Language selection

Search

Patent 2611549 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2611549
(54) English Title: METHOD AND SYSTEM FOR PROVIDING A SECURE LOGIN SOLUTION USING ONE-TIME PASSWORDS
(54) French Title: METHODE ET SYSTEME PERMETTANT D'OBTENIR UNE OUVERTURE DE SESSION PROTEGEE AU MOYEN DE MOTS DE PASSE A USAGE UNIQUE
Status: Granted
Bibliographic Data
Abstracts

English Abstract




A method and system for a secure login solution for users logging into
computers and
systems that require authentication is provided incorporating one-time
passwords. The
method and system allows a user to establish a login key combination in
relation to a
login key structure. The login key combination is in association with an
identification
means, such as a username/ID, and allows the user to generate a one-time
passcode in
response to a random login key. The method and system is directed at
situations where
the user desires to log into a system from a computer or other electronic
device that may
not be secure, including for example from computers or devices other than the
user's own
and/or by using a communications connection that may not be secure, such as a
wireless
network connection. The method and system is simple and easy to implement and
does
not require the use of physical devices.


French Abstract

L'invention concerne un procédé et système permettant d'obtenir une ouverture de session protégée conçue pour des ordinateurs et systèmes nécessitant une vérification d'identité par mots de passe à usage unique. Cette procédure permet à un utilisateur de créer une clé d'ouverture de session formée d'une combinaison de touches associée à une structure de chiffrement d'ouverture de session. Cette combinaison de touches est liée à des moyens d'identification tels qu'un nom d'utilisateur ou un identifiant et permet à l'utilisateur de créer un mot de passe à utilisation unique tributaire d'une clé d'ouverture de session aléatoire. Ledit procédé et système est conçu pour des situations où l'utilisateur veut ouvrir une session à l'aide d'un ordinateur, système ou autre dispositif électronique qui pourrrait ne pas être sécuritaire y compris, par exemple, des appareils de tiers ou des liens de communication non sécurisés tels que les voies d'un réseau sans fil. Il s'agit là d'une procédure simple et facile à mettre en ouvre ne nécessitant aucun périphérique physique.

Claims

Note: Claims are shown in the official language in which they were submitted.




CLAIMS

Page 1


METHOD AND SYSTEM FOR PROVIDING A SECURE LOGIN SOLUTION
USING ONE-TIME PASSWORDS


What is claimed is:


1. A method for enabling a user to log into a system requiring authentication,
the
method comprising:

(a) providing a random login key to the user;

(b) receiving from the user an identification means and a passcode, wherein
the passcode is generated by the user from the characters contained in the
random login key and is based on

(i) a login key combination previously defined by the user, which may
be of variable length; plus

(ii) a PIN code previously defined by the user which may be
embedded anywhere within the passcode and whose characters are
contained in the login key;

(c) and comparing the passcode to the random login key based on
(i) the login key combination associated with the user; and
(ii) the PIN code associated with the user;

and authenticate the user if the user supplied identification means and the
characters contained in the passcode are a match.

2. A system for authenticating a user requesting access to protected
resources, the
system comprising:



CLAIMS

Page 2


(a) a display means linked to a computer, whereby the display means is
operable to provide instructions to the user;

(b) an input means linked to the computer, whereby the input means enables
the user to provide identification means and a passcode;

(c) a means for storing and retrieving the user's information, the user's
information including the identification means and

(i) a login key combination previously defined by the user, which may
be of variable length; and

(ii) a PIN code previously defined by the user;

(d) and an authentication facility linked to the computer, the authentication
facility being operable to provide instructions to the computer to:

(i) provide a random login key to the user via the display means;

(ii) receive from the user via the input means the identification means
and the passcode, wherein the passcode is generated by the user
from characters contained in the random login key and is based on
(A) the login key combination associated with the user, which
may be of variable length; plus

(B) a PIN code previously defined by the user which may be
embedded anywhere within the passcode and whose
characters are contained in the login key;

(iii) and compare the passcode to the random login key based on
(A) the login key combination associated with the user; and
(B) the PIN code associated with the user;

and authenticate the user if the user supplied identification means



CLAIMS

Page 3


and the characters contained in the passcode are a match.

