Process of remote user authentication in computer networks to perform the cellphone-assisted secure transactions

ABSTRACT

This invention relates to processes of personal user authentication in computer and mobile wireless communications networks to perform transactions including payments. The process provides remote user authentication in various computer networks, the Internet inclusive, to perform secure transactions such as e-commerce and remote banking (on-line banking, remote banking, direct banking, home banking, internet banking, PC banking, phone banking, mobile-banking, WAP-banking, SMS-banking, GSM-banking, TV banking).

FIELD OF THE INVENTION

This invention relates to processes of personal user authentication incomputer and mobile wireless communications networks to performtransactions including payments. The process provides remote userauthentication in various computer networks, the Internet inclusive, toperform secure transactions such as e-commerce and remote banking(on-line banking, remote banking, direct banking, home banking, internetbanking, PC banking, phone banking, mobile-banking, WAP-banking,SMS-banking, GSM-banking, TV banking).

BACKGROUND OF THE INVENTION

Rapid development of information technologies, the internet and wirelessmobile communication networks resulted in a huge increase in cybercrime.According to one estimate, in 2004 cybercrime revenues were US$105billion—more than the drug business. Cybercrime includes, inter alia,unauthorized access and eavesdropping, alteration of digital data,illegal copying, computer sabotage and computer fraud.

The growth in the number of network information and financial servicesagainst the background of significant increases in the number of cybercrimes (doubling each year, on average) makes the task of reliableremote user authentication in computer networks, including the internet,extremely important. It is thought that one in every five internettransactions remains vulnerable to fraud. Even a single-use SMS passwordsent to a customer's mobile phone does not guarantee desired outcomesince customers rarely pay attention to the changes in their accountpointed out in such text messages (more details athttp://www.thedaily.com.au/news/2007/nov/07/banking-sms-passwords-vulnerable-hackers/).

It is worth it to separately examine a category of cybercrime known asdigital property theft. By using viruses, special spyware and false webpages hackers steal users' personal data (user names and passwords).This may enable hackers, for example, to gain access to and take fullcontrol over an email account at a free public email service such asGmail, Yahoo! or Mail.ru, or an account at a social-networking websitesuch as Facebook, MySpace or Classmates.com. Having taken control overthe account, hackers may read the user's personal correspondence,including with financial institutions, and send messages on his behalfthat cause substantial harm or financial damage to the user. Thus themeans of reliable, accurate and unambiguous user authentication arebecoming more and more important.

Initially, software authentication implemented through a loginprocedure—when user specifies his user name and password—becamewidespread. Experience then showed that software authentication cannotprovide the necessary level of data security and that specialhardware-based authentication means in the form of electronic keys andbiometric sensors are required. Remote authentication methods that donot require hardware keys and rely on passive authentication based ongathering and analyzing electronic user identification data were alsodeveloped. One example of such authentication is described in Patent RUNo 2303811 C1, IPC G 06 F 21/22, application No 2005134419/09, published7 Nov. 2005). Data security experts think that such authenticationshould augment hardware key-based authentication since it offers thehighest level of security.

Due to this, the so-called security tokens and smart cards (hardwaretokens, authentication tokens or cryptographic tokens)—specializedhardware keys provided by an organization to authorized users—gainedwidespread use. These hardware keys have special architecture(specialized microchips with protected memory, special microcontrollers,a unique ID number, hardware random number generator etc.) and are usedto generate cryptographic keys and one-time passwords, to performauthentication when accessing corporate networks remotely, forcryptography of data streams and digital signatures for documents. Oneshortcoming of hardware keys is that one such key cannot be used inmultiple corporate networks, since that will lead to increased threat ofintrusion. Given that the internet offers a multitude of differentservices, it is evident that one user will require several hardwaretokens for secure connection to different networks. Considerable cost ofsecurity tokens is also not conducive to their widespread use.

Another widely used way to establish secure connections is the so-calledVPN or a virtual private network—a logical network superimposed onanother network, like the internet or an intranet. Despite the fact thatin this case the data traffic is carried by public networks usingnon-secure protocols, the use of encryption provides a way to exchangeinformation that is closed to outsiders. A VPN makes it possible to linkseveral offices of an organization into one network using publiccommunication channels.

