Claims
- 1. A method for authenticating a web user, comprising:
registering the user by an authenticating authority based upon identification of the user using a strong authentication technique; providing an authenticating token to the user by the authenticating authority in connection with the user registration; enrolling at least one web-enabled user device for the user by the authenticating authority based on presentation of the authenticating token by the user; and authenticating the user for a transaction by the authenticating authority based on presentation by the user of a user password via the enrolled user device.
- 2. The method of claim 1, wherein registering the user based upon identification of the user using the strong authentication technique further comprises registering the user based upon identification of the user using at least one of biometric information and shared secret information.
- 3. The method of claim 2, wherein registering the user based upon identification of the user using shared secret information further comprises registering the user based upon identification of the user using a special code posted by the authenticating authority to the user that can be used only within a predetermined time frame.
- 4. The method of claim 2, wherein registering the user based upon identification of the user using shared secret information further comprises registering the user based upon identification of the user using the user's answer to a question posed by the authenticating authority about a specific matter which only the user would know.
- 5. The method of claim 2, wherein registering the user based upon identification of the user using at least one of the biometric information and the shared secret information further comprises combining the information with at least one of a unique, known attribute of the user and a secret entered and known only by the authenticating authority.
- 6. The method of claim 2, wherein registering the user based upon identification of the user using at least one of the biometric information and the shared secret information further comprises receiving the information from the user at a transaction terminal.
- 7. The method of claim 6, wherein receiving the information from the user at a transaction terminal further comprises allowing the user to enter the information at the transaction terminal using a transaction terminal card and a user password.
- 8. The method of claim 7, wherein allowing the user to enter the information at the transaction terminal using the transaction terminal card and the user password further comprises allowing the user to enter the information at the transaction terminal using the transaction terminal card and a personal identification number of the user through a control device that identifies the user.
- 9. The method of claim 6, wherein receiving the information from the user at a transaction terminal further comprises allowing the user to enter the biometric information consisting of at least one of fingerprint information and handwriting information at the transaction terminal.
- 10. The method of claim 1, wherein providing the authenticating token further comprises providing the authenticating token to the user consisting of a one-way hash of user identification information known only to the authenticating authority and the user.
- 11. The method of claim 10, wherein providing the authenticating token consisting of the one-way hash further comprises producing the one-way hash of user identification information consisting of at least one of biometric information and shared secret information.
- 12. The method of claim 11, wherein providing the authenticating token further comprises producing the one-way hash of the user identification information by the authenticating authority using one of a Secure Hash Algorithm (SHA) or a message digest algorithm (MD-5).
- 13. The method of claim 11, wherein providing the authenticating token further comprises producing the authenticating token consisting of an index derived from the one-way hash.
- 14. The method of claim 1, wherein enrolling the web-enabled user device based on presentation of the authenticating token further comprises enrolling the web-enabled user device based on presentation of the authenticating token consisting of a one-way hash of user identification information known only to the authenticating authority and the user.
- 15. The method of claim 14, wherein enrolling the web-enabled user device based on presentation of the authenticating token further comprises enrolling at least one computing device from which the user can perform transactions.
- 16. The method of claim 15, wherein enrolling at least one computing device further comprises enrolling at least one of a laptop computer, a personal computer (PC), a set-top box, and a personal data assistant for the user.
- 17. The method of claim 1, wherein enrolling the web-enabled user device based on presentation of the authenticating token further comprises allowing the user to log onto a web site for the authenticating authority and supply the authenticating token and a user password to the authenticating authority.
- 18. The method of claim 17, wherein enrolling the web-enabled user device based on presentation of the authenticating token further comprises producing a hash of user information consisting of at least identification information for the user device and the user password.
- 19. The method of claim 1, wherein authenticating the user based on presentation by the user of the user password via the enrolled user device further comprises receiving a hash of user information by the authenticating authority via the enrolled user device consisting of at least identification information for the user device.
- 20. The method of claim 19, wherein authenticating the user based on presentation by the user of the user password via the enrolled user device further comprises performing a look-up by the authenticating authority to confirm a predefined relationship between the user password and the enrolled user device.
- 21. A system for authenticating a web user, comprising:
means for registering the user by an authenticating authority based upon identification of the user using a strong authentication technique; means for providing an authenticating token to the user by the authenticating authority in connection with the user registration; means for enrolling at least one web-enabled user device for the user by the authenticating authority based on presentation of the authenticating token by the user; and means for authenticating the user for a transaction by the authenticating authority based on presentation by the user of a user password via the enrolled user device.