3. A computer program product, for use on a computer, the computer program
product comprising:

(a) a computer usable medium; and

(b) computer readable program code recorded or storable on a computer
useable medium, the computer readable program code defining an
authentication application on a computer that is operable on the computer
to:

(i) provide a random login key to a user;

(ii) receive from the user identification means and a passcode, wherein
the passcode is generated by the user from characters contained in
the random login key and is based on

(A) a login key combination previously defined by the user,
which may be of variable length; plus

(B) a PIN code previously defined by the user which may be
embedded anywhere within the passcode and whose
characters are contained in the login key;

(iii) and compare the passcode to the random login key based on
(A) the login key combination associated with the user; and
(B) the PIN code associated with the user;

and authenticate the user if the user supplied identification means
and the characters contained in the passcode are a match.

Description

Note: Descriptions are shown in the official language in which they were submitted.



CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 1

METHOD AND SYSTEM FOR PROVIDING A SECURE LOGIN SOLUTION
USING ONE-TIME PASSWORDS

Field of the Invention

The present invention relates to methods and systems for a secure login
solution for users
of computers and systems, local and/or remote. The present invention further
relates to
identification means, such as usernames/IDs, PIN codes and one-time passwords.
Background of the Invention

Every day computer users login to computers and systems that require
authentication by
providing the authenticating system with information that will positively
identify the
user. In most cases that information consists of a username/ID and a matching
static,
reusable password. Replacing such static passwords with single-use passwords
and,
where possible, using two-factor authentication is one approach for securing
corporate
networks, applications and information assets.

Unfortunately, use or transfer of sensitive information can create security
vulnerabilities
for many different reasons. For example, in situations where the user attempts
to login to
a system from a computer or other electronic device using a communications
connection,
such as the Internet, information traveling over the network may be
intercepted by
unauthorized individuals using network sniffers. This information can then
subsequently
be used to illegally obtain access to the system. The use of more secure
communications
protocols, such as Secure Socket Layer (SSL), improves security by encrypting
the
information being transmitted, thereby making it virtually impossible for
others to use it


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 2

to gain access to the system, even if they manage to intercept the user
identifying
information. Unfortunately many authenticating systems do not use secure
protocols,
leaving sensitive information vulnerable to attack.

Another problem with authentication using a static, reusable password is that
hackers
may be able to gain access to the system by guessing the password. This
applies not only
to weak passwords that can be uncovered by using dictionary attacks, often
passwords
include the user's name, his nickname, spouse's or pet's name, etc. Although
this threat
can be reduced by having the authenticating system impose a maximum number of
login
attempts before blocking the account, it remains a real threat nonetheless.

One significant security threat involves widely available spyware, including
keystroke
capturing software which, as the name suggests, captures the keystrokes that
are made on
a computer's keyboard and stores this information for later retrieval by or
transmission to
the person or persons who installed the software or who know of its presence.
In many
cases, the existence of this software is difficult or virtually impossible to
detect. Even if
encryption of the information is used during transmission over a network, the
presence of
this type of software on the computer from which a user logs in is not going
to provide
any security, as the username/ID and password have already been captured at
the source,
before it has been encrypted. This threat is particularly acute when the user
is accessing
systems from a computer or other electronic device that may not be his own,
such as
other people's computers or, more particularly, computers found in public
places such as
hotels, airports and Internet cafes, to name but a few.

In view of these vulnerabilities and in order to limit the risk of
unauthorized access,
methods are available that enable the use of one-time passwords (OTP), thereby
greatly
increasing login security. In such cases, where passwords are only valid for a
single
login, even capturing or knowing the password will be meaningless as it can
only be used


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 3

once. In broad terms there are two major types of OTP solutions: (i) hardware
based
solutions; and (ii) S/KEY based solutions.

Hardware based solutions

The vast majority of OTP solutions involve the use of some kind of physical
device, such
as tokens, smart cards, USB flash drives, etc., that will generate them.
Companies
providing such hardware based solutions include VERISIGNTM, ACTIVIDENTITYTM,
VASCOTM and RSA SECURITYTM to name a few. Most, like RSA's authentication
token for example, generate a new 6-digit numeric passcode every 30 or 60
seconds that
will be used together with a user's PIN code to create a one-time password.
This is
generally referred to as two-factor authentication.