When connecting a remote user (or when establishing connection withanother secure network), the access server requires the user to gothrough the process of identification and then authentication. Uponsuccessful completion of both processes the remote user (or network) isgranted access privileges, i.e. become an authorized user. A VPN canalso be either software or hardware/software based. The use of specialhardware increases the level of information security.

Another known way of remote user authentication is described in PatentEP No 0986209, IPC H 04 1 9/32, published 15 Mar. 2000. The essence ofthe method is as follows: electronic user identification data is storedin the authentication server's database and is then compared withidentification data furnished by the user when attempting to access asecure system. This comparison is the basis for the decision whether aparticular user has the required access privileges. Electronic useridentification information in this method may include user biometricdata such as fingerprints, palm prints, and/or iris scans that are savedin the authentication server's database. The authentication serverusually also verifies such identification data as username and password.The main shortcoming of this method of remote user and systemauthentication is that authentication is active and thus involvesexchanging substantial amounts of data (fingerprint, palm print, irisscans). This increases the vulnerability of the authentication serverbecause an intruder may introduce false data, including computerviruses, into the data exchanged between the user and the server.Another shortcoming of the method and of the systems used to execute itis lower data transfer speeds from the user's access terminal to theauthentication server due to larger data volumes (user's fingerprint,palm print, iris data). Yet another shortcoming is the need to usecostly specialized equipment such as hardware to capture user biometricdata like finger and palm prints and/or iris scans, etc.

There is also the “A Method of Strong Multifactor Authentication MethodOf Payment Card Holders That Involves The Use Of A Mobile Phone And AMobile Wireless Telecommunication Environment To Effect InterbankFinancial Transactions In An International Payment System Using The 3-DSECURE Protocol Specification (Versions) And The System To Implement It”(Patent RU No 2301449, IPC G 06 Q 20/00, application No 2005118828/09,published 27 Dec. 2006). The invention is a means of personalidentification of customers during transactions performed over mobilecommunication networks. Among the invention's applications is its use toperform authentication when making a payment by charge card using amobile phone. The technical result of using this method is a financialtransaction with guaranteed transaction confidentiality. When carryingout interbank financial transactions in an international payment systemusing the 3-D Secure protocol specification as part of a multifactorstrong customer identification process involving the use of a mobilephone over a mobile communication network, four transaction steps areperformed sequentially: transaction initiation; generation and deliveryof authentication request; generation and delivery of a response to theauthentication request; transaction execution, generation and deliveryof notification on the transaction results. During each step thesignal-messages are transferred between the parties using 3-D Securespecification components.

Another known payment method is implemented using a system that containsa means of generating a unique identifier for the payment amount as aresponse to customer payment request; the means to transmit the amountID to the customer's mobile phone; the means to store the ID at thecentral data server, the means to receive the ID sent from thecustomer's mobile phone (the ID contains information about the payment),the means to verify (match) at least a part of the ID with a least someof the ID's already generated; and the means for indication of the ID(Patent GB No 2389693, IPC 7 GO7F 19/00, Published 17 Dec. 2003). Ashortcoming of this method is the need to transmit the ID over opencommunication channels without additional encryption.

Another method of performing transactions using a mobile phone (oranother mobile device like a pocket PC) connected to WAP or GPRS serviceis described in application WO 03/047208 A1, IPC 7 H04L 29/06, published5 Jun. 2003. The method involves the following phases: receivinginformation about a transaction using a mobile phone; transmittinginformation about the transaction to the processing server to checkwhether the transaction is possible; if the processing server returns apositive result and the transaction is possible this information is thensent to the mobile phone via the Internet. This version's disadvantageis that the data is sent openly over the internet.

A poll commissioned by Abbey, an English bank, among one hundred of itscustomers shoed that only one in three (32%) of them wants to usespecial devices that may provide additional security of internettransactions (see details athttp://thebankwatch.com/2008/03/25/customers-dont-want-authentication-devices-abbey/).

Thus, the efforts of commercial banks to make online transactions moresecure are not received well by their customers who do not want to buyand use special hardware keys without which it impossible tosubstantially increase the security of internet transactions.

The overview provided above shows that it is not possible tosignificantly improve the security of internet transactions withoutusing a hardware key, but those keys are not welcomed by users.

