throbber

`
`
`(19) United States
`
`
`
`
`
`
`
`
`
`(12) Patent Application Publication (10) Pub. No.: US 2011/0219230 A1
`
`
`
`
`
`Oberheide et al.
`
`
`(43) Pub. Date: Sep. 8, 2011
`
`
`
`US 20110219230A1
`
`
`
`
`(54) SYSTEM AND METHOD OF NOTIFYING
`
`
`
`MOBILE DEVICES TO COlVIPLETE
`
`
`
`TRANSACTIONS
`
`
`
`
`
`(76)
`
`
`
`Inventors:
`
`
`
`(21)
`
`(22)
`
`
`
`
`
`
`
`Appl. No.:
`
`Filed:
`
`
`
`Jon Oberheide, AnnArbor, MI
`
`
`
`
`(US); Douglas Song, Ann Arbor,
`
`
`
`
`
`MI (US); Adam Goodman, Ann
`
`
`
`
`
`Arbor, MI (US)
`
`
`13/039,209
`
`Mar. 2, 2011
`
`
`
`
`(60)
`
`
`
`Related U.S. Application Data
`
`
`
`
`Provisional application No. 61/309,885, filed on Mar.
`
`
`
`
`
`3, 2010.
`
`
`
`
`
`Publication Classification
`
`
`
`
`
`
`(51)
`
`Int. Cl.
`
`
`(2006.01)
`H04L 9/32
`
`
`
`(52) U.S. Cl. ........................................................ 713/168
`
`
`
`
`
`
`
`(57)
`
`ABSTRACT
`
`
`
`A method including registering an authority device for an
`
`
`
`
`
`
`
`account on an auth platform; receiving transaction request
`
`
`
`
`
`
`from an initiator to the auth platform; messaging the authority
`
`
`
`
`
`
`
`device with the transaction request; receiving an authority
`
`
`
`
`
`
`
`agent response from the authority device to the auth platform;
`
`
`
`
`
`
`
`
`
`if the authority agent response confirms the transaction, com-
`
`
`
`
`
`
`
`
`
`municating a confirmed transaction to the initiator; and ifthe
`
`
`
`
`
`
`
`authority agent response denies the transaction, communicat-
`
`
`
`
`
`
`
`ing a denied transaction to the initiator.
`
`
`
`
`
`
`TX Effiéfi‘i‘is‘t‘FE
`
`
`—’° REQUESTMG
`
`
`
`3m EARTY
`
`
`
`
`
`
`
`NEEA‘TSER
`
`
`
`
`
`
`
`
`
`
`
`“m
`
`,_ “my:
`
`
`
`
`
`.
`
`
`
`
`_
`
`
`
`
`
`
`
`
`“(REGEEEE
`
`\QEVECE
`
`
`3 $110
`
`g
`
`
`iff“
`
`
`
`REQUEST
`AMTHQRSEERON XX;
`
`
`
`AUEHDREEATEGN
`
`
`
`
`mam-m:- .raqniree
`{KEN-PERM TX
`
`
`
`
`
`
`3180
`authorization from an
`WEE 2 out at 3%
`
`
`
`
`
`authofitative agent
`
`
`mié‘totfity device
`
`mafirmatzéme
`
`
`REGESEER SEVERE SE1 “t E}
`
`SE 56}
`
`“MMAMW~\““w
`
`“x,
`"J- "J-I
`/‘g.1,
`
`
`‘\
`
`
`
`
`PUSH TX EESEAEE ‘1
`
`
`3:30
`Aim-team
`@3on
`
`
`so? or: mm:
`,
`.
`
`
`
`AME:
`_
`.
`
`
`
`swam ta
`EMTFDHM
`USER #1
`
`
`
`Ema
`-»
`
`
`
`
`.9"
`emu ’ PUSH 23E
`
`
`mmat: St 10 _/ WSEAEEx
`
`
`
`Ema”
`[@033 T):
`
`-°
`
`WWWW
`:wHFtEM TX
`513%
`2
`MES-EASE
`
`
`
`
`
`BEVi’C E
`31 4%
`
`
`{E QEFAUTHZ
`UEEEEE
`
`
`
`
`AEEHDEEY
`BEWCE
`
`GE GE AMTHZ:
`
`
`USEEEE
`
`
`
`Page 1 of 10
`
`GOOGLE EXHIBIT 1006
`
`Page 1 of 10
`
`GOOGLE EXHIBIT 1006
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Sep. 8, 2011 Sheet 1 0f 5
`
`
`
`US 2011/0219230 A1
`
`
`
`EREQU EST EN G
`
`
`3:33" PRHTV
`
`
`REQUEST
`ALETHE‘FTCQTDN
`
`3533
`
`
`
`
`
`
`
`z
`s
`
`l
`
`333,33
`a :1:va
`
`01::
`
`
`AUTHENTéQ
`
`SENT—THE T}: *—~’
`USER
`
`
`— $33
`
`
`
`
`
`
`
`
`
`
`GHNEEFTM T332
`31:53
`
`
`
`
`REQTSTER DEV'EEE 31m
`“a.— ‘7“
`"‘“‘"“‘-I»~;..
`A
`,.