Other approaches, such as the systems and methods taught in European Patent
Application No. EP 1 445 917 to Kuclar et al. and United States Patent
Application No.
2003/0172272 to Ehlers et al. for example, include the use of a mobile
communications
device, where the one-time password is sent by the authenticating system to
the user's
mobile phone or other mobile device via a Short Message Service (SMS). Other
systems,
such as those described in United States Patent Application No. 2002/0038426
to
Pettersson et al. and United States Patent No. 6,636,973 to Bagley for
example, use
biometric devices such as iris scanners and fingerprint scanners to positively
identify the
user. All of the above described methods require the use of a physical device.

The use of physical devices however has several distinct disadvantages. In
addition to
the significant cost of implementing device-based solutions, particularly
where the
number of users is large, their biggest drawback is that the authentication
device may not
be available, be rendered useless by abuse or accident or may be lost. In the
latter case
there is a theoretical chance of an individual gaining unauthorized access to
a system
where for example key-stroke logging software was running on the computer from
which


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 4

a login was attempted and the username/ID and the static password or PIN code
have
already been captured. Although the risk in the case of loss can be minimized
by the
immediate reporting of the loss of the device, all scenarios mentioned above
will prevent
a legitimate user who, for whatever reason, does not have access to the
authentication
device from obtaining access to the remote system. The use of non-OTP access
in that
case could of course significantly compromise security.

S/KEY based solutions

These are software solutions based on S/KEY, a one-time, challenge-response
password
scheme developed for use on UNIXTM-like operating systems to authenticate a
user based
on a one-way hash function. Generic open source implementations can be used to
enable
its use on other systems.

A user's real password is not directly transmitted across the network. Rather,
the real
password is combined with a short set of characters and a decrementing counter
to form a
one-time password. As the one-time password is only used once, passwords
intercepted
by a password sniffer or keystroke logger are not useful to an attacker.

Because the short set of characters does not change until the counter reaches
zero, it is
possible to prepare a list of single-use passwords, in sequence, that can be
carried by the
user. Alternatively, the user can present the password, characters and desired
counter
value to a local calculator to generate the appropriate one-time password that
can then be
transmitted over the network.

The S/KEY solution, however, also has drawbacks. It is sensitive to a "man in
the
middle" attack if used by itself, although this could be solved by using SSL
or a similar
security protocol which authenticates the server and gives point-to-point
security between
the client and server.


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 5

In addition, the secret passwords used by S/KEY solutions may of course never
travel
across an insecure network and it is the user's responsibility to see to this.
A user should
therefore only be able to change his secret password or create a new list of
one-time
passwords when logged in from a machine on a secure network or on the console
of the
system.

Lastly, because the number of hash function iterations executed by the user
decreases by
one each time, this solution of course requires the user to re-initialize the
system
whenever the last single-use password has been used or he will be unable to
log in again.
One approach where no device is necessary is taught in United States Patent
Application
No. 2006/0206919 to Montgomery et al., which describes a method where the user
is
required to generate a one-time PIN code by performing mathematical
manipulations on
the user's known PIN code and a system supplied random number or on the user's
known
PIN code, a system supplied random number and a transformation PIN code,
making it
prone to error and less user-friendly.

In view of the foregoing, what are needed are methods and systems for enabling
secure
login solutions using OTP that overcome the limitations and disadvantages of
the prior
art. In particular, what are needed are methods and systems for enabling
secure login
solutions using OTP that are easy to implement, require no physical devices,
require no
extra computational power, and require no mathematical or other data
manipulation on
the part of the user.


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 6
Swwnarv of the Invention

The present invention is directed at a method and system for a secure login
solution using
one-time passwords.

In one aspect, the present invention is a method for enabling a user to login
to a system
requiring authentication, the method comprising: providing a random login key
to the
user; receiving from the user identification means and a passcode, wherein the
passcode
is generated by the user in response to the random login key and is based on a
login key
combination previously defined by the user; and comparing the passcode to the
random
login key based on the login key combination associated with the user, and
authenticate
the user if the user supplied passcode is a match.

The random login key in accordance with the present invention is a number of
characters,
of which both the length and the structure are defined by the authenticating
system. This
login key can be numeric, alphabetic or alpha-numeric (lower case and/or upper
case),
where a case-sensitive alpha-numeric key of course provides the greatest
security. The
login key is provided to the user in accordance with a particular login key
structure,
which can be simply a line of characters, or a matrix of characters, for
example. Other
structures are possible and depend on the number of characters in the login
key.