The closest analog (prototype) to the proposed invention is the “AMethod of Strong Multifactor Authentication Method Of Payment CardHolders That Involves The Use Of A Mobile Phone And A Mobile WirelessTelecommunication Environment To Effect Interbank Financial TransactionsIn An International Payment System Using The 3-D SECURE ProtocolSpecification (Versions) And The System To Implement It” (Patent RU No2301449, IPC G 06 Q 20/00, application No 2005118828/09, published 27Dec. 2006).

BRIED DESCRIPTION OF THE DRAWING

The drawing is a block diagram of the authentication method of thepresent invention.

DETAILED DESCRIPTION OF THE INVENTION

Versions of the method and the implementation system described in thePatent application provide to subscribers of mobile (cellular) networksa convenient and simple way of performing transactions with guaranteedconfidentiality. The required level of confidentiality of the datatransferred is achieved by not transmitting secret information about thecredit card, namely the PAN code, card expiration date etc. Transactionscan be performed over the existing mobile (cellular) communicationnetworks and do not require the carrier to use additional equipment. Toensure authenticity and security of banking transactions, reliable meansof authentications are applied as an integral part of the overallsecurity policy. Compared with traditional passwords, the strongmultifactor authentication in open mobile (cellular) GSMtelecommunication networks ensures a substantially stronger and morereliable data security while being easy to use and enabling to identifya person who is a counterparty to an electronic transaction using anopen telecommunication network.

The main disadvantages of this method, taken as a prototype, are asfollows:

-   -   It is impossible to use a known way for user authentication to        perform non-financial transactions in computer networks;    -   A narrow field of application;    -   It is possible to intercept the personal data being transmitted        since the customer (cardholder) sends the details of the payment        card and his own authentication data to the issuing bank over a        protocol protected from unauthorized access, but the fact that        the card and customer data are transmitted, even over a secure        communication channel, potentially makes them vulnerable for        interception and unauthorized use;    -   It is necessary to use a specialized software applet stored on        the SIM-card of the customer's mobile phone; in practice the use        of such an applet may require replacement of the customer's        standard SIM-card with a special new one, which results in        additional administration complexities before this method can be        used.

The proposed engineering solution consists in development of processproviding remote users' authentication in various computer networks toperform cellphone-assisted secure transactions.

This task is implemented through commonly used hardware keys, namely,SIM-cards of cellphones, to identify users. For example, the SIM-cardsand R-UIM cards are used in GSM networks and UMTS networks,respectively.

This process of user authentication in various computer networks, theInternet inclusive, to confirm transactions is implemented through usingcellphones connected to a network of mobile cellular communicationsOperator (MCCO) providing and leasing short code services. The proposedprocess differs from the known methods in that the web-serverAdministrator pre-books in its name or takes in lease from the MCCOOperator at least one cellphone number of MSISDN (Mobile StationIntegrated Service Data Network) Server or at least one short code ofShort_Number_Server, wherein said user, at registering on theweb-server, reports at least one MSISDN_User personal cellphone numberadded with user login and password.

The said web server, at the said user authentication, sends via saidcomputer network to the said user a code message that the said userreturns then to the web-server through his/her MSISDN_User number to theweb-server's MSISDN_Server number or through the MSISDN_User number tothe Short_Number_Server short code.

Other features of the proposed process include:

-   -   In GSM standard networks the user applies the MCCO Operator's        SMS and/or

MCCO Operator's USSD services to sending code message;

-   -   The server updates (modifies) the code message for every        transaction;    -   Before sending-back the code message, the user modifies the        received code message using, for example, hardware/software        means, encryption tables or individual password, provided well        in advance by the website's Administrator, over        anti-surveillance data delivery channel;    -   The web server sends in real time messages notifying said user        on the first drawdown of user account and/or on any attempt to        modify the user's password, to the registered user's MSISDN        cellphone number, e-mail or Instant Messenger;

The proposed process implementation resulted in development of a simple,highly reliable and flexible process of multimodal remote userauthentication in various computer networks, the Internet inclusive,using hardware keys. The use of a SIM-card as a hardware key enables toexpedite the implementation of the proposed process and to substantiallyreduce the associated promotion costs while also minimizing the upfrontuser expenditure to practically zero.

