Processing

Please wait...

Settings

Settings

1. WO2001022201 - CONTEXT SENSITIVE DYNAMIC AUTHENTICATION IN A CRYPTOGRAPHIC SYSTEM

Publication Number WO/2001/022201
Publication Date 29.03.2001
International Application No. PCT/US2000/025748
International Filing Date 20.09.2000
Chapter 2 Demand Filed 19.04.2001
IPC
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
Q
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20
Payment architectures, schemes or protocols
G PHYSICS
07
CHECKING-DEVICES
F
COIN-FREED OR LIKE APPARATUS
7
Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
08
by coded identity card or credit card
10
together with a coded signal
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
32
including means for verifying the identity or authority of a user of the system
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29
Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02
Communication control; Communication processing
06
characterised by a protocol
G06F 21/00 (2006.01)
G06Q 20/00 (2006.01)
G07F 7/10 (2006.01)
H04L 9/32 (2006.01)
H04L 29/06 (2006.01)
CPC
G06F 21/31
G06F 21/32
G06F 21/33
G06F 21/40
G06F 21/41
G06F 21/64
Applicants
  • ETHENTICA, INC. [US/US]; 100 North Pointe Drive Lake Forest, CA 92630, US
Inventors
  • DICKINSON, Alexander, G.; US
  • BERGER, Brian; US
  • DOBSON, Robert, T., Jr.; US
Agents
  • ALTMAN, Daniel, E.; Knobbe, Martens, Olson & Bear, LLP 620 Newport Center Drive 16th Floor Newport Beach, CA 92660, US
Priority Data
60/154,73420.09.1999US
60/200,39627.04.2000US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) CONTEXT SENSITIVE DYNAMIC AUTHENTICATION IN A CRYPTOGRAPHIC SYSTEM
(FR) AUTHENTIFICATION DYNAMIQUE SENSIBLE AU CONTEXTE DANS UN SYSTEME CRYPTOGRAPHIQUE
Abstract
(EN)
A system for performing authentication of a first user to a second user includes the ability for the first user to submit multiple instances of authentication data which are evaluated and then used to generate an overall level of confidence in the claimed identity of the first user. The individual authentication instances are evaluated based upon: the degree of match between the user provided by the first user during the authentication and the data provided by the first user during his enrollment; the inherent reliability of the authentication technique being used; the circumstances surrounding the generation of the authentication data by the first user; and the circumstances surrounding the generation of the enrollment data by the first user. This confidence level is compared with a required trust level which is based at least in part upon the requirements of the second user, and the authentication result is based upon this comparison.
(FR)
L'invention concerne un système d'authentification d'un premier utilisateur pour un second utilisateur offrant la possibilité au premier utilisateur de soumettre plusieurs instances de données d'authentification dont l'évaluation et l'utilisation permettent de créer un niveau général de confiance dans l'identité demandée du premier utilisateur. Les instances d'authentification individuelle sont évaluées sur la base du degré de correspondance entre l'utilisateur fourni par le premier utilisateur pendant la technique d'authentification et les données fournies par le premier utilisateur pendant son inscription, de la fiabilité intrinsèque de la technique d'authentification utilisée, des circonstances entourant la production des données d'authentification par le premier utilisateur, et des circonstances entourant la production des données d'inscription par le premier utilisateur. Ce niveau de confiance est comparé avec un niveau de confiance requis basé au moins en partie sur les exigences du second utilisateur, le résultat d'authentification étant basé sur cette comparaison.
Also published as
Latest bibliographic data on file with the International Bureau