The user must first create a login key combination. The login key combination
is a fixed
number of characters for each user chosen in a particular sequence in response
to a login
key structure. The login key combination dictates the passcode which will be
entered in
response to the random login key, the passcode enabling authentication on
subsequent
logins.

The login key combination is established by the user and is stored in
association with the
user's identification means, such as his username/ID. The user authenticates
himself by


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 7

providing the authenticating system with the identification means and a
passcode,
wherein the passcode consists of the specific number of characters from the
random login
key, entered in the specific sequence, as defined by the user's login key
combination and
available to the authenticating system. In two-factor authentication, this
will be
combined with the user's PIN code.

Although the number of characters used in the random login key should be fixed
for each
authenticating system, it can theoretically be of any length. The larger the
number of
characters in the random login key, and the greater the number of characters
required to
create the passcode, the greater the security. To enhance security even
further, passcodes
could be made case sensitive and could even include special characters.

In another aspect, the present invention is a system for authenticating a user
on a
computer, the system comprising: a display means linked to the computer,
whereby the
display means is operable to provide instructions to the user; an input means
linked to the
computer, whereby the input means enables the user to provide identification
means and
a passcode; a means for storing and retrieving the user's information, the
user's
information including the identification means and a login key combination
previously
defined by the user; and an authentication facility linked to the computer,
the
authentication facility being operable to provide instructions to the computer
to: (i)
display a random login key to the user via the display means; (ii) receive
from the user
the identification means and the passcode, wherein the passcode is generated
by the user
in response to the random login key and is based on the login key combination
associated
with the user; and (iii) compare the passcode to the random login key based on
the login
key combination associated with the user, and authenticate the user if the
user supplied
passcode is a match.

In yet another aspect, the present invention is a related computer program
product.


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number. 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 8

The present invention provides a simple and elegant means of providing a
secure login
solution, and can be implemented alone or by using two-factor authentication.
The
present invention does not require an authentication or other device, and the
method and
system are much more user-friendly than existing methods not requiring a
device.


Brief Descrintion of the Drawings

A detailed description of the preferred embodiments is provided herein below
by way of
example only and with reference to the following drawings, in which:

FIG.1 illustrates a flowchart of a sample login procedure;

FIG. 2-4 illustrate example screen shots of a login procedure;

FIG. 5 illustrates a flowchart of a sample login combination definition
procedure; and
FIG. 6-14 illustrate example screen shots of a login combination definition
procedure.

In the drawings, one embodiment of the invention is illustrated by way of
example. It is
to be expressly understood that the description and drawings are only for the
purpose of
illustration and as an aid to understanding, and are not intended as a
definition of the
limits of the invention.

Detailed Descrintion of the Invention

The present invention is directed at a method and system for a secure login
solution using
one-time passwords for users logging into computers and systems (local and/or
remote)
where authentication is required and which has access to a database or other
means to


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 9

record and retrieve the user's information, encrypted or otherwise. This user
information
could include an identification means such as a username/ID, a static reusable
password
(if used), a PIN code (if two-factor authentication is used), and a login key
combination
defined by the user.

It should be understood that although a username/ID is discussed herein as a
means for
identifying the user to the authenticating system, the present invention is
not limited as
such and contemplates any other suitable mechanisms for identifying the user
to the
system for the purposes of retrieving the user's login key combination.

The authentication steps, implemented on an authenticating system, generally
include the
following: displaying to the user information to indicate that the user is
required to log in;
displaying to the user the appropriate login page; displaying to the user a
random login
key and having the user enter his username/ID and a passcode generated from
the random
login key in relation to the user's login key combination as previously
recorded; verifying
that the user supplied username/ID and passcode match the username/ID and the
passcode as determined from the random login key and the user's login key
combination;
and authenticating the user if the username/ID and passcode are matched.
Optionally, the
user can be offered to return to a standard login page if no previously
recorded login key
combination exists.

The random login key can consist of a random combination of characters of a
fixed
length and format, in accordance with the login key structure, and is
generated by the
authentica.ting system at every login attempt. For illustration purposes, an
eight (8)
character alpha-numeric lower- or upper-case passcode will offer close to 3
trillion
possible combinations, while the same passcode using a case-sensitive login
key would
offer 218 trillion possible combinations. Although the user generated one-time
passcode


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 10

makes it meaningless to an attacker who discovers or intercepts it, encryption
of the
passcode during transmission over a network will further enhance security.