The implementation of the proposed process is illustrated in theattached chart, indicating as follows: a network of mobile cellularcommunications Operator (MCCO), user facilities (a personal computer andcellphone), computer networks, web-server whose administration takeslease at least one MCCO Operator's MSISDN Server cellphone number or atleast one MCCO Operator's Short_Number_Server shortcode,

Let us consider the implementation of the proposed process using the GSMstandard as an example. According to the GSMA Association, the GSMstandard has a market share of 82 percent, with 29 percent of theworld's population using GSM global technologies (roaming) The totalnumber of GSM subscribers exceeds 2 billion people in 212 countries(more information at http://en.wikipedia.org/wiki/GSM).

The GSM system has many security features that were developed in orderto provide to the subscriber and the MCCO Operator a higher level ofsecurity from fraudulent practices. Authentication mechanisms guaranteethat only subscribers acting in good faith and possessing legal (i.e.,not stolen or non-standard) equipment have access to the network. Sincethe connection is established, information over the network istransmitted in encrypted form to avoid eavesdropping. Confidentialityfor each subscriber is secured by protecting his identity and location.

GSM is a second-generation (2G) network, although as of 2006 it isconditionally in 2.5G phase (with 1G being an analog cellular network,2G—digital cellular network, 3G—broadband digital cellular communicationsystems switched by multimodal computer networks, the Internetinclusive.

A GSM system consists of three main subsystems:

-   -   BSS—Base station subsystem;    -   NSS—Network Switching Subsystem;    -   OMC—Operation and Maintenance Centre.

A separate class of GSM equipment is terminal devices, i.e., MobileStation (MS), commonly referred to as a mobile phone (cellphone). Eachcellphone is equipped with a SIM card to work in a MCCO Operator'snetwork.

A SIM card or Subscriber Identity Module is a removable smart card thatstores unique information about a subscriber as well as the phone book.The SIM-card confirms subscriber's authenticity to the network andstores all necessary data related to specific subscriber powers. A PINcode is provided to prevent the card from unauthorized use in the eventit is stolen. Also, the advantage of SIM-card application consists ineliminated need to change cellphone number when changing cellphone; so,it is only necessary to insert the SIM-card itself in another cellphone.All the data stored on the card, including the phone address book, isthen accessible on another cellphone.

Each MCCO Operator's SIM card stores the International Mobile SubscriberIdentity (IMSI), a unique international subscriber identifier associatedwith each GSM or UMTS mobile communications user. At logging-in to amobile communication network the subscriber's cellphone transmits to theMCCO Operator the IMSI code identifying said subscriber.

In the GSM network switching subsystem (NSS) there is an AuthenticationCenter (AUC) that authenticates a subscriber, or more precisely, thesubscriber's SIM card (Subscriber Identity Module). Network access isauthorized only upon successful SIM card authentication, during whichthe AUC sends to the Mobile Station (MS) a public key, then the AUC andthe MS in synchronism encrypt unique authentication key of said SIM cardusing a unique algorithm. Then the MS and the AUC return to the MSC(Mobile Switching Center) the Signed Responses (SRES) that are theresults of this encryption. The MSC tests the responses for theirmatching and, if so, the authentication is considered successful (Seemore details at http://en.wikipedia.org/wiki/GSM).

The MSISDN number (Mobile Station Integrated Services Digital Network),i.e., a subscriber cellphone number associated with the SIM card andused to make and receive phone calls uniquely corresponds to each IMSInumber (SIM-card). The primary MSISDN number is used for voice calls andSMS messages. In fact the MSISDN number is a public (commonly known)phone number of a specific subscriber.

The data stored on the SIM card are well protected with PIN codes andPUK passwords and with a special encryption algorithm. The PersonalIdentification Number (PIN code) is provided to protect a stolen SIMcard from fraudulent use. A PIN code in a SIM card is four-of-eight bitdecimal digits. Users have an option of turning off this level ofsecurity. A SIM card is also capable to storing PIN2, a secondfour-of-eight bit decimal code to protect certain features accessible tosubscriber.

As soon as the PIN code (and the PIN2, if required) is properly entered,the maintenance entity will have access to the data stored on the SIMcard. The technical requirements also address the procedures to beimplemented when an invalid PIN code is entered. After three consecutiveattempts to enter an invalid PIN code the SIM card is locked and furtherattempts to enter the PIN code are ignored even if the SIM card isremoved from the maintenance entity. Such a SIM card may be unlocked byentering an eight-bit decimal code known as PUK code, which is alsostored on the SIM card. The SIM card is locked irrevocably after 10unsuccessful attempts to enter the PUK code.

