Nothing Special   »   [go: up one dir, main page]

AU2013263803B2 - A secure processing system for use with a portable communication device - Google Patents

A secure processing system for use with a portable communication device Download PDF

Info

Publication number
AU2013263803B2
AU2013263803B2 AU2013263803A AU2013263803A AU2013263803B2 AU 2013263803 B2 AU2013263803 B2 AU 2013263803B2 AU 2013263803 A AU2013263803 A AU 2013263803A AU 2013263803 A AU2013263803 A AU 2013263803A AU 2013263803 B2 AU2013263803 B2 AU 2013263803B2
Authority
AU
Australia
Prior art keywords
access
system based
perform
recited
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
AU2013263803A
Other versions
AU2013263803A1 (en
Inventor
Mark Rodney Anson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nowww US Pty Ltd
Original Assignee
Nowww US Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2012905181A external-priority patent/AU2012905181A0/en
Application filed by Nowww US Pty Ltd filed Critical Nowww US Pty Ltd
Priority to AU2013263803A priority Critical patent/AU2013263803B2/en
Publication of AU2013263803A1 publication Critical patent/AU2013263803A1/en
Application granted granted Critical
Publication of AU2013263803B2 publication Critical patent/AU2013263803B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

Abstract A machine-readable medium encoded with instructions to execute steps comprising: authorizing access to a system using a location of a portable communications device. PASSWORD AUTHENTICATION MODULE DEVICE IDENTIFIER AUTHENTICATION MODULE LOCATION IDENTIFIER AUTHENTICATION MODULE