The user must first create a login key combination if none exists. The login
key
combination represents a fixed number of characters for each user, chosen in a
particular
sequence in response to a login key. The login key combination dictates the
passcode
which will be entered in response to the random login key, the passcode
enabling
authentication on subsequent logins.

If a login key combination does exist, then preferably the user is able to
change the
existing login key combination by first displaying to the user a random login
key and
having the user enter a passcode generated from this login key and the user's
previously
recorded login key combination. A database or other means is used to record
the user's
new or changed login key combination in association with other identifying
information,
such as the user's username/ID.

A verification step can be included, whereby the user verifies the new or
changed login
key combination by displaying a random login key and having the user enter a
passcode
generated from this login key and the user's most recently recorded login key
combination. The user can then be notified that the entered passcode was
correct or that
the entered passcode was incorrect. In the latter case the user can try again
or define a
new login key combination.

The authenticating system may optionally assign a limited lifespan to the
random login
key. For example, the authenticating system could assign a lifespan of 30 or
60 seconds
to the random login key, after which time it will have expired.

The user-defined sequential combination of the fixed number of characters for
the login
key combination can be of a fixed length for all users or of a length that
falls within a


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 11

specified minimum and maximum range, as deterniined by the authenticating
system.
For example, an authenticating system might prescribe a fixed length for all
login key
combinations or might allow users, at their discretion, to select a fixed
number of
characters that is no less than a prescribed minimum number of characters and
no more
than a prescribed maximum number of characters.

A system embodying the present invention includes a display means operable to
provide
instructions to a user, an input means operable to receive the user
information (including
login key combination and passcode), and a database or other means of storing
and
retrieving user information, including the user's identification means, the
user's static
reusable password (if used), the user's PIN code (if two-factor authentication
is used) and
the user's login key combination. The system may include a network of
computers such
that the user information for a plurality of users can be stored and retrieved
on one or
more centralized databases.

Although any system that requires user authentication will benefit from the
present
invention, one of the greatest beneficiaries of OTP systems will be e-commerce
sites and
banks. Most, if not all, banks still have their customers log in to do their
Internet banking
and pay their bills using static passwords to authenticate themselves, and the
number of
customers is growing.

Despite the explosive growth of online banking and online bill payment
services, studies
find that Internet users have growing concerns about security and the
compromising of
personal data.

One of the most often mentioned security problems frightening consumers is
spyware, as
mentioned above, which is malicious software installed on a user's machine
without
knowledge or authorization. This type of software comes in different flavours,
with some
that secretly log users' keystrokes to steal passwords and other sensitive
information.


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 12

But the security problem online consumers say they find the most frightening
is
unauthorized access to their personal and financial information that criminals
can use to
steal identities and inflict serious damage to their finances and credit.

As a result, banks are under growing pressure to find more secure alternatives
to the
currently used static, reusable password. Unfortunately, the cost of
implementing the use
of authentication devices and their associated systems for such a large number
of online
banking customers would be prohibitive while the necessary help-desk activity
and the
ongoing management and replacement or removal of users would be extremely time
consuming and create a logistical nightmare.

Advantageously, the present invention provides the same security of one-time
passwords
but without the high cost and management required for device-based systems. It
is also
significantly more user-friendly, and thus safer, for consumers than an S/KEY-
based
solution or solutions that require mathematical or other data manipulation on
the part of
the user..

The present invention can be implemented by companies directly into their own
systems,
or be used by a third party to provide the authentication service, redirecting
the customer
to the appropriate system after the customer has been successfully
authenticated.

Any presently available or future developed computer software language and/or
hardware
components can be employed in the embodiments of the present invention, in a
manner
that is known. For example, the functionality mentioned above could be
implemented
using many different computer software languages, including VISUAL BASICTM,
JAVATM, CTM, C++TM or any assembly language appropriate in view of the
processor
being used, or any combination of such software languages, in a manner that is
known.


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 13

The present invention significantly enhances login security for users logging
into
computers and systems that require authentication. As various changes can be
made in
the embodiments and operating methods without departing from the spirit or
scope of the
invention, it is intended that all matter contained in the above description
or shown in the
accompanying drawings and figures should be interpreted as illustrative and
not in a
linziting use.