`,«-'-““"
`M”
`
`m"
`* “
`.-
`
`
`
`
`ARK:
`g
`
`
`
`
`
`
`
`
`* 313.33 *3: MESSASE a}
`
`3‘5 3T}
` 31L} TH
`
`
`PLM'FCBFTEME
`
`
`W TTJEATGFT
`
`2
`
`:
`
`
`LEGTT TX:
`
`
`Wilma? 5:3 game
`
`as fiahama U53
`
`
`
`
`
`i i
`
`’
`
`
`
`
`‘
`
`
`
`
`
`
`
`Page 2 of 10
`
`Page 2 of 10
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Sep. 8, 2011 Sheet 2 0f 5
`
`
`
`US 2011/0219230 A1
`
`\5
`5"
`.,
`5.
`5
`“
`5X 5555553355§

`;
`5
`\m
`WW}:
`5 WWW 5
`;,
`\“x
`,
`§§5555525555555§
`
`"5
`
`55555 55555555"?
`- nw...5‘n‘\‘~1.5‘5‘\\\““‘w.““‘“““““w\
`
`”yum;
`'-v»»»m»»»
`
`
`555.55‘:; 555155555555
`
`
`
`
`
`
`$55555
`
`55"555:"5§5155.5$ 555.:
`
`
`
`
`555555555555155- 5555w55555§
`
`
`
`//¢g‘
`
`51.555555555555555555
`///
`
`
`55555555555555 5.55555
`«Wm
`‘-
`s \
`
`5X\x3
`
`fl.
`
`W 5555555555E55 55:55535 5:55
`
`
`
`
`5
`
`533$ “55* \X
`
`355"“555.5
`
`
`
`5-»»»»»»»m;»»
`55555555555555555555555555555555555555555
`,
`
`
`:
`5
`'
`-.
`‘x .4?
`' Mum .
`“NW“
`“-\\\\
`N“
`
`5:555? 55% .5? 55:5 55 55:55 MW
`5
`“45-“
`\'
`.6“
`r
`o“
`‘55
`5.
`5“
`5
`‘9\\\\\\\\\\\\\\\~\\\\\\\\\\\\55M“5..“5555555
`
`
`~
`
`\
`
`.
`
`\N
`
`\x._ .\
`
`.
`-,
`
`_
`
`_
`
`V
`
`5
`
`-.
`
`_
`
`\,
`
`_
`
`,
`
`{$5535
`
`555555555
`{3%.
`5 5 .55.;
`55:5"
`5
`)‘
`
`55555555
`..
`
`.
`
`.
`
`5 5
`
`\,
`5» \\
`\
`5555 :55
`.
`"5:,
`-\
`,
`
`53553 535“
`5 5:" 5:55.
`\ .u555u.5.5“55“....wuumuuuu““ ut,
`
`i
`
`;;;;t
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 10
`
`Page 3 of 10
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Sep. 8, 2011 Sheet 3 0f 5
`
`
`
`US 2011/0219230 A1
`
`
`
`
`11/
`
`EEE‘E'EIEE EE‘E'EEEE EEE:
`
`*EEEEE‘EE
`EEEEEEEEEEEE‘ EEEEE EEN‘“ EEEE
`
`EE‘E‘EEEEEEEEE EEEEEE
`
`\
`
`
`“EEE EEEEEEEE“
`“““““““““““““““““““““““\
`
`
`
`
`
`
`
`EEEEEEEEEE
`
`
`
`EEEEEEEEZEEEEEEEEEEEEE
`
`ESE 323i
`
`
`
`
`
`
`
`EEEEE‘E‘E EX
`
`SE E3?
`
` E‘EEEEESE‘EEEE EIEEEEEEE‘ EEEEEE
`
`I
`
`
`
`
`
`0z2,.:.:mmz.¢.:2.2.r.z,.».:.:m
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`\ \‘Nx.
`
`
`
`:
`_
`_
`
`EEEEEEEE“
`:3 $§fE{\ E9:
`
`
`QE: 55‘sTEN;
`EEEEEEEE
`
`
`
`
`
`
`
`
`
`EEEEEE EEE EEEE:‘EEEEEEC‘ E:
`E
`//
`:3E3EE
`
`£33?“
`9*EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE
`E. 3
`{13%EEWEECEREEE
`EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE,1“;
`QENV “EX
`EEMM
`
`
`
`E‘EEEEEEEEE
`
`Page 4 of 10
`
`Page 4 of 10
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Sep. 8, 2011 Sheet 4 0f 5
`
`
`
`US 2011/0219230 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TH TNTTEA‘TE 1‘
`
`l‘“ REQUESTING
`
`
`:ET‘KT FEET?
`
`
`
`
`
`REESE E 5:?
`
`
`ALT? HER EEEATTGN
`
`31 20
`
`
`
`
`SQNFT RM T312
`
`
`
`AMTHENTTCATTGN and
`
`
`AUTHGETEATIGN TX:
`
`
`
`
`Ara auThEfiTTmT-ed Tméfiaim‘
`
`
`
`:raquiims amifimifimam
`
`
`
`Tram at“: anflmfiiafiva
`
`
`
`
`a":-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`HETTTST-E
`
`“A\BrerWM.‘
`Nu,MN
`
`\
`
`x
`
`
`
` AUTHGRITT’
`
`
`FUSE-:1 TX MESSAGE 1“
`'
`
`EEVTCE
`
`RUTH
`
`
`
`0T:
`PLATFGERM
`
`
`
`AUTHENTTS
`
`
`
`
`
`{:{TTTFTRTT m
`
`USER
`
`
`Ems}
`
`REETTETTETTT“
`
`flEVT{:2E g?