Description

A SECURE PROCESSING SYSTEM FOR USE WITH A PORTABLE COMMUNICATION DEVICE
This application claims priority from Australian
Provisional Patent Application (s) : No. 2012905181 entitled ''A secure processing system for use with a portable communication device'' . The latter Provisional Application and also Australian Innovation Patent
Application (s) : No. 2013100331 also entitled ''A secure processing system for use with a portable communication device'' are both incorporated by reference as though fully set forth herein.
Background of Invention
Technical Field
The present invention pertains to the field of processing electronic transactions using a portable communication device, with particular reference, but not limited to, processing payments using a mobile phone.
Background Art
Portable communication devices and in particular mobile phones have been subject to theft and abuse. Attempts to protect legitimate users of portable devices have included password encryption and placing caps on mobile phone credits. Nevertheless, passwords are subject to guessing and so unauthorized access to a portable communication device can disclose sensitive information. Further, to the above, even if transactions performed on credit using a portable communication device are subject to rebate to a user who can establish unauthorized use of the device by a third party, the time involved in unwinding the transactions, in addition to emotional upset can be costly.
2013263803 28 Nov 2013
General problems with background art: despite the best attempts to secure portable communication devices against unauthorized access, it is a fact that theft and password tampering still present major security problems.
Specific problems with the background art:
despite the best efforts to improve password protection of portable devices, improvements in password hacking technology has meant that for each advance in encryption, new technologies are developed to bypass security measures .
Summary of Invention
Technical Problem
To ameliorate some of the effects of the general problems and the specific problems as recited above and in particular to provide, at least in part, an improved way of protecting mobile communication devices against unauthorized use and abuse.
Technical Solution
Central to the inventor's discovery is the realization that spatial 'location' of a device can play a significant role in protecting a portable communication device against unauthorized access --- that is that spatial location can be used as a security parameter (for credentialed identification purposes) not just a tracking parameter .
Advantageous Effects
Advantageous effects include: limiting access to a portable communication device by unauthorized persons and in particular ensuring that payments made by using the device are made securely.
In one broad aspect of invention there is provided a method for using spatial location of a portable communication device as a way of preventing unauthorized access to the device for purposes of authorizing a transaction .
Brief Description of Drawings
FIG 1 discloses a propagated signal in a preferred mode of invention.
FIG 2 discloses a preferred mode of invention in generic form.
FIG 3 discloses a preferred mode of invention in use.
FIG 4 discloses a viewable screen area of a mobile phone.
FIG 5 discloses a list of user contacts on a mobile phone screen .
FIG 6 discloses content information pertaining to a contact and fields to facilitate execution of payment.
FIG 7 discloses fields to permit a user to transfer money from the user's account into a third party contact account.
FIG 8 discloses further details to permit a user to transfer money from their account into the account of a third party.
FIG 9 discloses a facility for authenticating a user.
Detailed Description
Best Mode
Definitions and Terms
The description in the body of the specification pertains to 'preferred' modes of invention. Accordingly, features recited in the body of the specification should not be construed to be essential features of the invention unless explicitly indicated. Further, any reference in the body of the specification to the expression 'invention' should be construed to imply a reference to preferred embodiments only.
For purposes of the present specification it is to be understood that machine-readable instructions can be encoded in the form of software instructions on a machine-readable medium and firmware on a machinereadable medium; further hardware capable of executing a process otherwise undertaken by the instructions (using a microprocessor or a micro-controller) can alternatively be implemented using a digital circuit.
It is further understood, so to as apply a purposive construction and to ascribe a plain meaning to words used in this specification, that physical items recited in the specification and processes are deemed to occur in the context of electronics and telecommunications.
Passwords are to be understood to include information 'known' to a user, where the information corresponds to predetermined data stored in a database for purposes of authentication. It is further preferred that data, including passwords, stored on devices, in packets and in credentialing entities is encrypted.
A device identifier, as recited below, can in a broad form of invention correspond to any form of indicia capable of identifying a device including IMEISV numbers and MEID numbers.
FIG 1 shows a propagated signal in the form of a data packet as one preferred mode of invention, where the data packet 10 is sent from a portable communication device to a payment processing entity. The data packet 10 comprises the password 12 (preferably all aspects of the packet 10 being encrypted), the device identifier 14 in respect of the portable communication device and a location identifier 16 with respect of the location of the device. In a preferred mode, the device identifier 14 is the device's IMEI number. In a preferred mode, propagated signal 10, appearing in the preferred embodiment seen in FIG 1 as the data packet 10 will be used to authenticate a payment authorization for a product\service by sending the data packet 10 to a payment processing entity (not shown). Further to the above, an additional layer of encryption 13 (symmetric or asymmetric) can be used to safeguard the packet 10.