EXAMPLE
Login procedure

The flow chart of the login procedure provided as FIG. 1 illustrates a process
that could
be used by an authenticating system. If the option of authenticating a user by
a
username/ID and a matching static, reusable password is available, the
authenticating
system would direct the user to a standard login page where the user can
supply and
submit this information. If the username/ID and the password match, the user
is
authenticated and allowed access, otherwise the user will be so advised and be
requested
to try again.

On the standard login page the user will also be given the opportunity to
proceed to the
enhanced security login page where a random login key is displayed. The user
is
requested to supply and submit his username/ID and a passcode created from the
displayed login key and the user's previously defined login key combination.
If the
username/ID and the passcode generated from the supplied login key match, the
user will
be allowed access, otherwise the user will be so advised and be redirected
back to the
enhanced security login screen to try again.

Since, in order to use the enhanced security option the user must have
previously defined
a login key combination which must also be available to the authenticating
system, the


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 14

user is offered the opportunity to return to the standard login page if he has
not already
done so.

FIG. 2 depicts a sample login screen where a username/ID and a password can be
used
for authentication purposes. This type of authentica.tion is generally used
and appropriate
when access is sought to systems in a more secure environment, including for
example
from a computer which is the user's own. If enhanced security is required the
user will
have the option to go to the enhanced security login page.

FIG. 3 and FIG. 4 show a sample enhanced security login screen where a random
login
key is displayed and the user is requested to provide a usernameJID and a
passcode
generated from the login key and the user's pre-defined login key combination.
The
login key, randomly generated by the authenticating system, is different with
every login
attempt. The login key structure for FIG. 3 is simply a horizontal line of
characters, with
five sets of four characters separated by a hyphen. FIG. 4, where the login
key structure
is in matrix form, may be easier for some users to recall their login key
combination since
the login key combination can take the form of a familiar geometric shape,
such as "L",
"T", or "X".

In cases where static, reusable passwords are not used, the user will be
presented with
this login screen only. The reference to the standard login screen would in
such case of
course be omitted. Random login keys can be given a limited lifespan, for
example 30
seconds, after which they will have expired.

Defining the login key combination

The user must first establish their login key combination. As shown by way of
example
in FIG. 5, the procedure for defining a login key combination is a process
that can be
used by an authenticating system. The authenticating system identifies whether
the user


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 15

already has a previously defined login key combination. If the user does not,
he will be
directed to the login key combination definition screen. If he does have a
previously
defined login key combination, he will be shown a random login key and be
requested to
provide the proper passcode created from that login key and the user's
previously defined
login key combination. If the supplied passcode is correct, the user would be
directed to
the login key combination definition screen.

On the definition screen the user will be asked to create a login key
combination by
defining a specific number of characters and a specific order in which those
characters
will be entered from the random login key, to create the correct one-time
passcode.

After the user defined combination has been recorded, the user may be asked to
verify his
combination by having the authenticating system display a random login key and
asking
the user to provide the proper passcode based on the displayed login key and
his just
defined login key combination.

If the supplied passcode was correct the user will be so notified, if it is
incorrect he will
be so notified and offered the opportunity to try again by entering the
correct passcode or
he will be able to define a new login key combination.

FIG. 6 and FIG. 7 illustrate sample screens where a user defined login
combination
already exists and the user is asked to authenticate himself before being
allowed to create
a new combination.

Once the user is authenticated, or if this is the first time a login key
combination is to be
recorded, the user is given instructions to define a number of characters and
the order in
which those characters will be entered from the random login key, in order to
create the
correct one-time passcode on subsequent logins. This is shown in FIG. 8 and
FIG. 9.
The number of characters required for a passcode must be fixed for each user
but,


CA 02611549 2007-11-27
Priority Document:
USPTO provisional application number: 60868941
Filing date: December 7, 2006

DESCRIPTION
Page 16

depending on the authenticating system, individual users may be allowed to
have
passcodes with a length that falls in a specified range. This sample screen
shows that a
system specified fixed number of eight characters will be used for the
passcode. The user
is free to select characters in any random order and is allowed to select the
same character
more than once. In this sample screen, characters are selected by clicking
them in the
order in which they will be entered on subsequent logins.

Once the login key combination has been defined and recorded, this sample
screen allows
the user the opportunity to confirm his definition by entering a valid
passcode based on a
random login key and the just recorded combination. This is shown in FIG. 10
and FIG.
11.

An acknowledgement like that depicted in FIG. 12 shows the user that the
entered
passcode was correct.