So, in order to sign on to a GSM network a user has to provide the MCCOOperator with documents of identity (ID); sign a contract; and receivefrom the MCCO Operator an original SIM card with PIN and PUK codes aswell as with passwords to it.

It is impossible even today to forge a SIM card without having physicalaccess to it. These properties enable to consider a SIM card as anoriginal and highly secured hardware key with closed architectureoriented towards use in specialized GSM wireless networks. Access to GSMMCCO Operator networks is physically impossible without an original SIMcard issued by the MCCO Operator. So, the numbering address space of allGSM and UMTS cellular MCCO Operators may be considered as an analog to asecure VPN network built using hardware/software means (through usingSIM cards), where each address (a MSISDN cellphone number) is strictlypersonalized in individual or group (corporate) contract signed with aspecific mobile MCCO Operator.

One of basic services in the GSM standard is SMS services, i.e., ShortMessage Services. Any SMS message may not be sent anonymously, due toits implementation through using a specific SIM card obtained from aspecific mobile MCCO Operator and having a unique IMSI number uniquelycorresponding to a single MSISDN number, i.e., a public cellphonenumber. It is impossible to send a deceptive SMS message from anothercellphone without an authentic SIM card. Unauthorized entering into aMCCO Operator's numbering address space is possible only through usingstolen authentic SIM card. USSD service, being also standard for GSM, issimilar to SMS, with the difference that the USSD service does notsupport storage of messages, so that, the message traffic is performedin real time within a single USSD session. But as before a SIM card isrequired to operating.

So, if a web server's user specifies his MSISDN User number (publiccellphone number) in the registration application, then a code messagesent by the user from a registered MSISDN User number via an SMS-serveror USSD-server in process of authentication may be considered as acertificate confirming that the message was sent by a properlyauthorized user through using an authentic SIM card.

So, to identifying user the web server sends him a code message (seesteps 1 and 1′ in the attached chart) to be returned by said user to theweb server from his MSISDN User number to the MSISDN Server number orfrom MSISDN User number to the number of Short Number Server using hiscellphone (see steps 2 and 2′ in the attached chart).

The described process proposes to use the above mentioned features ofthe GSM standard, SMS and USSD standard services, as well as SIM cardsto remotely identify users in computer networks, the Internet inclusive.

The proposed process ensures multimodal authentication, sinceauthentication is considered valid and the transaction confirmed if:

-   -   User account name (login) matches the account name registered at        given web server;    -   Entered password matches the password registered for said user;    -   User entered the correct PIN code to activate the cellphone SIM        card;    -   At given instant of authentication process the user sends from        his registered MSISDN

User's cellphone number a correct code message through the MCCOOperator's SMS or USSD message center to the MSISDN Server number orShort Number Server number, leased by the web server administrator fromthe MCCO Operator;

-   -   Code message received by the web server from the user is updated        in accordance with the personal password and additional means of        encryption (software/hardware means and encryption tables) of        said web server.

The proposed process has a very highly secure architecture since thesystems used in operation and authentication (computer networks, MCCOOperator networks and the cellphone used in user's authentication) areisolated from one another.

There is the so-called “air gap” that does not allow intruders tointercept or control user operations from one environment into another.The available “air gap” prevent the hackers to establish remote controlover a user's cellphone (computer viruses cannot spread over the air),which makes the proposed process significantly more reliable andincreases user trust.

The proposed process creates significant difficulties for hackers, sinceit is impossible to remain anonymous in a MCCO Operator's numberingaddress space, i.e., all messages are to be sent from a specificcellphone number and today all mobile MCCO Operators register theirusers' identity passport details. Anonymity, the main principle ofhacking, is so violated. Any attempt to “break-in” a bank's or othernetwork's security resources by guessing the password by search methodwill inevitably lead the security department to the owner of registeredcellphone number. The use of stolen cellphones for hacker attacks is noteffective, since, as a rule, the legal owners of cellphone numbers blockthe stolen SIM card immediately and get a new card from their MCCOOperator (“old” SIM card becomes invalid).