2013263803 28 Nov 2013
Mode for Invention
FIG 2 discloses a preferred mode of invention in generic form, in which instructions are encoded on an electronic machine-readable medium. Alternatively, digital circuit modules including comparators can execute the same process as prescribed by the instructions. It is important to realize that while the preferred mode as illustrated in FIG 2 shows all modules appearing in close association, it is to be understood that this is not in fact necessary in all embodiments. In particular modules 20-24 can be combined, at least in part, and modules 2024 can appear in separate spatial locations as members of different devices. What is necessary for proper credentialing, however, is that all modules 20-24 each yield a value of true, that is a digit '1', in respect of an AND truth table, so as to authenticate a transaction as being valid.
In one preferred embodiment, FIG 2, can be seen to include a machine-readable medium encoded with instructions to perform a credentialing operation, including, but not limited to, payment authorization. The medium 18 includes instructions at 20 to recognize a password. At 22, instructions are encoded to uniquely identify a device (typically but not limited to identification by way of an IMEI number, however any unique device identifier can suffice). At position 24 instructions are encoded to identify the location of a portable communications device.
The medium 18 can be located on the portable communications device. However, in a different preferred mode, security concerns could mandate that the medium 18
2013263803 28 Nov 2013 is located on a device at the secure office of a payment processing entity. Broadly, credentialing can occur both on the mobile communication device and also at the payment processing entity.
In a preferred generic mode of invention, the features shown in FIG 2 can be envisaged to take on a plurality of different forms. The password authentication module 20 can include a biometric data certification module, alternatively the password authentication module can be constructed and arranged to act upon a password that has been generated using a plurality of indicia including coloured objects, objects having specific geometric forms where the password is generated in association with a user's hand position in proximity to a touch screen while the user executes a swipe gesture. As previously recited, while a preferred mode can include an IMEI identifier other modes can be envisaged in which any form of indicia, including MEID numbers, unique to a particular portable communication device, can be used to identify the device.
Preferred embodiments of the present invention can include software and firmware as recited above. However, preferred embodiments are also adapted for hard-wired encoding in the form of a digital integrated logic chip.
Generally speaking, micro-controllers and microprocessors have increasingly replaced hard-wired integrated circuits because of the ease of encoding and also sophistication of the controllers (flexibility) and processors. Typically, a high level language like C or an application specific package can be used to encode instructions that are then translated into machine code in order to program the controller or the processor. However, one drawback presents itself as is seen with software in general and that is that controllers and processors are not only easily programmed they can also be easily re-programmed in many cases, by unauthorized persons.
Accordingly, in order to deal with the inherent vulnerability associated with software to hacking, classical integrated circuitry can, in some cases, provide greater protection than software controlled processors and controllers.
In so far as embodiments of the present invention are concerned the notion of 'location' as a security parameter can in one preferred mode, be dealt with by way of use of a magnitude comparator integrated circuit. Classically, comparators are used to determine if, in respect of two numbers A and B, whether A for example is greater than or equal to B. This notion of an integrated circuit comparator can be extended to embodiments of the present invention. For example, while the location of the portable communication device can be 'precise' in the sense of asking whether or not the device is located in a specific office, a specific building or a specific suburb, in many cases such precision could either not be obtainable nor required. For example, in the case of triangulation using mobile communication towers all that can be said is that estimates can be made as to where the device is located at any specific time to within a certain degree of accuracy. Nevertheless, the 'estimate' could be adequate for security purposes to the extent that the location of the device is associated with a range of permissible values that are linked to possible and also permissible locations for the device.
2013263803 28 Nov 2013
In contrast to mere 'estimates' of locations, precise GPS navigation for purposes of global mapping of each particular geographical location can be numerically encoded; subdivisions of any location can then be represented by further extending the numerical sequence associated with a first location in order to further prescribe an area with greater particularity for purposes of determining a location identifier. Accordingly, the question pertaining to location then becomes a question of deciding whether a particular location identifier 24 as seen in FIG 2 fits within a given numerical range. The notion of determining location identifiers can be generalized beyond mobile cell location and GPS navigation to use any method of locating a device including multilateration .