`
`T
`31 T E}
`‘. .iww
`E f\
`'
`X
`
`
` PTJSH TX
`
`
`ALLETW TE
`
`ST 413}
`
`T
`
`
`
`
`
`
`
`RUTHCTEFTEEATTST‘T
`MESSAGE
`33:30
`,«flx
`
`
`
`
`
`
`MA.
`
`V
`
`..
`
`T
`
`
`
`.
`mmmm
`
`$va
`
`' {3? m: ALTTHE.
`
`USER
`
`
`,AETTHSRTTATNE RGET‘TT
`
`FTGLTRETT
`
`Page 5 of 10
`
`Page 5 of 10
`
`

`

`{MR
`
`
`
`:1
`1m 11111111113
`1
`
`1A —n~ ngmamm
`\1
`s“
`
`
`
`
`
`
`
`
`
`iNEFiATflR
`
`
`
`AMTHQREEMéGzN E3111;
`
`
`1111111111131- 1113:3123 ms
`
`
`authas‘f‘imfifim imam am
`
`
`
`autharfi'iaxstva 1119;631:111
`
`
`
`REQUEST
`
`
`
`
`
`
`
`
`
`REGESYER 35.111135 31113
`
`
`
`31113 $23133???
`
`
`
`flUTHi’JREATEEN
`
`83 213
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Sep. 8, 2011 Sheet 5 0f 5
`
`
`
`US 2011/0219230 A1
`
`
`
`
`GENES RM TX
`
`
`
`w§i§1 ‘53 0.111131: 3
`
`
`
`animal? diwise
`wafirmatims
`
`,
`‘
`
`$1511
`
`
`"
`
`
`
`
`
`,
`
`
`
`
`
`
`
`'
`
`
`
`
`
`
`
`
`
`
`
`v
`
`
`
`
`
`
`yr
`
`
`
`..
`
`MTHQSET?
`
`
`
`SEW-C:
`
`
`1:11; 1:121: AWHE
`
`
`
`
`
`‘1fiéEGfiS‘TéER
`
`\SEVEEE
`
`
`a $1111
`
`
`.~
`
`,y
`
`
`13141311 111
`MESSME
`
`3:1 5m
`
`-,
`

`
`
`
`131.1311 “X wagsmg 11
`
`
`
`
`
`11131111131111
`
`81:31:}
`
`$111132
`
`
`
`{31: SF 11.131112.
`
`
`AUTH
`
`
`
`133.511 :11
`
`
`{EQNFERM TX
`
`PLAT§QR $113?
`
`
`
`
` 5‘: {$3 “Wm-pr
`
`
`r. -"‘
`5“
`
`_ g.-
`f
`. .¢
`
`
`
`
`
`
`1353131511
`ffifsmfi
`1%"
`
`
`{331$qu 31112-11!” Mfiféfififiéfi
`
`
`
`Pf:
`:ef‘gvé‘i‘ 30,33};
`.a-
`USER 1112 —
`Maw-111m
`
`
`
`
`314g}
`
`
`
`mNNNWWW‘
`
`E} E V K: E
`
`HEERKE
`
`
`
`
`
`
`
`
`Page 6 of 10
`
`Page 6 of 10
`
`

`

`US 2011/0219230 A1
`
`
`
`
`Sep. 8, 2011
`
`
`
`
`
`
`
`
`
`SYSTEM AND METHOD OF NOTIFYING
`
`
`MOBILE DEVICES TO COMPLETE
`
`
`TRANSACTIONS
`
`
`
`
`
`CROSS—R A FER 4NC A TO RELATED
`
`
`APPLICATIONS
`
`[0001] This application claims the benefit of US Provi-
`
`
`
`
`
`
`
`
`sional Application No. 61/309,885, filed 3 Mar. 2010, titled
`
`
`
`
`
`
`
`
`
`“SYSTEM AND METHOD OF USING PUSH-BASED
`
`
`
`
`
`CHALLENGES ON MOBILE DEVICES FOR AUTHEN-
`
`
`
`
`
`TICATION OR AUTHORIZATION”, which is incorporated
`
`
`
`
`in its entirety by this reference.
`
`
`
`
`
`TECHNICAL FIELD
`
`
`[0002] This invention relates generally to the digital secu-
`
`
`
`
`
`
`
`
`rity services field, and more specifically to a new and useful
`
`
`
`
`
`
`
`
`
`system and method of notifying mobile devices to complete
`
`
`
`
`
`
`
`transactions in the digital security field.
