The procedure proposed is carried out by means of a Multi-key card that is delivered to the user, which the user can utilize to carry out Internet operations that he finds appropriate.
This flexible plastic card (
The user's NICK 2 is printed on the back of the card, printed hidden under a protective scratch-off coating. An alternative version would have the NICK printed on an opaque removable plastic strip so that the user could pull it off and stick it on the front of his home PC, for example, from which he will operate with his Multi-key card.
A variable series of PINs 3 (alphanumeric codes) are printed on the central part of the card, the standard model of which contains 30 to 50 PINs. Depending upon the utility to be given to the Multi-key card, it is possible that there will be special models of such cards. These PINs are all hidden under a protective scratch-off coating that the user will be scratching off as he utilizes the card. He uncovers a PIN, uses it and, once uncovered and used, the PINs are disqualified for another operation.
Other data included on the Multi-key card are the unique item code identification 4 issued by the Authorization Center press at the time of generating a specific set of cards for Business X, and a card identification code 5 consisting of a unique alphanumeric code of X (standard 10) characters, that identify that specific Multi-key card, relating it to the user and to the PINs he is authorized to use.
The front of the card may contain advertising space 7 and other less relative data, for example the date of issue of the card and the expiration date.
The Multi-key card comes heat-sealed in cellophane 6 to avoid rubbing and scratching that might uncover the hidden NICK+PIN codes.
As may be noted, another additional security standard that the procedure claimed provides, in addition to a process of user identification by fingerprint that will be described below, resides in the fact that the card does not carry identifying data that could be of use to a possible thief who might steal the card from the user. There is no way to relate the card to the user or to Business X that provided him with it, since all the information that is found contained in the database is not accessible on the Web. For that reason, a stolen card will not be of use to anyone other than its legitimate holder.
To reveal the procedure that we wish to protect, it is necessary in the first instance to describe the different entities that take part in the transaction.
Business X decides to adhere to the security system utilized by the procedure claimed and contacts the Authorization Center to the effect of signing a adherence agreement.
The Authorization Center enters Business X's data of into their database, which is isolated, disconnected and not available on the Web, and assigns it a unique a code for identification. At this time Business X will have to send the information about the users who will be using the security system.
Business X sends the information with regard to the new users who are going to make use of the system. This phase also considers the case of the notification of the user changes or dismissals that are produced when Business X is operating with the system.
As of the reception of user news the Authorization Center will prepare the NICK Business X user registry assigning each user an alias or NICK that unequivocally identifies them and safeguards their identity. The Authorization Center updates its Database entering new users with a NICK associated with each one and updating or eliminating corresponding users in accordance with the information reported by Business X.
Up to this point, no data is available on the Internet, since the database with the NICKS assigned is not available on the network and if Business X has sent the list of users by Internet and not by mail or CD-Rom, this information would be valueless, since it is just a list of persons without association to and account whatsoever.
3.1 (
Business X requests Multi-key cards for their users by means of a Request Note or Purchase Order to the Authorization Center. The Authorization Center generates a set of cards that it delivers to Business X, which distributes the cards to individuals. The user receives the card and has to authenticate his identity by a signature and an organic security seal as divulged in U.S. Pat. No. 6,659,038 incorporated herein by reference.
This security seal, commercialized under the trademark DigiFirma ®, consists of a support capable of saving the fingerprint and the DNA of the person entered, extracted from his fingerprints by means of reagents and microscopic readings that can pick up organic remains from cells stuck in the organic security seal adhesive.
This organic security seal is of vital importance to avoid a type of fraud very common at the present time: identity theft.
With present systems of distribution, with a falsified document a criminal can easily make himself pass for another person and in that manner obtain, for example, a multi-key card such as those which are divulged in the present invention patent. The falsifier will receive his card in the mail and sign the mail receipt with a false signature, the same as he uses in his false identity, by means of which he can commit all types of fraud until the person whose identity was stolen detects the crimes. And by that time, the card may have been used until exhausted and the consequences will be irreparable.
In the procedure proposed and thanks to the aforementioned security seal. Business X has previously requested by means of a written order, the Multi-key cards for a list of specific users. The Center of Authorization will to the list to generate a set of cards that it will deliver to Business X, which will distribute them to individuals. This delivery is carried out by means of a specific form that included aforementioned organic security seal, so that the user is obliged to furnish his fingerprint and his DNA in the aforesaid seal, which, sent again to the Authorization Center, shall be entered in the Database, relating the identity, fingerprints, NICK, card code identifier, PINs to be used and other user-associated data.