The broad principle of digital comparison can be demonstrated by consideration of classical integrated chips including the 74HC85 series chips that can be used to compare the magnitude of two numbers. Accordingly, while there has been a teaching away from using IC comparator chips in favour of using microprocessors and micro-controllers, the increased security, arguably associated with hard wired IC chip comparators makes for use of the IC chip version of any software embodiment as paradoxically being preferred in a security context despite the argument that chips are associated with a reduction in flexibility in comparison with software encoded microcontrollers and microprocessors. It must of course be said that 'any form' of digitised encoding of location (a location identifier) can be used provided that either a reference table or a functional relation between location identifiers can be used to determine the location of the device once the location identifier is provided. In the case of a reference table, the table can further be subject to system of encryption to make guessing of numerical ranges by persons seeking to illegally and falsely replicate a location identifier extremely difficult.
In use, one advantage of using a hard wired IC (integrated circuit) chip for magnitude comparison purposes is that if the digitised format for a location identifier does not fall within a given range, indicative of a physical location of a portable communication device, then an attempt to authorize a purchase by way of a swipe gesture (and associated transmission of a data packet) can be rejected by the payment processing entity. Similarly, cross synchronization across data including past and present histories for a user's physical location (location identifiers), device identity (IMEI numbers in one embodiment), passwords (potentially including biometric data and alternatively including voice recognition data) can all simultaneously be 'combined' in an authentication process.
In addition to the use of magnitude comparators, simple digital comparators can be used to determine equality between numbers. The simplest example of a hard wired IC chip comparator for illustrative discussion purposes to illustrate this concept is the classical 1-bit comparator that outputs the digit '1' if two single binary digit inputs are equal. Generalizing upon the notion of the 1bit comparator, multi-bit comparators can be constructed, which can in a simple form be formed from parallel 1-bit comparators that will output a '1' if two multi-bit numbers are equal. This notion can be used to construct two multi-bit comparators, one for purposes of comparing password identity (identity between a stored password and an input password) and one for comparing device identity (identity of a stored IMEI number and an input number device identifier).
In one preferred embodiment, FIG 2, can take the form of a plurality of AND circuits, each circuit including comparators and arguably in the case of location, at least one magnitude comparator (and in many cases at least two comparators for range comparison purposes). The circuits can be configured in parallel so that an output of the digit '1' will be indicative of a credentialed input (that can include a swipe gesture) --- a '1' being output from each comparator for purposes of credentialing a user's password, a device identifier and a location identifier (the credentialed result only being validated if a Boolean truth table for AND logic yields a digit of '1' --- true for all inputs).
Industrial Applicability
FIG 3 discloses a further preferred mode of invention, in use. As seen in FIG 3 a satellite GPS system 26 can be used to determine a user's location. The user carries a portable communication device 27 taking the form of a mobile phone in a preferred embodiment. In addition to the satellite 26, the mobile phone communication towers 28 can be used to triangulate upon the user's location (or alternatively to merely define the user as existing within a single tower's cell without the need for additional precision arising out of triangulation). Once the user's location has been determined (a location identifier having been generated), then the propagated
2013263803 28 Nov 2013 signal seen as a data packet 10 in FIG 1 can be transmitted to the payment processing entity 30 for authorization of a payment transaction. In a preferred embodiment the means illustrated in FIG 3 can be located at the payment processing entity 30 (alternatively secure and encrypted credentialing means can be located in the device 27 or in both the device 27 and in the payment processing entity 30).
In a preferred embodiment at least one of the components in the propagated signal seen in FIG 1 could be transmitted separately to other components of the signal. Further to the above, centralization of the means for processing the location identifier, the password and the device identifier can be used to impede access to encryption and authorization (credentialing) technology.
Further to above and in relation to the notion of 'combination' and synchronization of security features, it is observed that in principle, location of the portable communication device could provide, in itself, a crude form of credentialed access to an electronic system. However, a combination of features based upon passwords, device identifiers, location identifiers and encryption (symmetric and asymmetric) of signals can all be used either individually, in pairs or as at least three items that permit authorization of a user for purposes of entry into an electronic system and preferably for purposes of executing a secure payment.
However, the notion of 'combination' can be taken further. For example, in a preferred embodiment not only can 'current' information be made available to credential a secure transaction, however, 'past' information (a user's history) can be used to credential a transaction,