Alterna.tively, as shown if FIG. 13 and FIG. 14, the screen indicates to the
user that the
entered passcode was incorrect and the user is given the option to enter the
proper
combination again or to define a new login key combination.

Variations or modifications to the design and construction of this invention,
within the
scope of the invention, may occur to those skilled in the art upon reviewing
the disclosure
herein. Such variations or modifications, if within the spirit of the
invention, are intended
to be encompassed within the scope of any claims or patent protection issuing
upon this
invention.

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date 2011-04-19
(22) Filed 2007-11-27
Examination Requested 2008-07-18
(41) Open to Public Inspection 2009-05-27
(45) Issued 2011-04-19

Abandonment History

There is no abandonment history.

Maintenance Fee

Last Payment of $125.00 was received on 2019-08-29


 Upcoming maintenance fee amounts

Description Date Amount
Next Payment if small entity fee 2022-11-28 $253.00
Next Payment if standard fee 2022-11-28 $624.00

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Application Fee $200.00 2007-11-27
Request for Examination $400.00 2008-07-18
Maintenance Fee - Application - New Act 2 2009-11-27 $50.00 2009-09-11
Advance an application for a patent out of its routine order $500.00 2009-10-27
Maintenance Fee - Application - New Act 3 2010-11-29 $50.00 2010-09-08
Final Fee $150.00 2011-02-04
Maintenance Fee - Patent - New Act 4 2011-11-28 $50.00 2011-09-08
Maintenance Fee - Patent - New Act 5 2012-11-27 $100.00 2012-08-30
Maintenance Fee - Patent - New Act 6 2013-11-27 $100.00 2013-10-10
Maintenance Fee - Patent - New Act 7 2014-11-27 $100.00 2014-09-08
Maintenance Fee - Patent - New Act 8 2015-11-27 $100.00 2015-10-28
Maintenance Fee - Patent - New Act 9 2016-11-28 $100.00 2015-10-28
Maintenance Fee - Patent - New Act 10 2017-11-27 $125.00 2015-10-28
Maintenance Fee - Patent - New Act 11 2018-11-27 $125.00 2018-11-05
Maintenance Fee - Patent - New Act 12 2019-11-27 $125.00 2019-08-29
Maintenance Fee - Patent - New Act 13 2020-11-27 $125.00 2019-08-29
Maintenance Fee - Patent - New Act 14 2021-11-29 $125.00 2019-08-29
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
PLESMAN, PAUL
Past Owners on Record
None
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Claims 2010-10-21 3 99
Abstract 2007-11-27 1 28
Description 2007-11-27 16 715
Claims 2007-11-27 3 71
Drawings 2008-07-18 7 377
Claims 2008-07-18 3 81
Cover Page 2009-05-20 1 33
Claims 2010-05-04 3 88
Representative Drawing 2010-12-03 1 12
Abstract 2011-01-24 1 28
Cover Page 2011-03-23 2 48
Drawings 2007-11-27 8 669
Correspondence 2010-08-30 1 53
Prosecution-Amendment 2010-10-21 4 158
Correspondence 2009-10-27 1 15
Correspondence 2011-02-04 1 32
Prosecution-Amendment 2009-10-27 2 72
Prosecution-Amendment 2009-10-30 1 11
Fees 2011-09-08 1 163
Prosecution-Amendment 2010-03-26 3 132
Correspondence 2008-01-08 1 97
Correspondence 2008-01-08 1 17
Assignment 2007-11-27 4 108
Prosecution-Amendment 2008-07-18 17 580
Correspondence 2008-08-22 1 84
Correspondence 2009-08-31 1 55
Prosecution-Amendment 2009-10-05 1 36
Correspondence 2009-09-11 1 27
Fees 2009-09-11 1 57
Prosecution-Amendment 2009-12-01 3 89
Prosecution-Amendment 2009-12-02 3 148
Maintenance Fee Payment 2018-11-05 1 33
Correspondence 2011-08-30 2 103
Prosecution-Amendment 2010-05-04 7 272
Prosecution-Amendment 2010-08-02 4 165
Fees 2010-09-08 1 49
Correspondence 2011-01-24 1 87
Fees 2012-08-30 1 163
Maintenance Fee Payment 2019-08-29 1 33
Fees 2013-10-10 1 33
Fees 2014-09-08 1 33
Fees 2015-10-28 1 33