In this manner, security measures are added that make the procedure proposed much more effective than the, systems known to the state of the art, avoiding possible fraud at the initiation of the procedure by identity theft, since if some user should want to carry out some type of crime with the Multi-key card, he would be immediately identified since he had been obliged to leave his fingerprint on the form at the time he received the multi-key card.
Once the cards have been distributed Business X will inform the AC to activate the NICK of the users who have received the Multi-key card in the Database so that such users can to make use of the cards.
3.2 (
The Authorization Center generates the cards in sets assigning each card a unique alphanumeric card identification code of X characters (numbers, capital letters and/or lower-case letters), user NICKs and a quantity of PINs to be defined. The process of generation verifies that a PIN is not repeated in the same card.
This is the phase in which the user, with his Multi-key card, utilizes electronic banking services, payment systems or indulges in electronic commerce and other services offered via the Internet. To do so, he has two routes: either entering the Business X web page or making a telephone call to the Call Center. The two possibilities are detailed below.
The user enters the Business X Web page and requests their recognition to enter by means of a link to the Authorization Center portal.
In this instance, the AC Web server requests that the user enter his NICK+a PIN code chosen at random by scratching off his Multi-key card. Such PINs are temporary in nature. That means that upon entering the alphanumeric PIN code, the user has limited time to carry out the operation in question. This is one more security measure that tends to protect the system, restricting the degrees of liberty of a possible computer criminal.
Additionally, the PINs entered may have different colors according to the Business X categorization of the user, which adds one more element of control in the process of identity authentication that will be described below.
Once the NICK+PIN codes have been entered, the aforesaid AC Web server translates the alphanumerical chain into bar codes, within the EAN nomenclature and sends this code to the server without open connection, where the Authorization Center database is located.
As of this moment, all the operations of verification are without open connection, so that the only information that traveled by the web that would be intercepted were an isolated bar code of no use to any computer criminals.
Once the data has been transferred means of bar codes, the Web Server prints on a roll of wafers (A) the bar code with NICK+PIN information and a laser reader connected to the Authorization Center database reads the bar code barras and verifies that the NICK is qualified, that the PIN corresponds to the NICK and that the same PIN has not been used before. After this process of Verification, the printing of the bar codes on the roll of wafers (A) remains as a record of the transactions, which will be in the official monthly summary to Business X and/or to the AC, which-will list all the operations realized, by which users and using which PINs, along with the day, hour and other administrative data.
This verification is carried out by having access to a database that is not connected to the open network (by means of a process of laser reading of bar codes that contain the data to be validated), thus impeding access to this valuable information by means of the network.
It is appropriate to point out again that this is the novel point of the procedure, proposed, since all the operations of present systems always involve two points, both always being connected to the Web, allowing the computer science criminal to decode and steal information from the two points, which he can then use to commit the fraud that we are attempting to avoid here. In this procedure, one of the points is disconnected and the other consists of a series of unconnected data with no relation to either an account number or to any identifiable user.
Once the verification of the response to the request for recognition (legitimization of identity utilizing the same process as the foregoing but in reverse) has been accomplished the AC prints the bar code of that NICK+PIN with the Authorization or denial of the transaction on another roll of wafers (B). The laser reader connected to the AC Web Server reads this response and returns the response translated instantaneously and that combination of NICK+PIN are invalidated in the isolated and disconnected Agricultural Council database for the next operation. These printed wafers in the form of rolls, not only (A) but (B) serve as physical records of the transactions realized and kept administratively by the AC for the qualified companies that ask for them.
4.2 (
The Business X user wishes to operate with Business X and requests his legitimization by means of a telephone call to the Call Center. In this instance the Call Center operator requests the user's NICK+a PIN code from his Multi-key card and enters it on the system screen that provides verification of such data. The system verifies that the NICK is qualified; that the PIN corresponds to the NICK and that the aforesaid PIN has not been used before. As soon as the verification in response to the request for the recognition of identity has been accomplished, the use of the NICK+PIN combination in a future operation is invalidated.