2013263803 28 Nov 2013 that is a user's electronic records can be used to determine, in a preferred embodiment, if a payment transaction is 'consistent' with the user's prior history or inconsistent with the prior history, hence raising a question as to fraudulent tampering with the user's transaction accounts. In particular, if the mobile communication device is identified as being located in a part of the State of New York, USA and then several minutes later the device is identified as being located in Sydney Australia, clearly a logical impossibility has occurred (as current technology does not permit an authenticated user's communication device to cross the world in a matter of minutes). In contrast criminals seeking to gain unauthorized access to a system, in particular, using a user's bank account and only a password for protection could do so from a remote location simply by attempting to guess the password, where the password is not combined with other indicia used to determine if a request to initiate a payment is 20 genuine. It is the notion of cross synchronization (combination) across different forms of security identifiers including passwords, location identifiers, device identifiers (being user specific, location specific and device specific respectively) and combination (synchronization) across time (temporally --using a past history pertaining to a user) that can be used to create a matrix of security parameters that must all mesh (synchronize) consistently so as to authenticate a transaction. Any failure of the parameters to mesh (all 30 yield a true answers as to validity) can then be used to trigger a query as to potential fraud. The trigger could then conceivably be used to initiate manual surveillance of the transaction with a view to prevention of electronic fraud.
Appendix
In use, various preferred embodiments in a retail context are discussed below.
Figure 4
A mobile phone or smartphone device 1101 has a viewable screen area 1102, which has touchscreen functionality.
By touching and interacting with the touchscreen a mobile phone user can interact with the device 1101 and with devices that 1101 is connected to via a mobile phone network, wifi network or other types of telecommunications networks.
Figure 5
Smartphones and similar devices contain records or listings of the phone numbers, names and possibly other details of people with whom a phone user is in contact. A list of other people a phone user is in contact with via the phone can be displayed on the screen as is depicted in figure 5.
Within the viewable screen area 1102 with touchscreen functionality, a list of items numbered 1108 are shown on the screen. Each of these 1108 areas contains the phone number 1107, name of contact 1106, personal profile image or avatar image 1105, and potentially other details of the contacts - people with whom the phone user communicates .
In the upper area of the touchscreen area 1102 there may be a form field 1103 into which the names of contacts may be entered, and the list of items 1108 below this will be populated with details of people matching the text entered in this 1103 form field. That is, if the characters ma are entered in 1103 then the list of items 1108 can display people with names including Mary
Smith, Mark Harris and so forth.
In the upper area there is also a button 1104 that, when pushed, will display a new screen where the details of a new Contact can be entered and stored in the database within the mobile phone.
Figure 6
When a phone user touches or taps the areas 1106, 1107 or 1105, as seen in Figure 5, within the area of an individual contact person 1108 then the screen can change to display the content and information shown in Figure 6.
In the upper section, 1110, of the touchscreen area 1102 the same content 1108 that was displayed in Figure 5 is again shown, but now in the prominent upper section of the screen.
Beneath this there is a Make a Payment button 1109 that when tapped, will commence a process by which the user can transfer money to the particular person 1108 whose details are shown at the top of the screen. Tapping, clicking or touching the button 1109 will cause the screen to change and display the new screen shown in Figure 7.
Beneath the area 1109 in Figure 6 is a list of items 1113 that contain details of previous transactions, which were made with the individual person 1108. The various separate items 1113 will have the date and time 1112 of each transaction, as well as the amount 1111 of each
2013263803 28 Nov 2013 transaction. Additional information may also be displayed within the 1113 transaction details area.
Figure 7
The Figure 7 shows items on the touchscreen that enable a user to transfer money from their account into the account of another person.
In the upper section 1117 of the touchscreen area 1102, the same content 1108 that was displayed in Figure 5 is again shown but now in the prominent upper section of the screen .
Beneath 1117 there is a form field 1114 into which the user will enter the amount of money to be transferred. Another area 1115 is also displayed with buttons that enable the user to choose to pay money now (being button 1118) or to pay later (being button 1119) .
To make a payment immediately, the user will touch the item 1116 and proceed with making a payment.
When a user touches the pay later button 1119 the screen transforms to show Figure 8.
Figure 8
This diagram shows items displayed to a user so that they can transfer money into the account of another person at a date in the future.
A user enters a value in form field 1114 and selects the option 1119 to pay later.
The user then actions item 1120, the schedule payments option, which is a drop down list box with various options, but with the default option Only Once currently selected. Other options in this drop down box include options for weekly, fortnightly and monthly payments .