`
`
`
`
`
`BACKGROUND
`
`BRIEF DESCRIPTION OF THE FIGURES
`
`
`
`
`[0003] Fraudulent transactions, whether executed online
`
`
`
`
`
`
`by a malicious party who has stolen a user’s online banking
`
`
`
`
`
`
`
`
`password or offline by a malicious party entering a restricted
`
`
`
`
`
`
`building using a forged identification card, are indicators of a
`
`
`
`
`
`
`
`lack of authentication in present day security systems. Simi—
`
`
`
`
`
`
`
`larly, authorization (permission to complete a transaction) is
`
`
`
`
`
`limited without a strong notion of authentication. Tradition-
`
`
`
`
`
`
`ally, techniques for authentication are classified into several
`
`
`
`
`
`
`
`
`broad classes such as “what you know” (e.g., passwords or a
`
`
`
`
`
`
`
`
`social security number), “what you have” (e.g., physical pos-
`
`
`
`
`
`
`
`
`
`sessions such as ATM cards or a security dongle), and “what
`
`
`
`
`
`
`
`
`you are” (e.g., biometric information such as a finger print or
`
`
`
`
`
`
`
`DNA). However, many of these solutions are burdensome to
`
`
`
`
`
`
`
`users, requiring the user to remember information or carry
`
`
`
`
`
`
`
`extra devices to complete a transaction. Thus, there is a need
`
`
`
`
`
`
`
`in the digital security services field to create a new and useful
`
`
`
`
`
`
`
`
`
`
`system and method of notifying mobile devices to complete
`
`
`
`
`
`
`
`transactions. This invention provides such a new and useful
`
`
`
`
`
`
`
`
`system and method.
`
`
`
`
`
`
`
`
`FIGS. 1 and 2 are schematic representations of a
`[0004]
`
`
`
`
`
`
`method of a preferred embodiment for authenticating a trans-
`
`
`
`
`
`action;
`
`FIG. 3 is a schematic representation 0 a method of
`[0005]
`
`
`
`
`
`a preferred embodiment for authorizing a transaction;
`
`
`
`
`
`[0006]
`FIG. 4 is a schematic representation 0 'a method of
`
`
`
`
`
`a preferred embodiment for authenticating and authorizing a
`
`
`
`
`
`
`transaction; and
`
`
`FIG. 5 is a schematic representation 0 a method of
`[0007]
`
`
`
`
`
`
`
`
`
`
`
`
`
`DESCRIPTION OF lHE PREF ARR 4D
`
`
`EMBODIMENTS
`
`a preferred embodiment with a plurality of authority devices.
`
`
`
`
`[0008] The following description of the oreferred embodi-
`
`
`
`
`
`
`ments of the invention is not intended to limit the invention to
`
`
`
`
`
`
`
`these preferred embodiments, but rather to enable any person
`
`
`
`
`
`
`
`
`skilled in the art to make and use this invention.
`
`
`
`
`
`
`
`
`[0009] As shown in FIGS. 1-3, the method ofthe preferred
`
`
`
`
`
`
`
`
`embodiments for notifying mobile devices to complete trans-
`
`
`
`
`
`
`actions includes registering an authority device for an account
`
`
`
`
`
`
`
`011 an auth platform S110, receiving a transaction request
`
`
`
`
`
`
`
`
`
`
`Page 7 of 10
`
`from an initiator to the auth platform S120, messaging the
`
`
`
`
`
`
`
`
`authority device with the transaction request S130, receiving
`
`
`
`
`
`
`
`
`an authority agent response from the authority device to the
`
`
`
`
`
`
`
`
`
`auth platfonn 8140, if the authority agent response confirms
`
`
`
`
`
`
`
`
`the transaction, communicating a confirmed transaction to
`
`
`
`
`
`the initiator S150, and if the authority agent response denies
`
`
`
`
`
`
`
`
`
`the transaction, communicating a denied transaction to the
`
`
`
`
`
`
`initiator S152. The method functions to use push-based chal-
`
`
`
`
`
`
`
`
`lenges on mobile device for the authentication and/or autho-
`
`
`
`
`
`
`
`
`rization ofparties involved in a transaction. The method func—
`
`
`
`
`
`
`
`tions to utilize non-intrusive techniques while providing
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`improved security. The pushed messages preferably alert a
`user to the transaction request in real -time such that a decision
`
`
`
`
`
`
`
`
`of confirmation or denial of a transaction can be communi—
`
`
`
`
`
`
`cated to a requesting party with minimal time lag (e.g., pref-
`
`
`
`
`
`
`
`
`
`erably less than a minute, and more preferably less than 10
`
`
`
`
`
`
`
`
`
`
`seconds). The method may be employed as standalone trans-
`
`
`
`
`
`
`
`action validation or incorporated into a multifactor system.
`
`
`
`
`
`
`The method may be used in application such as web-based
`
`
`
`
`
`
`
`applications, remote access credentials, privileged account
`
`
`
`
`
`
`
`
`
`
`
`management, financial transactions, password recovery/reset
`mechanisms, physical access control, Automatic Teller
`
`
`
`
`
`
`Machine (ATM) withdrawals, domain name transfers, online
`
`
`
`
`
`
`
`or ofiiine transactions, building access security, or any suit-
`
`
`
`
`
`
`
`
`able application requiring authentication and/or authoriza—
`
`
`
`
`
`
`tion.