Also, a stolen number may be used to attempt to breaking-in only aspecific personal bank account/user account. It is impossible to guessthe password by search method from another cellphone number, since it isnot associated with the target record. To break-in a system, hackersneed of original SIM card inserted in the specific user's cellphone. Onthe first try it is impossible to guess the password correctly, and theinformation system meantime notifies the user and the securitydepartment about any attempt to use invalid passwords or incorrect keys.It is not practical to steal a cellphone for every three to fivepassword-guessing attempts. Also, the MCCO Operator maintains speciallogs that enable to determine the cellphone location, when it attemptsto establish connection with the MCCO Operator's network. This maysubstantially assist the law enforcement community in preventing fraudpractices.

The web server may additionally notify the user on starting use of thesaid user's account by SMS messages sent to a registered MSISDN Usernumber in e-mail letters format or through services of instant messages(such as ICQ, Skype, QIP etc). This enables user to promptly respond tohacker attacks and block his account preventing any unauthorizedapplications. For example, sending a text message with the text “STOP”to a MSISDN Server number or Server Short Number, he prohibits to usinghis account for the next 24 hours.

This process allows using a single universal hardware key, a cellphoneuser's SIM card, instead of several different keys, since a user mayoperate with different accounts and passwords to access different webservers and network resources. The principles of the process'simplementation for the GSM format outlined above may be also applied tothe CDMA and UMTS networks.

Implementation of proposed process enables the users to regain controlover their lost “digital property” even in stolen cellphone situation.Let us suppose, for example, that those hackers learned and stole user'saccount data, including his password for a given web server, and eventhey stole user's cellphone itself. Further, let us suppose that theyalso stole details of specialized encryption process and rules of theirapplication (including cryptographs, code tables, an optional individualpassword etc.). Having gained access to everything they need, hackersenter a new password, contact email address and, seemingly, gained fullcontrol over the said user's account.

Having learned that his cellphone is stolen, the user, in accordancewith the contract and instructions, contacts his MCCO Operator'ssubscriber station and blocks his number from unauthorized use. Then, hecontacts his mobile MCCO Operator in person, provides documents ofidentity and gets a new authentic SIM card, which is registered by theMCCO Operator into a previously allocated MSISDN User cellphone number.Using his account (login) and completing password recovery procedure,applying his new SIM card and MSISDN User's cellphone number allocatedby the web server at the time of registration, the user easily regainscontrol over the stolen digital property.

The majority of users already possess skills and knowledge needed tousing proposed process, especially, they know to use a cellphone, tosend SMS and USSD messages through the MCCO Operator's message center,as well as Internet operations. If so, it is possible to implement theprocess quickly and with minimal investment.

Example 1 User Registration on a Website

Subscriber enters the given website's URL address.

For example, www.secure_mail_portal.com

Then, the said subscriber select the option “Registration on thiswebsite”, gets a webpage with the application form and enters thefollowing information:

“Enter your login: John Smith

Password: sidêcookie_(—)91

e-mail : John_Smit_Inc@gmail.com

Personal cellphone number: +7.701.111-11-11

Having received the user's personal details the website returns thefollowing message to the user: “You were registered as: John Smith,e-mail—John_Smit_Inc@gmail.com

Password: **************;

To confirm your registration please send the following code message:AKDJ_(—)1928_WKDS_(—)0101_xLdU to the following number: +905326129292;”

Then the user sends the message (AKDJ_(—)1928_WKDS_(—)0101_xLdU) fromhis registered cellphone number (+7.701.111-11-11) to the web servernumber (+905326129292).

Having received the message from the user, the web server test s thesender's cellphone number and if it matches +7.701.111-11-11, the webserver sends the following message to the user: “Registration completed.Your account is registered. User instructions were sent to your emailbox” and completes the registration procedure.

Example 2 Confirmation of Payment Transaction

User enters his bank's URL in web browser's address bar,

For example www. secure_banking_global.com,

Then, he selects the option “Enter payment instructions” and enters theinstructions.

The web server, having received the instructions from the user, beginsthe user authentication procedure and sends a code message (1) to theuser over the computer network: “You have entered the following paymentorders:”

<The text and details of the payment orders follow>

To confirm these payments please send code message “132-298-192-FBI” tonumber +7.777.777-77-77.