Beneath the item 1120 is item 1121, the payment date. This item, 1121, on the screen contains three items.
These three items are the Day of Month item 1122, Month 1123 and Year 1124, with the current date automatically selected by default.
Beneath item 1121 is item 1128, a form field for entering the End Date for payments. There is a Day of Month item 1125, Month 1126 and Year 1127 items. Thus if a user were to choose to pay someone money Weekly with an End Date one year later, then 52 payments would be made in one embodiment.
Under item 1128 is a form field denoted by 1129, the Number of Payments form field, into which the user can enter a number. Thus, if two payments were scheduled, the payments would cease after the second payment was made.
Below 1129 is item 1130, a button, which is the No end date option. This is not selected by default, but by clicking this item, future transactions can be programmed for completion, at the frequency the user has chosen to select by using item 1120, with options including Weekly or Fortnightly.
Below item 1130 is item 1116, the button that is touched in order to submit an instruction to transfer money from the account of the current user into the account of the person whose details are shown at 1117.
When button 1116 is actioned the screen refreshes and shows the items depicted in Figure 9.
Figure 9
Figure 9 has a narrow outer zone that is divided up into ten colour sub-zones. The image depicted in Figure 9 is further divided up into four vertical columns containing six images in each column. This object provides a facility for authenticating a person attempting to make a transaction .
The owner of each financial account within the system will have previously recorded a Swipe movement that can be reproduced by interacting with the items depicted in Figure 9.
The user will touch one of the small pictures in the boxes in the central area and drag their finger to the edge of the screen, crossing over a particular coloured zone. For example, a user may touch their finger on the bicycle and drag their finger over to the black zone on the edge of the screen.
If the user reproduces the expected Swipe movement the user can be authenticated as a valid user.
In use, the system can require that a user perform two swipe actions. The user can choose to swipe the same image twice or they can swipe first one image and then another. If the user is required to touch and then swipe twice, the mathematical probability, in one embodiment, of a random person being able to reproduce that action and be authenticated is 57,600 to 1 against the person choosing the correct swipe movement.
If the user is authenticated, the user will see now see a message saying that their transaction has been successfully processed. If they provide incorrect input, the system will respond to that event accordingly.
This completes the processing of a Payment as seen from the point of view of a user of the system.
Additional to this process, that is visible to the user, the banking service that supports the payments system can receive and assess other data from the mobile phone, and this other data that underpins the payments service is included in the technology of the current invention (in one preferred embodiment).
As seen in Figure 1 in the main body of the specification, when a user actions the button 1116 shown in Figure 7 and Figure 8, the data in the form they have submitted can be immediately communicated through the mobile phone network to a banking service.
Alternatively, and advantageously, the system can be configured so that details within the form can be saved or recorded in memory in the hand held device until the next stage of the Payments Process is completed, (the Swipe movement taking place through interaction with the touchscreen 1131 as seen in Figure 9).
In one preferred embodiment, when the Swipe movement (credentialing operation) discussed in the context of Figure 9 above is completed, an array of data is sent from a mobile phone device to the networked servers of a banking service provider. The form details entered by the user comprise one half of this array of information. The second half of this array of data sent from the
2013263803 28 Nov 2013 mobile phone is a component comprising three items. These three items are a Location Identifier 16, a Device Identifier 14, and a Password 12. An additional layer of encryption (asymmetric or symmetric) can be added to safeguard the latter three items.
The Location Identifier 16 can include the latitude and longitude of the current device. The Device Identifier 14 can include the IMEI number that is unique to the device.
The Password can include data derived from a Swipe gesture which, if two swipe movements are utilized, is a swift and convenient movement for encoding a Password that an unauthorized person with a stolen phone in their hands is extremely unlikely to guess, given that the odds of choosing the proper movement are, in one embodiment, 57,600 to 1 against this movement being reproduced at random.
When the networked banking service receives the above data sent from a specific mobile phone which is identifiable by (i) it's IMEI number (ii) a specific location (that can be identified in one embodiment by a specific latitude and longitude) and (iii) a Password encoded in association with a Swipe movement, then the banking service can receive an array of data that makes it possible to determine whether the transaction should be approved. A further layer of security can be added to the three packeted indicia recited above (IMEI, specific location and password), being a layer of symmetric or asymmetric encryption.
The system described above enables a secure mobile phone banking system to process transactions on behalf of account owners with smartphones.
2013263803 28 Nov 2013
Copyright in drawings the subject of this application is reserved and remains the property of NOWWW.US Pty Ltd ACN 137 333 709 and its assigns.