`
`[001 0] The method is preferably performed by an auth plat—
`
`
`
`
`
`
`
`form that communicates with a client of an initiating agent
`
`
`
`
`
`
`
`and an authority device associated with an account ofthe auth
`
`
`
`
`
`
`
`platform. The auth platform is preferably an intemet acces-
`
`
`
`
`
`
`
`sible server that may be hosted on a distributed computing
`
`
`
`
`
`
`
`system, but may be hosted on any suitable platform. The
`
`
`
`
`
`
`
`
`initiating agent is typically a user or process that initiates a
`
`
`
`
`
`
`
`transaction. The requested transaction is preferably initiated
`
`
`
`
`
`
`by the initiating agent through a client such as a website,
`
`
`
`
`
`
`
`
`application, or device (e.g., an ATM machine). For authenti-
`
`
`
`
`
`
`
`cation, the initiator agent may be a legitimate party or a
`
`
`
`
`
`
`
`
`malicious party attempting to fraudulently impersonate the
`
`
`
`
`
`
`legitimate party. For authorization, the initiating agent may be
`
`
`
`
`
`
`
`
`a legitimate authenticated party but may require approval
`
`
`
`
`
`
`
`
`from other parties to perform the action of the transaction.
`
`
`
`
`
`
`
`The authority device is preferably a device associated with an
`
`
`
`
`
`
`
`authentic agent that is a user or process that is legitimately
`
`
`
`
`
`
`
`authenticated or authorized to execute transactions. Even if a
`
`
`
`
`
`malicious entity were attempting to impersonate a user or
`
`
`
`
`
`
`authentic agent through stolen credentials or other means,
`
`
`
`
`
`
`
`
`they wouldiideallyilack the authority device to complete a
`
`
`
`
`
`
`
`transaction.
`
`Step 8110, which includes registering an authority
`[0011]
`
`
`
`
`
`
`
`device for an account on an auth platform, functions to iden-
`
`
`
`
`
`
`
`tify a device of an agent that is permitted to authenticate or
`
`
`
`
`
`
`authorize transactions. The registration preferably occurs
`
`
`
`
`
`
`prior to a transaction request, and is preferably performed
`
`
`
`
`
`
`during an initial setup of an account on the auth platform.
`
`
`
`
`
`
`
`During the setup authentication and/or authorization rules are
`
`
`
`
`
`
`
`preferably set. The authority device is preferably a mobile
`
`
`
`
`
`
`
`computing device possessed by an authentic user or an autho-
`
`
`
`
`
`
`
`rized agent. The mobile device is preferably a mobile phone,
`
`
`
`
`
`
`
`
`tablet computer, smartphone, personal data assistant (PDA),
`
`
`
`
`
`
`
`personal computer, and/or any suitable computing device.
`
`
`
`
`
`
`
`The authority device preferably has access to a network over
`
`
`
`
`
`
`
`
`which communication with the auth platform is performed,
`
`
`
`
`
`
`
`such as a WiFi network, local—area network, telephony net—
`
`
`
`
`
`
`
`work, short message service (SMS) network, multimedia
`
`
`
`
`
`
`
`
`Page 7 of 10
`
`

`

`US 2011/0219230 A1
`
`
`
`
`Sep. 8, 2011
`
`
`
`messaging service (MMS), or any suitable network. A plural-
`
`
`
`
`
`
`
`ity of devices may additionally be registered, as shown in
`
`
`
`
`
`
`
`FIG. 5. A second authority device may provide a backup
`
`
`
`
`
`
`
`communication point if a primary authority device does not
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`respond. For example, after attempting to contact a primary
`
`
`
`
`
`
`
`
`authority device, the auth platform may message a secondary
`authority device for authentication or authorization. Or, alter-
`
`
`
`
`
`
`
`natively, a threshold of two confirmations may need to be
`
`
`
`
`
`
`
`received to authorize a transaction. Additionally, a first
`
`
`
`
`
`
`
`
`
`
`
`
`
`authority device may be registered for authenticating the
`identity of an agent of the transaction request, and a second
`
`
`
`
`
`
`authority device may be registered for authorizing an action
`
`
`
`
`
`
`
`of an agent such that authentication and authorization may
`
`
`
`
`
`
`
`
`both be enabled, as shown in FIG. 4.
`
`
`
`
`[0012]
`Step S120, which includes receiving a transaction
`
`
`
`
`
`
`
`request from an initiator to the auth platfonn, fimctions to
`
`
`
`
`
`
`
`initiate a transaction. The transaction is preferably any event,
`
`
`
`
`
`
`
`transfer, action, or activity that requires authentication and/or
`
`
`
`
`
`
`
`authorization of an involved party. Exemplary transactions
`
`
`
`
`
`may include logging into a website, application or computer
`
`
`
`
`
`
`
`system; a user withdrawing money from an ATM; a user
`
`
`
`
`
`
`
`
`
`
`
`
`
`initiating a “forgotten password” procedure; a user attempt-
`ing to enter a restricted area of a building or environment; a
`
`
`
`
`
`
`payment exchange between two entities; a user attempting to
`
`
`
`
`
`
`
`perform a restricted action in a computer system; and/or any
`
`
`
`
`
`
`
`suitable application requiring authentication and/or authori—
`
`
`
`
`
`
`zation. Authentication preferably includes validating the
`
`
`
`
`
`
`identity ofat least one involved party relevant to a transaction.