This verification is carried out by accessing the database that is not connected to the open network (by means of a telephone call to a Call Center), thus impeding access to this information by means of the network. As soon as the verification the response is given to the request for legitimization of identity.
Once the identity of the user has been established, the user is in condition, to undertake all types of operations or commercial transactions, to which end he will enter the data requested by Business X on their Web page or by telephone, in case of using the Call Center service. Business X will process the information received from the user, depending on the type of transaction that he desires to undertake, e-cash operations, for example, wholesale or retail e-commerce, home-banking, legitimization of medicines between laboratories, pharmacies and consumers, Call-Center: all direct or indirect commercial operations to authenticate the of a purchase card, credit card, debit card, social security card, health card, insurance card, etc. by way of traditional calls, for operations in Shopping Centers, Big Box Stores, etc., Security Hosting (Servers), to replace all type of passwords (Pin_Mail for example), control access a restricted areas, to authenticate test scores for university students (Multi-key card linked PC of a proctor, for example), to replace fixed PIN in Automatic tellers to withdraw money or other operations similar, to control various DGI operations, to control the sending of monetary remittances in a physical form, to give anonymity to clinical examinations of DNA and/or AIDS or others previously requested, etc.
The security procedure proposed having been completely described with details of each of its operative stages, it is clear that the present invention is not a mere economic commercial activity of a theoretical nature, but a procedure that presents a series of stages (actions) not evident to a person of average means, that tend to resolve a problem set forth in the state of the art based on a combination of elements such as software, hardware and the multi-key card with which all the operations are carried out.
More complete technical information is offered below with regard to how the invention will be carried out.
The key to the procedure claimed resides in the fact that it is supported by an Internet provider that manages its own network not connected to the others, with its own range of IP addresses managing its own routers with Border Gateway Protocol (BGP4) protocol. This BGP protocol allows the connection of a network of servers owned by multiple operators by two physical STM-1 fiber optical lines (155 Mbps each one of them), through which circulate the flows of multiple operator with high performance.
As mentioned before, the database is independent and separate from the mother trunk network of the Internet by means, of a laser connectivity that is produced as PINs enter converted by means of software into bar codes, which are read by optical readers that automatically locate the key to Authorization to continue with the transaction and certify it. Such readers can route more than 40 million packets per second in automatic mode.
In addition, the aforementioned internal network is completely interconnected by switches (there are no hubs) that are capable of managing a bar width greater than 180 Gbps.
A very important fact to keep in mind is that provider is of the Multihomed type, with its own Data Center; while the companies that offer dominions, hosting and lodging for servers at the present time lack security for the following reasons:
In the case of procedure proposed, the Multihomed provider avoids this dependence by contracting bandwidth from different providers, giving value to the connectivity of each one of them. In this manner, each user connected to the Internet has multiple ways of arriving at the Web Sites hosted on the Web and the systems of routing of the Internet always choose the shortest route by themselves, so that the following advantages are obtained:
With respect to operating systems, the client can choose the operating system that he prefers in each one of the hosting security plan, they are Linux and Windows 2000 Server.
Servers based on Linux utilize the Apache Web server and provide the possibility of executing scripts in Perl, Pitón and PHP4, in addition to access to MySQL databases.
Windows servers incorporate the Internet Information Server and can host dynamic Web Sites utilizing ASP pages in Visual Basic Script with access to databases Access or SQL Server.
The hardware utilized in the two types of servers is IBM X330.
In summary, the procedure claimed provides the necessary requirements of patentability, in addition to not being included in the patentability exceptions specific to the patent law, since it deals with a series of necessary and consecutive stages to arrive at a final unpredictable result (not obvious to a person of ordinary skill in the art).
The software provided is not claimed “per se,” but it forms a part of a conjunction of elements that provide a desired “technical effect,” necessary to arrive at the aforementioned final effect and it interacts with the hardware specified. For that reason it is considered a patentable invention.
It is obvious various operational modifications can be introduced in the procedure described, as well as in the design and configuration of the card, without leaving the sphere of the present invention patent of what is clearly determined by the scope of the following claims.
Number | Date | Country | Kind |
---|---|---|---|
P040100013 | Jan 2004 | AR | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US05/00068 | 1/5/2005 | WO | 00 | 8/29/2006 |