Claims (12)

1. A portable communication device including a processor and a non-transient computer readable medium encoded with instructions to cause, in association with the processor, the device to execute steps comprising:
a) facilitating authorization of access of the device to a computer system based upon location of the device;
b) facilitating authorization of access of the device to the system based upon a permanent device identifier for the device;
c) facilitating authorization of access of the device to the system based upon a password entered into the device;
d) facilitating authorization of access of the device to the system based upon temporal synchronization;
where a data packet associated with the device is substantially encrypted with asymmetric key encryption.
2. The device as recited in claim 1, further encoded to perform a step comprising: facilitating authorization of access of the device to the system when the password is derived from a swipe gesture.
3. The device as recited in any one of claims 1-2, further encoded to perform a step comprising: facilitating authorization of access of the device to the system based upon biometric authentication.
4. The device as recited in any one of claims 1-3, further encoded to perform a step comprising: facilitating manual override of access to the system.
5. A non-transient computer readable medium included in a computer system and encoded with instructions to cause, in association with a processor included in the system, the system to perform steps comprising:
a) authorizing access of a portable communication device to the system based upon location of the device;
b) authorizing access of the device to the system based upon a permanent device identifier for the device;
c) authorizing access of the device to the system based upon a password received at the system from the device;
d) authorizing access of the device to the system based upon temporal synchronization;
where a data packet associated with the device is substantially encrypted with asymmetric key encryption.
6. The medium as recited in claim 5, further encoded to perform a step comprising: authorizing access of the device to the system when the password is derived from a swipe gesture.
7. The medium as recited in any one of claims 5-6, further encoded to perform a step comprising: authorizing access of the device to the system based upon biometric authentication .
8. The medium as recited in any one of claims 5-7, further encoded to perform a step comprising: facilitating manual override of access to the system.
9. A computer system including a processor and a nontransient computer readable medium encoded with instructions to cause, in association with the processor, the system to perform steps comprising:
a) authorizing access of a portable communication device to the system based upon location of the device;
b) authorizing access of the device to the system based upon a permanent device identifier for the device;
c) authorizing access of the device to the system based upon a password received at the system from the device;
d) authorizing access of the device to the system based upon temporal synchronization;
where a data packet associated with the device is substantially encrypted with asymmetric key encryption.
2013263803 16 Mar 2020
10. The system as recited in claim 9, further encoded to perform a step comprising: authorizing access of the device to the system when the password is derived from a swipe gesture.
11. The system as recited in any one of claims 9-10, further encoded to perform a step comprising: authorizing access of the device to the system based upon biometric authentication .
12. The system as recited in any one of claims 9-11, further encoded to perform a step comprising: facilitating manual override of access to the system.
AU2013263803A 2012-11-28 2013-11-28 A secure processing system for use with a portable communication device Active AU2013263803B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2013263803A AU2013263803B2 (en) 2012-11-28 2013-11-28 A secure processing system for use with a portable communication device