`
`
`
`
`
`
`
`Authorization preferably includes validating authority or per-
`
`
`
`
`
`
`mission of an entity to execute a transaction. For authentica-
`
`
`
`
`
`
`tion, the authority device preferably belongs to the authentic
`
`
`
`
`
`
`
`
`user for self-approval of transactions. For authorization, the
`
`
`
`
`
`
`
`authority device preferably belongs to an authoritative user
`
`
`
`
`
`
`that is preferably in charge ofregulating transactions of a user
`
`
`
`
`
`
`involved in the transaction. The transactions are preferably
`
`
`
`
`
`
`
`initiated in an online environment, where parties may be
`
`
`
`
`
`
`
`
`communicating using a computing device or public/private
`
`
`
`
`
`network, but the transactions may alternatively occur offline
`
`
`
`
`
`
`
`
`where parties may be interacting in the real world. The user or
`
`
`
`
`
`
`
`
`
`device initiating the transaction is ideally a legitimate party,
`
`
`
`
`
`
`
`as shown in FIG. 1, but in the situations where a malicious
`
`
`
`
`
`
`
`
`party initiates or participates in the transaction, the method is
`
`
`
`
`
`
`
`preferably able to properly identify such a situation, as shown
`
`
`
`
`
`
`
`in FIG. 2. After a malicious transaction is prevented the
`
`
`
`
`
`
`
`approval rules for a transaction may be dynamically altered to
`
`
`
`
`
`
`
`increase security. The transaction is preferably sent from a
`
`
`
`
`
`
`
`requesting entity such as a website, application, or device.
`
`
`
`
`
`
`The requesting entity is typically a system in communication
`
`
`
`
`
`
`with the auth platform. An application programming inter-
`
`
`
`
`
`
`
`face (API) or any suitable protocol is preferably used to
`
`
`
`
`
`
`
`communicate between the requesting entity and the auth plat-
`
`
`
`
`
`
`
`
`form. In one variation, the communication sent from the
`
`
`
`
`
`
`
`
`requester is encrypted and the authority device preferably
`
`
`
`
`
`
`
`decrypts the infomiation. This variation preferably prevents
`
`
`
`
`
`
`
`the auth platform from inspecting or accessing the commu-
`
`
`
`
`
`
`
`
`nicated infomiation which may be applicable when a third
`
`
`
`
`
`
`
`party is passing sensitive information through the auth plat—
`
`
`
`
`
`
`
`
`form. As an alternative variation, the communication between
`
`
`
`
`
`
`the requester and the auth platform is preferably encrypted or
`
`
`
`
`
`
`
`otherwise cryptographically protected and communication
`
`
`
`
`
`between the auth platform and the authority device verifies
`
`
`
`
`
`
`
`
`
`that the communication is from the authority device. Any
`
`
`
`
`
`
`
`
`
`
`
`
`suitable steps may be taken to secure the communication
`
`
`
`
`
`
`between the requesting entity,
`the auth platform and the
`
`
`
`
`
`
`
`
`authority device.
`
`
`Step $130, which includes messaging the authority
`[0013]
`
`
`
`
`
`
`
`
`device with the transaction request, functions to push a noti-
`
`
`
`
`
`
`
`
`fication to a secondary device for authentication or authori-
`
`
`
`
`
`
`zation. The authority device is preferably a device only the
`
`
`
`
`
`
`
`
`authentic user or an authorized user would possess. The mes-
`
`
`
`
`
`
`
`
`
`sage is preferably sent through a communication channel
`
`
`
`
`
`
`between the authority device and the auth platform. The corn-
`
`
`
`
`
`
`
`
`munication channel is preferably a push notification service
`
`
`
`
`
`
`provided through the authority device. The communication
`
`
`
`
`
`
`
`channel may alternatively be a short message system SMS
`
`
`
`
`
`
`
`network, email, a instant message, an in-app notification sys-
`
`
`
`
`
`
`
`tem, web based websoeket or publication—subscription chan-
`
`
`
`
`
`
`nels, image based transmission of transaction information
`
`
`
`
`
`
`
`such as through QR-codes captured by a camera, or any
`
`
`
`
`
`
`
`suitable technique for messaging the device. The messages
`
`
`
`
`
`
`
`
`preferably appear on the authority device or create an alert in
`
`
`
`
`
`
`
`substantially real—time (e. g., in less than 5 minutes). The
`
`
`
`
`
`
`
`
`realtime aspect of the messaging functions to enable authen-
`
`
`
`
`
`
`tication and authorization at the time ofthe transa ction, In one
`
`
`
`
`
`
`
`
`variation, tracking a registered authority device may addition-
`
`
`
`
`
`
`
`ally be performed by the auth platform. For example, in a
`
`
`
`
`
`
`
`
`persistent TCP/IP connection model, a mobile device moving
`
`
`
`
`
`
`
`from a service provider data network to a WiFi network may
`
`
`
`
`
`
`
`
`change IP addresses and therefore initiate a new persistent
`
`
`
`
`
`
`
`connection. Upon receiving that new connection and an iden-
`
`
`
`
`
`
`
`
`tifier of the mobile device, the auth platform preferably
`
`
`
`
`
`
`
`
`
`updates the state of the device for the account associated with
`
`
`
`
`
`
`
`
`
`that device. Then, the proper connection is preferably used for
`
`
`
`
`
`
`
`
`messaging the authority device. Some communication chan-
`
`
`
`
`
`
`
`nels may have limited throughput and lack the capability to
`
`
`
`
`
`
`
`
`
`present a full message from the auth platform. For example,
`
`
`
`
`
`
`
`
`
`SMS messages have a 160 character limit. An initial message
`
`
`
`
`
`
`
`
`may include a unique identifier, which can then be used to
`
`
`
`
`
`
`
`
`retrieve a full message. For example, the SMS message may
`
`
`
`
`
`
`
`
`
`include a URL link or code which can be used to retrieve a full
`
`
`
`
`
`
`
`
`message from an application or website. The full message
`
`
`
`
`
`
`
`may provide additional information and options for a trans-
`
`
`
`
`
`
`
`
`action response. The messages transmitted over the commu-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`nication channel may additionally be cryptographically
`signed and encrypted using an established setup between the
`
`
`
`
`
`
`
`
`auth device and the auth platform. Additionally the messages
`
`
`
`
`
`
`
`
`preferably include transaction information (i.e., metadata).