- 22. The system of claim 21, wherein the means for registering the user based upon identification of the user using the strong authentication technique further comprises means for registering the user based upon identification of the user using at least one of biometric information and shared secret information.
- 23. The system of claim 22, wherein the means for registering the user based upon identification of the user using shared secret information further comprises means for registering the user based upon identification of the user using a special code posted by the authenticating authority to the user that can be used only within a predetermined time frame.
- 24. The system of claim 22, wherein the means for registering the user based upon identification of the user using shared secret information further comprises means for registering the user based upon identification of the user using the user's answer to a question posed by the authenticating authority about a specific matter which only the user would know.
- 25. The system of claim 22, wherein the means for registering the user based upon identification of the user using at least one of the biometric information and the shared secret information further comprises means for combining the information with at least one of a unique, known attribute of the user and a secret entered and known only by the authenticating authority.
- 26. The system of claim 22, wherein the means for registering the user based upon identification of the user using at least one of the biometric information and the shared secret information further comprises means for receiving the information from the user at a transaction terminal.
- 27. The system of claim 26, wherein the means for receiving the information from the user at a transaction terminal further comprises means for allowing the user to enter the information at the transaction terminal using a transaction terminal card and a user password.
- 28. The system of claim 27, wherein the means for allowing the user to enter the information at the transaction terminal using the transaction terminal card and the user password further comprises means for allowing the user to enter the information at the transaction terminal using the transaction terminal card and a personal identification number of the user through a control device that identifies the user.
- 29. The system of claim 26, wherein the means for receiving the information from the user at a transaction terminal further comprises means for allowing the user to enter the biometric information consisting of at least one of fingerprint information and handwriting information at the transaction terminal.
- 30. The system of claim 21, wherein the means for providing the authenticating token further comprises means for providing the authenticating token to the user consisting of a one-way hash of user identification information known only to the authenticating authority and the user.
- 31. The system of claim 30, wherein the means for providing the authenticating token consisting of the one-way hash further comprises means for producing the one-way hash of user identification information consisting of at least one of biometric information and shared secret information.
- 32. The system of claim 31, wherein the means for providing the authenticating token further comprises means for producing the one-way hash of the user identification information by the authenticating authority using one of a Secure Hash Algorithm (SHA) or a message digest algorithm (MD-5).
- 33. The system of claim 31, wherein the means for providing the authenticating token further comprises means for producing the authenticating token consisting of an index derived from the one-way hash.
- 34. The system of claim 31, wherein the means for enrolling the web-enabled user device based on presentation of the authenticating token further comprises means for enrolling the web-enabled user device based on presentation of the authenticating token consisting of a one-way hash of user identification information known only to the authenticating authority and the user.
- 35. The system of claim 34, wherein the means for enrolling the web-enabled user device based on presentation of the authenticating token further comprises means for enrolling at least one computing device from which the user can perform transactions.
- 36. The system of claim 35, wherein the means for enrolling at least one computing device further comprises means for enrolling at least one of a laptop computer, a personal computer (PC), a set-top box, and a personal data assistant for the user.
- 37. The system of claim 31, wherein the means for enrolling the web-enabled user device based on presentation of the authenticating token further comprises means for allowing the user to log onto a web site for the authenticating authority and supply the authenticating token and a user password to the authenticating authority.
- 38. The system of claim 37, wherein the means for enrolling the web-enabled user device based on presentation of the authenticating token further comprises means for producing a hash of user information consisting of at least identification information for the user device and the user password.
- 39. The system of claim 31, wherein the means for authenticating the user based on presentation by the user of the user password via the enrolled user device further comprises means for receiving a hash of user information by the authenticating authority via the enrolled user device consisting of at least identification information for the user device.
- 40. The system of claim 39, wherein the means for authenticating the user based on presentation by the user of the user password via the enrolled user device further comprises means for performing a look-up by the authenticating authority to confirm a pre-defined relationship between the user password and the enrolled user device.
PRIORITY APPLICATION
[0001] This application claims the benefit of U.S. Provisional Application No. 60/209,664 filed Jun. 6, 2000, entitled “Method and System for Strong, Convenient Authentication of a Web User”, which is incorporated herein by this reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60209664 |
Jun 2000 |
US |