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AU2012905181 2012-11-28
AU2012905181A AU2012905181A0 (en) 2012-11-28 A secure processing system for use with a portable communication device
AU2013263803A AU2013263803B2 (en) 2012-11-28 2013-11-28 A secure processing system for use with a portable communication device

Publications (2)

Publication Number Publication Date
AU2013263803A1 AU2013263803A1 (en) 2014-06-12
AU2013263803B2 true AU2013263803B2 (en) 2020-04-09

Family

ID=50972962

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2013263803A Active AU2013263803B2 (en) 2012-11-28 2013-11-28 A secure processing system for use with a portable communication device

Country Status (1)

Country Link
AU (1) AU2013263803B2 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136573A1 (en) * 2005-12-05 2007-06-14 Joseph Steinberg System and method of using two or more multi-factor authentication mechanisms to authenticate online parties
US7866544B1 (en) * 2002-11-26 2011-01-11 Diebold Self-Service Systems Division Of Diebold, Incorporated Card reading automated banking machine authorization based on user location verification
US20110137804A1 (en) * 2009-12-03 2011-06-09 Recursion Software, Inc. System and method for approving transactions
US20110251892A1 (en) * 2010-04-09 2011-10-13 Kevin Laracey Mobile Phone Payment Processing Methods and Systems
US20120290468A1 (en) * 2011-05-13 2012-11-15 Benco David S Method and apparatus for secure payment using a network-connectable device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7866544B1 (en) * 2002-11-26 2011-01-11 Diebold Self-Service Systems Division Of Diebold, Incorporated Card reading automated banking machine authorization based on user location verification
US20070136573A1 (en) * 2005-12-05 2007-06-14 Joseph Steinberg System and method of using two or more multi-factor authentication mechanisms to authenticate online parties
US20110137804A1 (en) * 2009-12-03 2011-06-09 Recursion Software, Inc. System and method for approving transactions
US20110251892A1 (en) * 2010-04-09 2011-10-13 Kevin Laracey Mobile Phone Payment Processing Methods and Systems
US20120290468A1 (en) * 2011-05-13 2012-11-15 Benco David S Method and apparatus for secure payment using a network-connectable device

Also Published As

Publication number Publication date
AU2013263803A1 (en) 2014-06-12

Similar Documents

Publication Publication Date Title
US20200389464A1 (en) Systems and methods for proximity identity verification
US8473748B2 (en) Mobile device-based authentication
AU2019101847A4 (en) Method and device for authenticating near-field information, electronic apparatus, and computer storage medium
EP2936277B1 (en) Method and apparatus for information verification
US9596234B2 (en) Methods and systems for providing bidirectional authentication
GB2514419A (en) Improved user authentication system and method
KR20090051147A (en) Internet settlement system
US11631079B2 (en) Settlement system, user terminal and method executed therein, settlement device and method executed therein, and program
US11418507B2 (en) Method and system for authentication via location monitoring
KR101070727B1 (en) System and method for performing user authentication using coordinate region and password
KR20110069567A (en) Method for user authentication using graphic-dial-one time password apparutus thereof
EP3396611A1 (en) Settlement system, user terminal and method executed thereby, settlement device and method executed thereby, and program
US9462467B2 (en) Secure processing system for use with a portable communication device
KR101294805B1 (en) 2-channel authentication method and system based on authentication application
AU2013263803B2 (en) A secure processing system for use with a portable communication device
AU2013100331A4 (en) A secure processing system for use with a portable communication device
WO2017115557A1 (en) Settlement system, user terminal and method executed by same, settlement device and method executed by same, and program
KR20170072654A (en) Smart banking apparatus and method for enhanced security
KR20210052003A (en) User certification method and apparatus performing the same
Belal et al. A Model for Transaction Authentication In Internet Banking.
AU2013200905A1 (en) A method and system for generation of dynamic password

Legal Events

Date Code Title Description
MK5 Application lapsed section 142(2)(e) - patent request and compl. specification not accepted
NA Applications received for extensions of time, section 223

Free format text: AN APPLICATION TO EXTEND THE TIME FROM 06 SEP 2019 TO 06 APR 2020 IN WHICH TO GAIN ACCEPTANCE HAS BEEN FILED

NB Applications allowed - extensions of time section 223(2)

Free format text: THE TIME IN WHICH TO GAIN ACCEPTANCE HAS BEEN EXTENDED TO 06 APR 2020

FGA Letters patent sealed or granted (standard patent)