Then, the user sends the code message (132-298-192-FBI) received overcomputer network using his personal cellphone number (+7.701.111-11-11)to the web server's cellphone number (+7.777.777-77-77).

The web server receives the said code message and tests it for itsauthenticity and checks the sender's cellphone number.

If the sender's cellphone number matches the number registered in thename of the user John Smith (+7.701.111-11-11), then the web serversends the following message to said user over computer network:

“Your confirmation was received. Payment orders are accepted forprocessing”.

Example 3 Changes in User's Personal Details on the Web Server

User enters the web server's Domain Name:

“www.secure_mail_portal.com”

Then, he selects the option “Change email address and password”.

The web server sends the following message to the User:

“You would like to change your account details. Please send the code023+10110392 to short number #1234.”

Then, the User dials the following into his cellphone:*1234#023+10110392#-<Enter>

Through using the MCCO Operator's USSD server the code message isdelivered to the short number #1234 registered onto thewww.secure_mail_portal.com web server.

If the code message received matches the sent one and the sender'scellphone number matches +7.701.111-11-11, the web server proceeds withthe procedure to changing all account details, with exception of user'spersonal cellphone number.

If sender's cellphone number does not match the one in the accountdetails, the web server sends the following SMS message to theregistered user's cellphone number +7.701.111-11-11:

“There was an attempt to change your account details from the followingIP address: ***-***-***-***”.

Example 4 Regaining Control over Stolen “Digital Property”

Let's us to suppose that the criminals stole a user's cellphone and usedit to alter the user's account data. In accordance with the website'spolicy they managed to change all account details, with exception oflogin and cellphone number, through inserting new password and email.

Having discovered that his cellphone is stolen, the user notifies hisMCCO Operator and blocks the stolen SIM card. Having then visited theMCCO Operator's offices and provided them with documents of identity,the user gets a new SIM card and activates it using his “old” cellphonenumber.

The user enters the website's URL address, for example:

www.secure_mail_portal.com

and selects “Recover lost password”.

The web server activates the authentication procedure, sends a codemessage “KDIS-2dkU-UdPd-2093” to the user

and asks the user to forward it to +7.777.777-77-77:

The user, using a special personal password received when signing thecontract with the MCCO Operator, sends the updated message“KDIS-2dkU-UdPd-2093+9873” at web site number +7.777.777-77-77.

The web server tests content of the updated code message and checks thesender's number.

If they match the account details and the special personal password, theweb server asks the user to continue editing his account details.

The user enters the updated password and email address and confirms thechanges with his cellphone. So, the user succeeded in regaining controlover his lost “digital property”.

1. A process for user authentication in various computer networks, theInternet inclusive, to confirm transactions using a cellphone connectedto a network of mobile cellular communications Operator (MCCO) providingand renting out shortcode services characterized in that the web-serverAdministrator pre-books or takes lease in its name at least one MCCOOperator's MSISDN Server cellphone number or at least one MCCOOperator's Short_Number_Server shortcode, wherein at registering on theweb-server said user reports at least one MSISDN_User personal cellphonenumber added with user login and password, while said web server, atsaid user authentication, sends via said computer network to said user acode message that said user returns then to the web-server throughhis/her MSISDN_User number to the web-server's MSISDN_Server number orthrough the MSISDN_User number to the Short_Number_Server shortcode. 2.A process as claimed in claim 1, characterized in that the smart (SIM)card provided by the MCCO Operator to said user and inserted into user'scellphone is applied as a hardware key at said user authentication.
 3. Aprocess as claimed in claim 1, characterized in that the user appliesthe MCCO Operator's SMS and/or MCCO Operator's USSD services to sendingcode message.
 4. A process as claimed in claim 1, characterized in thatthe web server updates the code message for each transaction.
 5. Aprocess as claimed in claim 1, characterized in that the user modifiesthe received code message using, for example, hardware/software means,encryption tables or individual password, provided well in advance bythe website's Administrator, over anti-surveillance data deliverychannel.
 6. A process as claimed in claim 1, characterized in that theweb server sends in real time messages, notifying said user on the firstdrawdown of user account and/or on any attempt to modify the user'spassword, to the registered user's MSISDN cellphone number, e-mail orInstant Messenger.