`
`
`
`
`
`
`The transaction information may include account or entity
`
`
`
`
`
`
`
`name, transaction details, location and time oftransaction, IP
`
`
`
`
`
`
`
`address ofinitiating host, geolocation ofthe IP address or any
`
`
`
`
`
`
`suitable information or any suitable data on the transaction. In
`
`
`
`
`
`
`one example an online bank transfer may have a message with
`
`
`
`
`
`
`
`
`
`transaction information including payer, payee, account
`
`
`
`
`
`
`numbers, transfer amotmt, and transaction date and time.
`
`
`
`
`
`
`
`
`Step $140, which includes receiving an authority
`[0014]
`
`
`
`
`
`
`
`a gent response from the authority device to the auth platform,
`
`
`
`
`
`
`
`
`functions to process a response from an authentic user or
`
`
`
`
`
`
`authorized user. The response preferably confirms or denies a
`
`
`
`
`
`
`
`transaction. The confirmation and denial of a transaction may
`
`
`
`
`
`
`
`additionally be set to indicate any suitable form of response.
`
`
`
`
`
`
`Preferably, the initial options are to accept or reject a trans—
`
`
`
`
`
`
`
`
`action. Additionally, if a transaction is rejected a reason for
`
`
`
`
`
`
`rejection may be included such as “canceled because of
`
`
`
`
`
`
`
`change of mind” or “possible malevolent transaction”. Other
`
`
`
`
`
`
`variations may include a variety of options that may change
`
`
`
`
`
`
`
`
`based on the application. The available fonns of responses
`
`
`
`
`
`
`
`
`Page 8 of 10
`
`Page 8 of 10
`
`

`

`US 2011/0219230 A1
`
`
`
`
`Sep. 8, 2011
`
`
`
`may be included in the message information. Other forms of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`responses may allow a variety of multiple-choice options,
`variable setting options, or any suitable form of response
`
`
`
`
`
`
`
`
`input. For example, if a parent is acting as an authorization
`
`
`
`
`
`
`provider for an ATM withdraws made by a child, a message
`
`
`
`
`
`
`
`may be sent to a phone of the parent indicating that the child
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is attempting to withdraw a particular amount (e.g., $50). The
`parent may be able to respond allowing a withdrawal of only
`
`
`
`
`
`
`
`a lower amount (e.g., $20). As an additional sub-step to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`receiving an authority agent response, the response is prefer—
`ably verified to be a legitimate response from the authority
`
`
`
`
`
`
`
`device as opposed to an entity imitating the device. Secure
`
`
`
`
`
`
`
`Socket Layer (SSL), a Hash-based Message Authentication
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Code (HMAC), message signing, or any suitable crypto—
`graphic protocol may be used to verify the response is from
`
`
`
`
`
`
`
`
`the authority device.
`
`
`
`[0015]
`Step 8150 and $152, which includes ifthe authority
`
`
`
`
`
`
`
`
`
`agent response confirms the transaction, communicating a
`
`
`
`
`
`
`confirmed transaction to the initiator, and if the authority
`
`
`
`
`
`
`
`
`
`
`
`
`
`agent response denies the transaction, communicating a
`denied transaction to the initiator, function to communicate
`
`
`
`
`
`
`the authentication and/or authorization to the initiator of the
`
`
`
`
`
`
`transaction. Any suitable response to a transaction is prefer-
`
`
`
`
`
`
`ably communicated back to the requesting entity (e.g., a third
`
`
`
`
`
`
`
`
`party website or anATM machine). The requesting entity can
`
`
`
`
`
`
`
`
`then preferably take appropriate action. If the transaction is
`
`
`
`
`
`
`
`confirmed or approved, the transaction proceeds. If the trans—
`
`
`
`
`
`
`
`action is denied or altered, the requesting entity preferably
`
`
`
`
`
`
`
`hafts or prevents the transaction. The requesting entity can
`
`
`
`
`
`
`
`
`preferably use the transaction response to modify a transac-
`
`
`
`
`
`
`
`tion state in any suitable manner. Based on the variety of
`
`
`
`
`
`
`
`
`
`
`responses from authentic users and/or authorized users. rules
`
`
`
`
`
`
`
`
`may determine when to confirm or deny a transaction. In a
`
`
`
`
`
`
`variation of the method, there may be a plurality of authority
`
`
`
`
`
`
`devices registered for authorization and]or authentication. A
`
`
`
`
`
`
`rule may be setup for which authority devices to mes sage, in
`
`
`
`
`
`
`
`
`What order, and the timing of the messaging. Additionally,
`
`
`
`
`
`
`
`
`rules may be set forreceived responses.A particular threshold
`
`
`
`
`
`
`
`for the number of responses from the plurality of authority
`
`
`
`
`
`
`
`
`devices may be set. For example, four authority devices may
`
`
`
`
`
`
`
`
`
`be messaged for authorization and at least three must confirm
`
`
`
`
`
`
`
`
`the transaction for it to be confirmed. In another example, a
`
`
`
`
`
`
`plurality of authority devices for authentication may be reg-
`
`
`
`
`
`
`
`istered, and the authority devices are messaged one after the
`
`
`
`
`
`
`
`
`
`other until at least one responds. The response from an author-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ity agent may alternatively be passed on to the requesting
`entity with no analysis.
