mobile phone containing the private key and the background message; and providing a user response to the authentication authority in response to the user observing the secret message.
An aspect of the invention is a method of authenticating a user, comprising providing a user key from an authentication authority to the user; then providing the user key from the user to the authentication authority a first time; providing a private key from the authentication authority to the user in response to the user key provided the first time; then providing the user key from the user to the authentication authority a second time; providing a background message from the authentication authority to the user in response to the user key provided the second time; displaying the background message on a display screen facing the user while the mobile phone is positioned over, aligned with and capture the barcode on the display screen; displaying a secret message to the user using the mobile phone; and then providing a user response from the user to the authentication authority in response to the user observing the secret message.
In order that embodiments of the invention may be fully and more clearly understood by way of non-limitative examples, the following description is taken in conjunction with the accompanying drawings in which like reference numerals designate similar or corresponding elements, regions and portions, and in which:
Embodiments of the invention propose a method and system that are cost effective and easy to manage two-factor authentication using the enclosed on-screen authentication methods where the “token” is essentially a pseudo-random visual matrix pattern printed on normal transparency paper using normal printing devices.
Secret sharing scheme is a well researched area in cryptography proposed by Naor, M. and Shamir, A., “Visual cryptography”, In: LNCS, vol. 950, Springer-Verlag. pp. 1-12, incorporated herein by reference. The motivation for secret sharing is secure key management. In some situations, there is usually one secret key that provides access to many important files. If such a key is lost (e.g., the person who knows the key becomes unavailable, or the computer which stores the key is destroyed), then all the important files become inaccessible. The basic idea in secret sharing is to divide the secret key into pieces and distribute the pieces to different persons so that certain subsets of the persons can get together to recover the key.
The general model for secret sharing is called an m-out-of-n scheme (or (m, n)-threshold scheme) for integers 1, m, and n. In the scheme, there is a sender (or dealer) and n participants. The sender divides the secret into n parts and gives each participant one part so that any m parts can be put together to recover the secret, but any m−1 parts reveal no information about the secret. The pieces are usually called shares or shadows. Different choices for the values of m and n reflect the tradeoff between security and reliability. A secret sharing scheme is perfect if any group of at most m−1 participant (insiders) has no advantage in guessing the secret over the outsiders. Therefore in a single party authentication mode, it is a (2, 2)-threshold scheme. In practice, the hidden secret could be any colored image which contains any graphics or characters from any language. This secret will be required as a second factor authentication during user login.
With the reduction of cost in flat-screen display devices like LCD, Plasma TV, flat-screen CRT, and even mobile devices, it is becoming more pervasive items.
Embodiments of the invention may include different schemes for effective and secured T-FA, for example by visual codes overlay, mobile token authentication, or the like.
In an embodiment, the proposed scheme by visual codes overlay can be described in main phases: 1) registration and key distribution to users, 2) online user login and 3) password reset.
For phase 1 as shown in
For phase 2, as shown in system 10 of
For Phase 3, as shown in
Due to the variants of display devices at the user's end, it may be difficult for end-user to align and overlay lens against the display screen to correctly display the secret message during authentication. To tackle this, an embodiment of the invention includes a few proposed techniques for easy on-screen authentication, for example:
Technique 1: Easily adjustable on-screen lens size for end users
Technique 2: Redundancy in secret message structure
Technique 3: Dynamic screen size matching program
Technique 4: Pre-printed multi-size lens key
By using the lens key as a token, there are several advantages over traditional tokens solution, for example:
In an embodiment, the proposed scheme by mobile token authentication can be described in main phases: 1) user registration and mobile key distribution, 2) user login and authentication and 3) mobile key reset.
In order for the mobile key to be transmitted securely (either via SMS, GPRS or any form of transportation protocol), it will be encrypted prior to the transmission. The encryption can be done either via a symmetric key algorithm or based on public key infrastructure (PKI) key-pairs. When a PKI system is used, the contents embedded in the visual code may be encrypted and digitally signed using the public and private keys of the authority system 54. In this way, a 2-way verification of the service provider and service requestor can be ascertained securely, thereby increasing the security of the whole system.
Similarly, the mobile key generated can either be based on a symmetric key algorithm or based on public key infrastructure (PKI) key-pairs.
In cases where the user 52 needs to authenticate with more than one authority systems 54, the same mobile application installed on his mobile phone can be used. In this case, multiple mobile keys specific to each of the authority systems would be stored securely on the mobile phone. The mobile key generator 56 creates new mobile key, K.
The system 50 shown in
Visual lens or user overlay 24 is comparatively easier to replicate than physical tokens and it will be appreciated that the visual lens is more cost effective.
An embodiment of the invention could be used as authentication means for scenario with these important characteristics: cross-order and mass authentication.
Market segments and/or applications of embodiments of the invention in regards to two-factor authentication may include enterprise applications such as secure remote access, enterprise authentication, business to business (B2B) transactions, or the like; consumer applications such as online banking, electronic commerce, ISPs, or the like; government applications such as common authentication or the like.
An embodiment of the invention is a technique that is different from typical tokens solution in that it can be use for secure login.
In an embodiment, public-key cryptography is a method employed for secret communication between two parties without requiring an initial exchange of secret keys. It can also be used to create digital signatures. Public key cryptography enables secure transmission of information on the Internet.
It is also known as asymmetric key cryptography because the key used to encrypt a message differs from the key used to decrypt it. In public key cryptography, a user has a pair of cryptographic keys—a public key and a private key. The private key is kept secret, while the public key may be widely distributed. Messages are encrypted with the recipient's public key and can only be decrypted with the corresponding private key. The keys are related mathematically, but the private key cannot be feasibly (ie, in actual or projected practice) derived from the public key.
Symmetric cryptography uses a single secret key for both encryption and decryption. To use a symmetric encryption scheme, the sender and receiver must share a key in advance. Because symmetric encryption is less computationally intensive and requires less bandwidth, it is common to exchange a key using a key-exchange algorithm and transmit data using an enciphering scheme.
While embodiments of the invention have been described and illustrated, it will be understood by those skilled in the technology concerned that many variations or modifications in details of design or construction may be made without departing from the present invention.
Number | Date | Country | Kind |
---|---|---|---|
200803412-6 | May 2008 | SG | national |
200805166-6 | Jul 2008 | SG | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/SG09/00159 | 5/4/2009 | WO | 00 | 10/6/2010 |