`
`
`
`[0016] An alternative embodiment preferably implements
`
`
`
`
`
`
`the above methods in a computer-readable medium storing
`
`
`
`
`
`
`computer-readable instructions. The instructions are prefer-
`
`
`
`
`
`
`
`
`
`
`
`ably executed by computer-executable components prefer-
`ably integrated With an auth platform. The auth platform is
`
`
`
`
`
`
`
`
`preferably hosted on a distributed computing system or cloud
`
`
`
`
`
`
`based platform but may alternatively behosted in any suitable
`
`
`
`
`
`
`
`
`system. The computer—readable medium may be stored on
`
`
`
`
`
`
`any suitable computer readable media such as RAMS, ROMS,
`
`
`
`
`
`
`
`
`flash memory, EEPROMs, optical devices (CD or DVD), hard
`
`
`
`
`
`
`
`
`drives, floppy drives, or any suitable device. The computer-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`executable component
`is preferably a processor but the
`instructions may alternatively or additionally be executed by
`
`
`
`
`
`any suitable dedicated hardware device. The auth platform
`
`
`
`
`
`
`
`
`preferably includes an API for third party services and
`
`
`
`
`
`
`
`
`
`devices to use in initiating transactions and interpreting
`
`
`
`
`
`
`
`responses from the auth platform. The platfomi preferably
`
`
`
`
`
`
`
`
`
`Page 9 of 10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`includes a communication channel such as a public or private
`
`
`
`
`
`network or SMS network to communicate with at least one
`
`
`
`
`
`
`authority device. The authority device is preferably a mobile
`
`
`
`
`
`
`phone but may be any suitable personal computing device.
`
`
`
`
`
`
`
`
`[0017] As a person skilled in the art will recognize from the
`
`
`
`
`
`
`
`
`
`previous detailed description and from the figures and claims,
`
`
`
`
`
`
`
`
`modifications and changes can be made to the preferred
`
`
`
`
`
`
`
`embodiments of the invention without departing from the
`
`
`
`
`
`
`scope of this invention defined in the following claims.
`
`
`
`
`
`
`
`We claim:
`
`
`1. A method of completing a transaction comprising the
`
`
`
`
`
`steps of:
`
`
`registering an authority device for an account on an auth
`
`
`
`
`
`
`platform;
`receiving transaction request from an initiator to the auth
`
`
`
`
`
`
`
`platform;
`messaging the authority device with the transaction request
`
`
`
`
`
`
`
`wherein the message is pushed as a notification for an
`
`
`
`
`
`
`application of the authority device;
`
`
`
`
`
`
`
`
`
`
`receiving an authority agent response from the authority
`device to the auth platform, and cryptographically
`
`
`
`
`
`
`
`authenticating the response from the authority device;
`
`
`
`
`
`
`
`if the authority agent response confirms the transaction,
`
`
`
`
`
`
`
`communicating a confirmed transaction to the initiator;
`
`
`
`
`and
`
`ifthe authority agent response demes the transaction, com-
`
`
`
`
`
`
`
`
`municating a denied transaction to the initiator.
`
`
`
`
`
`2. A method of completing a transaction comprising the
`
`
`
`
`
`
`
`steps of:
`registering an authority device for an account on an auth
`
`
`
`
`
`
`platform;
`receiving transaction request from an initiator to the auth
`
`
`
`
`
`
`
`platform;
`messaging the authority device with the transaction
`
`
`
`
`
`
`request;
`
`
`
`
`
`
`
`receiving an authority agent response from the authority
`device to the auth platform;
`
`
`
`
`if the authority agent response confirms the transaction,
`
`
`
`
`
`
`
`communicating a confirmed transaction to the initiator;
`
`
`
`
`and
`
`ifthe authority agent response denies the transaction, corn-
`
`
`
`
`
`
`
`
`municating a denied transaction to the initiator.
`
`
`
`
`
`3. The method of claim 2, wherein messaging the authority
`
`
`
`
`
`
`
`
`device includes pushing a notification to a mobile application.
`
`
`
`
`
`
`4. The method of claim 3, wherein pushing a notification is
`
`
`
`
`
`
`
`performed over a channel with real—time alerts on the author—
`
`
`
`
`
`
`
`ity device.
`
`
`5. The method of claim 4, wherein pushing a notification
`
`
`
`
`
`
`includes sending an SMS message to the authority

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket