Apparatus, system and method employing a wireless user-device

ABSTRACT

Embodiments of the invention generally relate to apparatus, systems and methods for authenticating an entity for computer and/or network security and for selectively granting access privileges and providing other services in response to such authentications.

RELATED APPLICATIONS

This application claims priority under 35 U.S.C. § 120 to U.S. PatentApplication 62/207,991, entitled “APPARATUS, SYSTEM AND METHOD FOREMPLOYING A WIRELESS USER-DEVICE”, filed on Aug. 21, 2015, and is acontinuation of U.S. patent application Ser. No. 14/107,969, entitled“APPARATUS, SYSTEM AND METHOD FOR SECURE PAYMENT”, filed on Dec. 16,2013, which is a continuation of and claims priority under 35 U.S.C. §120 to U.S. patent application Ser. No. 13/234,874, entitled “APPARATUS,SYSTEM AND METHOD EMPLOYING A WIRELESS USER-DEVICE”, filed on Sep. 16,2011, now U.S. Pat. No. 8,613,052, which claims priority under 35 U.S.C.§ 119(e) to each of the following U.S. Provisional Applications: Ser.No. 61/384,146, entitled “APPARATUS, SYSTEM AND METHOD FOR SECUREPAYMENT”, filed on Sep. 17, 2010; U.S. Provisional Application Ser. No.61/447,497, entitled “APPARATUS, SYSTEM AND METHOD EMPLOYING A WIRELESSUSER-DEVICE”, filed on Feb. 28, 2011 and U.S. Provisional ApplicationSer. No. 61/499,961, entitled “APPARATUS, SYSTEM AND METHOD FOREMPLOYING A WIRELESS USER-DEVICE”, filed on Jun. 22, 2011, each of whichapplications are incorporated herein by reference in their entirety.

BACKGROUND

1. Field of Invention

Embodiments of the invention generally relate to apparatus, systems andmethods for identification, in particular, apparatus, systems andmethods for identifying an entity for computer and/or network security,and for selectively granting privileges and providing other services inresponse to such identifications.

2. Discussion of Related Art

Millions of financial transactions are conducted daily using electronicsystems. Many of these are conducted using traditional magnetic stripereaders while others are conducted using smart-cards, mobile phones orother handheld electronic devices. However, these prior approaches allrequire that an account number (bank account number, credit card accountnumber, debit card account number, etc.) be provided to authorize thetransaction. Because a thief with access to an account number poses asignificant financial risk and risk of identity theft, financial serviceproviders go to great efforts to try to communicate the account numberssecurely when conducting these transactions.

In addition, electronic transactions often require that a user provideinformation that uniquely identifies the user to allow financialinformation or other personal information to be used in completing thetransaction. This user-identification is generally static-information,that is, the information does not change over time, for example, usernames and/or passwords. In addition, the user-identification informationuniquely identifies the user. As a result of the well documented riskposed by identity theft, business entities spend enormous amounts oftime, effort and money to protect this static user-identity information.The approaches implemented by business entities include using securenetworks to transmit the user-identity information, and alternatively orin combination with the preceding, using various forms of encryption toprotect the user-identity information from electronic-eavesdroppers.Regardless, each of these prior approach results in the transmission ofthe highly-sensitive user-identity information.

Further, traditional approaches to identity authentication rely on averification process. That is, the authenticator receives staticuser-identity information along with other information such as a time(orevent)-varying code. The authenticator employs the user-identityinformation to establish the user that the entity purports to be. Theauthenticator then employs the other information to determine whetherthat information authenticates that the entity is who they purport tobe. Such approaches can include multi-factor authentication in which theentity provides the authenticator with information including evidence ofone or more of something the user is (for example, a biometric),something the user knows (for example, a PIN); or something the userpossesses (for example, a token). In this example, static information(for example, a user name or password) is used to verify the identity ofthe user to locate the other information (for example, any of biometricdata, the user's PIN and/or a seed associated with the token) concerningthe user which is stored by the authenticator. With a proprietaryalgorithm and the current time, the authenticator generates anon-predictable code using the other information that is associated withthe user. The authenticator then determines whether the time-varyingcode received from the user is the same as that generated by theauthenticator.

That is, some existing token technologies use a verification processthat requires the user to supply a remote authentication system with aunique static index such as a user name or email address. This staticinformation is used to retrieve the user's file, including a secretseed. With a proprietary algorithm and current time, that seed generatesthe expected unpredictable code. If the user sends the same code, thepossession of the token is “VERIFIED.” With today's powerful computers,it is possible to electronically eavesdrop or otherwise obtain a seriesof a particular user's codes at different times, and then reverseengineer the algorithm, and unique seed to counterfeit a token.

As mentioned above, however, the preceding approaches must begin withthe entity providing the authenticator with the user-identity of theuser that the entity purports to be. The security of these approachescan be breached because each requires the communication of the staticidentifying information. For example, today's powerful computers can beused by an electronic eavesdropper to reverse engineer the algorithm andthe seed based on a series of intercepted time-varying codes generatedfor a particular user. Such an attack would then allow the eavesdropperto counterfeit the user's token.

Because of the previously described shortcomings of current approaches,improved identity-authentication is needed to provide sufficientsecurity in view of the processing power of today's computers and thesophistication of today's eavesdroppers.

SUMMARY OF INVENTION

According to some embodiments, apparatus, systems and methods employtokens that never send or transmit any abusable or exploitable staticinformation. For example in one embodiment, an unpredictable number,representing the satisfaction of all three identity factors, istransmitted by radio frequency (RF) to a remote, secure server. In thebackground, the remote server has been generating all non-predictablecodes that are being generated on all or a group of authorized tokens.If the transmitted code is matched against the constantly changingdatabase included in the remote server, the user is “IDENTIFIED.”

According to various embodiments, identity-authentication is achievedwithout transmitting any exploitable static information. In one aspect,a system includes a processor configured to generate a non-predictablecode using multiple authentication factors for a user in possession of atoken. The system includes a secure authentication system (for example,including a database and associated server) that stores multipleauthentication factors for a plurality of users, respectively. In oneembodiment, the secure system periodically (for example, every minute)generates the non-predictable code associated with each of the pluralityof users. When a non-predictable code alone without any static index istransmitted from a user token and received at the secure system, thesystem operates to compare the received code to all non-predictablecodes valid at that time. When a match is found, the user is identified.This approach is in contrast to prior approaches in which the user'sidentity is “verified.”

According to various embodiments, the token includes a mobile phone, atablet or iPAD device or other wireless user-device and the tokenwirelessly transmits the non-predictable code. Additional features canbe included in combination with the preceding. For example, in someembodiments, a PIN is not stored in the token. Instead, according tothis embodiment, the PIN is entered by the user and immediatelyintegrated in an algorithm such that it is not stored, transmitted orotherwise exposed. According to one embodiment, the algorithm includesan exclusive-or operation performed on the PIN. Further, thenon-predictable code is generated without being exposed to the user andis transmitted from the token via radio frequency (RF) so that itremains unknown to the user. These approaches increase security, speedand convenience.

For example, according to some embodiments, the generation andtransmission of the non-predictable code in the preceding approachavoids constraints on the size of data that is transmitted from thetoken because the transmitted value is not manually entered by the user.In addition, the potentially large size of the non-predictable value(for example, 20 digits or more) can exponentially increase securitywhile RF transmission dramatically increases speed and convenience.

According to some embodiments, the non-predictable value providesevidence of three factors including something the user is (for example,the biometric), something the user knows (for example, the PIN); andsomething the user possesses (for example, the token with the associatedsecret seed). Thus, in one embodiment, successful authentication ofidentity is only achieved where each of the three factors is valid forgeneration of a non-predictable value corresponding to the user.

The robustness of the system can be enhanced in some embodiments byaddressing the unlikely circumstance where the same non-predictable codeis generated for more than one user for a given time period. Accordingto one embodiment, when the preceding occurs the secure system delaysthe authentication until the occurrence of immediately subsequentnon-predictable code from the next time period to insure that theauthentication proceeds based on a unique identification. In someembodiments, the current code and several future codes may be generatedat either or both USR and the token for computational efficiency andinstant comparisons. According to one embodiment, the codes aregenerated at USR on a substantially real-time basis.

To reduce the risk of a man-in-the-middle attack, embodiments canoperate to have the secure system confirm its identity to the token. Inone embodiment, the token generates and transmits a firstnon-predictable code (or portion thereof) to the secure system. Thisfirst non-predictable code is not used to execute the authenticationused to approve the requested action. Instead, according to thisembodiment, the secure system identifies the user based on the firstnon-predictable code (for example, using a code matching algorithm asdescribed herein) and replies by generating a second non-predictablecode (or portion thereof) that corresponds to the code that would begenerated by the token during the immediately subsequent time period.The token receives the second non-predictable code and determineswhether it is correct by comparing the code to that which it generates.If so, the remote secure system has proven its identity and the tokenthen generates a third non-predictable value that is transmitted to thesecure system where it is employed to authenticate the identity of theuser.

According to some embodiments, the systems and methods described hereinprovide approaches in which the user device (for example, smart phone,tablet, or other form of token) does not store information that can beexploited by a hacker to impersonate the user. In one embodiment, thePIN entered by the user is not authenticated locally at the token.Instead, the PIN is either immediately employed in the generation of anon-predictable value used by a secure registry to authenticate anidentity of the user or is transmitted in a protected manner to thesecure registry as part of an authentication process, for example, byXORing the PIN with the non-predictable value. Because the PIN is notauthenticated locally, the PIN need not be stored by the token. In oneembodiment, the user device does not store information that can beexploited by a hacker to impersonate the user.

Unlike prior approaches in which a non-predictable value is encrypted(either in a consistent manner or a varying manner), embodimentsdescribed herein do not require encryption of the transmittednon-predictable value because the non-predictable value is transmittedwithout static identifying information. As a result, an eavesdroppergains no knowledge of the identity of the user even where theeavesdropper intercepts the non-predictable value.

According to one aspect, a system for automatic, continuous, backgroundauthentication is provided. In one embodiment, automatic, continuous,background, RF communication of a PRC (“Pseudo Random Code”), includingtwo or three factor authentication is triggered by a protected computer,(optionally with a handshake protocol) and either byverifying/identifying a user and/or (optionally) including challengeresponse technology. In one example, re-authentication occursautomatically, continuously and in the background based on the passageof time, event triggers, and/or based on the chosen activities of anauthorized user during a protected session.

According to one embodiment, during a secure session on a protectedcomputer, network, server, website, etc., continuous, background, RFcommunication of a PRC (“Pseudo Random Code”) is required to maintainaccess to the protected computer. In one example, continuous,background, RF communication of the PRC is configured to foil ormitigate man in the middle attacks, eliminate session stealing, andensure that the authorized user is continuously present during asensitive session.

According to one embodiment, a mobile device or “token” is used tosecurely verify or identify a user to allow access to a secure computer.Once authenticated (e.g., by multiple factors—two or more authenticationfactors), the token automatically sends a unique PRC (Pseudo RandomCode) by radio frequency (e.g. wireless, Bluetooth, near field, etc.) tothe protected computer. The protected computer can use the PRC tore-authenticate and/or pass this code on to another computer systemcontinuously (e.g., as often as every few seconds or every few events).In one alternative example, the protected computer is configured to senda next expected PRC every few seconds to the token, and if correct (asdetermined by the token) the token sends the new next PRC (executing ahandshake protocol to exchange PRCs). This can also be executed as achallenge/response exchange of authentication information (e.g., PRC).

In accordance with one aspect, a system for authenticating identities ofa plurality of users includes a network having at least a portion thatincludes a wireless network, a computer coupled to the network, ahandheld device configured to communicate with the computer over thewireless network and a secure registry system including a communicationinterface coupled to the network. In some embodiments, the handhelddevice includes a user interface programmed to receive user inputincluding secret information known to the user of the handheld device.In addition, the handheld device can include a processor coupled to theuser interface where the processor is programmed to authenticate theuser of the handheld device and generate a time varying non-predictablevalue following a successful authentication of the user by the processorbased on the user successfully providing the secret information to thehandheld device. Further, the handheld can include a wirelesstransceiver coupled to the processor and configured to transmit via thenetwork a wireless signal including the time-varying non-predictablevalue. According to further embodiments, the secure register systemincludes a communication interface coupled to the network where thesecure registry system is configured to receive the time-varyingnon-predictable value and successfully authenticate the user where thetime-varying non-predictable value is matched to the user by the secureregistry system. Further, in accordance with some embodiments, a user ofthe handheld device is permitted to operate the computer to accessresources with the computer so long as the computer periodicallyreceives subsequent authentication information that results in acontinued successful authentication of the user for time periodssubsequent to a time at which the time-varying non-predictable value isgenerated.

In accordance with some embodiments the handheld device includes abiometric sensor coupled to the processor where the biometric sensor isprogrammed to receive a biometric input provided by the user and wherethe processor is programmed to authenticate the user of the handhelddevice and can generate a time varying non-predictable value following asuccessful authentication of the user by the processor. In oneembodiment, the biometric sensor includes a microphone configured toreceive a spoken input provided by the user and the user interface isprogrammed to display a multicharacter string including at least one ofa plurality of alpha-characters and a plurality of numeric-characters,and further where the processor is programmed to authenticate the userbased on the spoken input of the multi-character string by the user. Inaccordance with some embodiments, the secure registry system isprogrammed to randomly generate the multicharacter string andcommunicate the multicharacter string by the network to the handhelddevice for display.

In accordance with another aspect, a method of authenticating identityusing a secure registry system is provided where the secure registrysystem includes a processor, a communication interface coupled to theprocessor and database coupled to the processor where the database isconfigured to store seed for each of the plurality of user respectivelyand the processor is configured to generate time-varying non-predictablevalues using the respective seeds. In accordance with some embodiments,the method includes receiving at the secure registry system a firsttime-varying non-predictable value generated by a first handheld devicein possession of the user the first time-varying non-predictable valuegenerated using a seed associated with the first handheld device and afirst time. Further, the method can include identifying, by the secureregistry, the user based on the first time-varying non-predictable valueand generating a second time-varying non-predictable value with thesecure registry. In one embodiment, the second time-varyingnon-predictable value is generated using the seed associated with thefirst handheld device and a second time where the second time issubsequent to the first time.

In addition, in accordance with some embodiments, the method may alsoinclude communicating at least a portion of the second time-varyingnon-predictable value to the first handheld device. In theseembodiments, the second time-varying non-predictable value is employedby the first handheld device to communicate the identity of the secureregistry system by confirming that the second time-varyingnon-predictable value is valid when generated using the seed at thesecond time. Further, the method may include authenticating an identityof the user by the secure registry system using the third time-varyingnon-predictable value generated by the first handheld device andreceived by the secure registry system. In accordance with theseembodiments, the third time-varying non-predictable value is generatedusing the seed associated with the first handheld device and a thirdtime subsequent to the second time.

In some embodiments, a method of securing a computing device can includereceiving at the computing device a first wireless signal includingfirst authentication information wirelessly transmitted from a mobiledevice proximate to the computing device, processing, the firstauthentication information to initially authenticate a user inpossession of the mobile device, the user, attempting to accessresources with a computing device. The method can also includetemporarily allowing the user to employ the computing device to accessthe resources when the initial authentication is successful andcontinuing to allow the user to employ the computing device to accessthe resources upon a continued receipt of authentication informationfrom a mobile device that is successfully authenticated. Still further,the method can include automatically terminating use of the computingdevice by the user based on at least one of: authentication informationno longer being received from the mobile device and authenticationinformation received from mobile device no longer being successfullyauthenticated.

BRIEF DESCRIPTION OF DRAWINGS

The accompanying drawings are not intended to be drawn to scale. In thedrawings, each identical or nearly identical component that isillustrated in various figures is represented by a like numeral. Forpurposes of clarity, not every component may be labeled in everydrawing. In the drawings:

FIG. 1 is a functional block diagram of a computer system configured toimplement the universal secure registry (“USR”), including a USRdatabase, according to one embodiment of the invention;

FIG. 2 is a functional block diagram of a first embodiment of anetworked environment including the computer system of FIG. 1;

FIG. 3 is a functional block diagram of an entry of a database formingthe USR database of FIG. 1 in accordance with one embodiment;

FIG. 4 is a flow chart in accordance with one embodiment;

FIG. 5 is a flow chart in accordance with another embodiment;

FIG. 6 is a flow chart in accordance with still another embodiment;

FIG. 7 is a functional block diagram of a system in accordance with someembodiments;

FIG. 8 is a functional block diagram of a system in accordance with somefurther embodiments;

FIG. 9 is a flow chart in accordance with one embodiment;

FIG. 10 is a flow chart in accordance with one embodiment;

FIG. 11 is a system block diagram in accordance with one embodiment; and

FIG. 12 is a system block diagram in accordance with one embodiment.

DETAILED DESCRIPTION

This invention is not limited in its application to the details ofconstruction and the arrangement of components set forth in thefollowing description or illustrated in the drawings. The invention iscapable of other embodiments and of being practiced or of being carriedout in various ways. Also, the phraseology and terminology used hereinis for the purpose of description and should not be regarded aslimiting. The use of “including,” “comprising,” “having,” “containing,”“involving,” and variations thereof herein is meant to encompass theitems listed thereafter and equivalents thereof as well as additionalitems.

As used herein, “USR” generally refers to a secure registry, forexample, a remote secure registry. In some embodiments, USR is employedas a secure, central repository for a variety of confidential personalinformation. In various embodiments, this personal information can beused to authenticate an identity in support of any of the followingactivities: Credit/Debit Card Purchases; Check Purchases; Wiring Funds;Accessing bank and other financial records; transferring funds betweenindividuals; transferring funds between an individual and vendor andvending machine; providing a form of identification; unlocking andstarting a vehicle; unlocking and entering a home, office, hotel room orother secure physical space; accessing secure physical facilities suchas a military base or nuclear reactor; completing applications forloans, mortgages, credit or jobs; accessing and/or logging into acomputer, a computer network or a secure server; and completing medical(or other types of) forms.

In some embodiments, an information system is formed as a computerprogram running on a computer or group of computers configured toprovide a universal secure registry (USR) system. The computer, in thisinstance, may be configured to run autonomously (without theintervention of a human operator), or may require intervention orapproval for all, a selected subset, or particular classes oftransactions. The invention is not limited to the disclosed embodiments,and may take on many different forms depending on the particularrequirements of the information system, the type of information beingexchanged, and the type of computer equipment employed. An informationsystem according to this invention, may optionally, but need notnecessarily, perform functions additional to those described herein, andthe invention is not limited to a computer system performing solely thedescribed functions.

In the embodiment shown in FIG. 1, a computer system 10 for implementinga USR system according to the invention includes at least one main unit12 connected to a wide area network, such as the Internet, via acommunications port 14. The main unit 12 may include one or moreprocessors (CPU 16) running USR software 18 configured to implement theUSR system functionality discussed in greater detail below. The CPU 16may be connected to a memory system including one or more memorydevices, such as a random access memory system RAM 20, a read onlymemory system ROM 22, and one or more databases 24. In the illustratedembodiment, the database 24 contains a universal secure registrydatabase. The invention is not limited to this particular manner ofstoring the USR database. Rather, the USR database may be included inany aspect of the memory system, such as in RAM 20, ROM 22 or disc, andmay also be separately stored on one or more dedicated data servers.According to some embodiments, cloud computing is employed such thataccess to the USR and associated features and elements is remotelyavailable to users and/or administrators.

The computer system may be a general purpose computer system which isprogrammable using a computer programming language, such as C, C++,Java, or other language, such as a scripting language or even assemblylanguage. The computer system may also be specially programmed, specialpurpose hardware, an application specific integrated circuit (ASIC) or ahybrid system including both special purpose components and programmedgeneral purpose components.

In a general purpose computer system, the processor is typically acommercially available microprocessor, such as Pentium series processoravailable from Intel, or other similar commercially available device.Such a microprocessor executes a program called an operating system,such as UNIX, Linux, Windows NT, Windows 95, 98, or 2000, or any othercommercially available operating system, which controls the execution ofother computer programs and provides scheduling, debugging, input/outputcontrol, accounting, compilation, storage assignment, data management,memory management, communication control and related services, and manyother functions. The processor and operating system defines a computerplatform for which application programs in high-level programminglanguages are written.

The database 24 may be any kind of database, including a relationaldatabase, object-oriented database, unstructured database, or otherdatabase. Example relational databases include Oracle 81 from OracleCorporation of Redwood City, Calif.; Informix Dynamic Server fromInformix Software, Inc. of Menlo Park, Calif.; DB2 from InternationalBusiness Machines of Armonk, N.Y.; and Access from Microsoft Corporationof Redmond, Wash. An example object-oriented database is ObjectStorefrom Object Design of Burlington, Mass. An example of an unstructureddatabase is Notes from the Lotus Corporation, of Cambridge, Mass. Adatabase also may be constructed using a flat file system, for exampleby using files with character-delimited fields, such as in earlyversions of dBASE, now known as Visual dBASE from Inprise Corp. ofScotts Valley, Calif., formerly Borland International Corp.

The main unit 12 may optionally include or be connected to an userinterface 26 containing, for example, one or more input and outputdevices to enable an operator to interface with the USR system 10.Illustrative input devices include a keyboard, keypad, track ball,mouse, pen and tablet, communication device, and data input devices suchas voice and other audio and video capture devices. Illustrative outputdevices include cathode ray tube (CRT) displays, liquid crystal displays(LCD) and other video output devices, printers, communication devicessuch as modems, storage devices such as a disk or tape, and audio orvideo output devices. Optionally, the user interface 26 may be omitted,in which case the operator may communicate with the USR system 10 in anetworked fashion via the communication port 14. It should be understoodthat the invention is not limited to any particular manner ofinterfacing an operator with the USR system.

It also should be understood that the invention is not limited to aparticular computer platform, particular processor, or particularhigh-level programming language. Additionally, the computer system maybe a multiprocessor computer system or may include multiple computersconnected over a computer network. It further should be understood thateach module or step shown in the accompanying figures and the substepsor subparts shown in the remaining figures may correspond to separatemodules of a computer program, or may be separate computer programs.Such modules may be operable on separate computers. The data produced bythese components may be stored in a memory system or transmitted betweencomputer systems.

Such a system may be implemented in software, hardware, or firmware, orany combination thereof. The various elements of the information systemdisclosed herein, either individually or in combination, may beimplemented as a computer program product, such as USR software 18,tangibly embodied in a machine-readable storage device for execution bythe computer processor 16. Various steps of the process may be performedby the computer processor 16 executing the program 18 tangibly embodiedon a computer-readable medium to perform functions by operating on inputand generating output. Computer programming languages suitable forimplementing such a system include procedural programming languages,object-oriented programming languages, and combinations of the two.

As shown in FIG. 2, the computer system 10 may be connected to aplurality of interface centers 27 over a wide area network 28. The widearea network 28 may be formed from a plurality of dedicated connectionsbetween the interface centers 27 and the computer system 10, or may takeplace, in whole or in part, over a public network such as the Internet.Communication between the interface centers 27 and the computer system10 may take place according to any protocol, such as TCP/IP, ftp, OFX,or XML, and may include any desired level of interaction between theinterface centers 27 and the computer system 10. To enhance security,especially where communication takes place over a publicly accessiblenetwork such as the Internet, communications facilitating or relating totransmission of data from/to the USR database 24 or the computer system10 may be encrypted using an encryption algorithm, such as PGP, DES, orother conventional symmetric or asymmetric encryption algorithm.

In one embodiment, the USR system 10 or USR database 24 may be able toauthenticate its identity to a user or other entity accessing the systemby providing an appropriate code which may be displayed on the user'ssmart card, mobile device such as a mobile phone, ipad, tablet, laptop,netbook, or on a desktop computer as some examples. A comparison by theuser or the code generator between the provided number and an expectednumber can validate, to the user (or other entity) or a code generatorincluded in the user-device, that communication is with the database andnot an imposter. In another embodiment, a challenge-response protocol isemployed to authenticate the identity of the USR system and/or the userto the other.

The database 24 shown in FIG. 1 has a USR database containing entriesrelated to persons 1-n. The data in the USR database may also besegregated, according to data type to enable individual computer modulesto handle discrete applications on discrete data types. Segregating thedata in modules may make access to the database more robust by enablingportions of the data in the USR database 24 to be accessible even whenit is necessary to perform maintenance on a portion of the database.However, storing the data in the USR database 24 according to the schemeillustrated in FIG. 1 may make it easier for a user of the database tomake changes to multiple types of data simultaneously or in a singlesession. There are advantages and disadvantages to each data structure,and the invention is not limited to a particular manner of organizingthe data within the database 24, data structures other than the twoshown also being possible.

As shown in FIG. 3, each entry 30 in the database 24 may containmultiple types of information. For example, in the embodiment shown inFIG. 3, the entry contains authentication information 32, accessinformation 34, publicly available information 36, address information38, credit card and other financial information 40, medical information42, job application information 44, and tax information 46. Theinvention is not limited to a USR containing entries with all of thisinformation or only this particular information, as any information on aperson or other entity such as a company, institution, etc. may bestored in USR database 24.

If the database information is split between multiple databases, eachdatabase will typically include at least the authentication and accessinformation to enable the USR software to correlate an authenticationattempt with a valid authentication, and to enable the USR software todetermine access privileges to the requested data. Alternatively,databases may be linked to permit information not in a main USR databaseto be retrieved, with successful authentication for all databasesaccessed being done at the USR system.

In FIG. 3, the authentication information is information about the userof the database to whom the data pertains and is to be used by the USRsoftware 18 to validate that the person attempting to access theinformation is the person to whom the data pertains or is otherwiseauthorized to receive it. The authentication information may be any typeof information that will reliably authenticate the identity of theindividual. For example, in some embodiments, the information mayinclude any of a secret known by the user (e.g., a pin, a phrase, apassword, etc.), a token possessed by the user that is difficult tocounterfeit (e.g., a secure discrete microchip), and/or a biometricinformation concerning a biometric, for example, a voiceprint, afingerprint, DNA, a retinal image, a photograph, etc.

The user's authentication information may be manually entered or scannedat the interface center. However, a variety of types of communicationmay be employed to communicate the user's identifying information fromthe user-device to the computer system. For example, near field signalmay be employed to communicate information between the user-device andthe computer system 10. According to one embodiment, the user'sauthentication information is included in (or entered via) the user'scell phone where it is then communicated to the computer system 10. Inone embodiment, the cell phone is also configured to receive informationfrom the computer system 10 at the interface center 27.

In one embodiment, the user of the database will carry a user-devicethat allows for secure access to the USR database without requiring theuser to transmit any personal information. In one embodiment, to accessthe USR database, the user-device retrieves a secret seed associatedwith the device and/or time varying value from memory and obtains fromthe user a secret personal identification code. The user-devicemathematically combines these three numbers using a predeterminedalgorithm to generate a one-time non-predictable code which istransmitted to the computer system 10. The computer system, specificallyUSR software 18, utilizes the received one-time non-predictable code todetermine whether the user is authorized access the USR database andgrants access to the USR database if the user is determined to beauthorized. The authentication information 32 in the database entry inthe embodiment of the invention illustrated in FIG. 3 containsinformation to enable the USR software 18 to validate the user usingsuch a card in this manner.

Alternative types of identification cards or tokens may likewise beused. For example, other smart cards may be used which generatenon-predictable single use codes, which may or may not be time varying,or other access code generators may be used. An algorithm generatingsuch non-predictable codes may also be programmed onto a processor onuser-devices such as smart cards or other computing devices, such as acell phone, pager, ID badge, wrist watch, computer (for example,desktop, laptop, netbook, tablet), personal digital assistant, key fob,or other commonly available electronic device. For convenience, the term“electronic ID device” will be used generically to refer to any type ofelectronic device that may be used to obtain access to the USR database.

Likewise, various types of biometric information may be stored in theauthentication area of the database entry to enable the identity of theuser possessing the identifying device to be authenticated at the pointof use. Examples of the type of biometric information that may be usedin this situation includes a personal identification number (PIN),fingerprint, voice print, signature, iris or facial scan, or DNAanalysis. If desired, the verifying section of the database may containa picture to be transmitted back to the person seeking to validate thedevice to ensure the person using the device is the correct person.Optionally, the identifying device itself may also be provided with apicture of the person authorized to use the card to provide a facialconfirmation of the person's right to use the card.

Further, a challenge-response protocol may be employed in combinationwith or as an alternative to the preceding to validate the personattempting to access the information. Various embodiments may employ achallenge-response protocol with or without an identification card.

In FIG. 3, the Access information 34 is provided to enable differentlevels of security to attach to different types of information stored inthe entry 30 in the USR database 14. For example, the person may desirethat their address information be made available only to certain classesof people, for example colleagues, friends, family, Federal Express,U.P.S., and the U.S. mail service. The names or universal identifiersfor those selected individuals, companies, organizations and/or agenciesmay be entered into appropriate fields in the Access information tospecify to the USR software 18 those individuals to whom the addressinformation may be released. Likewise, access fields may be specifiedfor the other types of information. For example, the individual mayspecify that only particular individuals and/or companies have access tothe credit card and other financial information 40, medical information42, job application information 44 and tax information 46. Additionally,the individual may specify that no one have access to that informationunless the individual participates in the transaction (see FIG. 6).

As shown in FIG. 1, the USR software 18 contains algorithms forexecution by the CPU 16 that enables the CPU 16 to perform the methodsand functions of the USR software described herein. The USR software 18,in this embodiment, performs all functions associated with validating anelectronic ID card. If desired, a separate authentication softwaremodule may be provided to validate electronic ID devices outside of afirewall segregating the authentication information from other userinformation.

This algorithm comprising the USR software 18 may be used to implement,in one exemplary embodiment, a USR system configured to enable selectedinformation to be disseminated to selected individuals in a secure anddynamic fashion. This information may be used for numerous purposes,several of which are set forth below and discussed in greater detailbelow.

For example, the USR system may be used to identify the person, enablethe person to be contacted by telephone or mail anonymously, enable theperson to be contacted by telephone or by mail without revealing theperson's telephone number or present location, enable the person topurchase items over the Internet or in a store without revealing to themerchant any personal identification information or credit cardinformation, enable the person to complete a job application withoutcompleting a job application form, enable the police to discern theperson's identity and any outstanding warrants on the individual, andnumerous other uses. The invention is not limited to these severalenumerated uses, but rather extends to any use of the USR database.

FIG. 4 illustrates a flow chart of a process 420 for identification ofan entity employing the USR. In the illustrated embodiment, the process420 begins at act 422 where a user registers with the USR. In variousembodiments, the registration process can be accomplished remotely overany one of or any combination of wide area networks, local area networksincluding GSM, Bluetooth, near field communication and Wi-Fi, as someexamples. The registration process can include the communication of theuser's image, for example, a digital photograph of the user's face thatis stored at the USR for use in authenticating the identity of the userin various situations. Further, in various embodiments, the process canrequire that the user's image be periodically updated to make sure thatthe image remains current. Other biometric information can also beprovided by the user during the registration process, for example, theuser can speak the numbers 0-9 for later use in activation of a mobiledevice as described further herein. This information can be stored withthe authentication information 32 as illustrated in FIG. 3.

At act 424, an application, for example, a software application iscommunicated from the USR to the user's mobile device when theregistration is complete. The application can include any of a varietyof software programs configured to operate on the user's mobile device,for example, applications programmed for, or using, any of the Java®Platform, Micro Edition (ME), the Android® platform, Linux®, .NETCompact Framework, BREW (Binary Runtime Environment for Wireless), theSymbian platform, the Qt framework, Windows Mobile®, Palm® OS, as wellas applications developed for proprietary operating systems such asBlackberry® by Research In Motion of Waterloo, Ontario, Canada, and iOSby Apple Inc. of Cupertino, Calif.

At act 426, a digital seed which may be encrypted is communicated fromthe USR to the user's mobile device. In general, the seed is employed togenerate a random number, for example, a time varying random number thatcan be used to identify the user. In some embodiments, the seed iscombined with an electronic serial number (ESN) of the token and adigital representation of the time interval. Thus, in accordance withsome embodiments, the seed itself is generated in a random fashion atthe USR and then stored such that it is associated with the user and canlater be used to derive random or pseudo-random one-time codes that aregenerated at the user device and also at the USR, as is explainedfurther herein.

In accordance with some embodiments, the seed is generated in a random,relatively non-deterministic fashion by the USR using one or acombination of the following non-limiting examples: a real time clock; acounter included in the USR that measures an unstable property of anelement (for example, the settling time of an unstable phased lockedloop circuit) or the characteristics of a random external event; ananalog signal (for example, a voltage produced by noise or data) whichis generated by or received by the USR; a random number generator orcryptofunction included in the USR (for example, a multi-stage randomnumber generator; an xorshift random number generator; a linearcongruential generator algorithm), the elapsed time of an externalfunction (for example, a wireless message transfer time), or a randomnumber generator provided by an application programming interface (API)included in the USR.

Communication of the seed can be completed over any of a wide areanetwork or a local area network or a combination of both wide areanetworks and local area networks. For example, the seed can becommunicated through a cellular network to a mobile device such as asmart phone. In accordance with other embodiments, the seed can becommunicated to the mobile device via a wide area network such as theInternet to a user's personal computer from which it can be communicatedto the mobile device via a hardwire USB connection or any manner ofwireless connections such as Bluetooth communication. According to oneembodiment, the seed is communicated to the mobile device along with theapplication. In addition, the seed can thereafter be updated asdescribed below.

In accordance with some embodiments, for example, where USR is employedin a system for proximity-based computer security using a wirelessuser-device (for example, as described in association with FIG. 12) thecomputer can have a USR element that includes a seed associated witheach user authorized to unlock the computer to access resources. Inthese embodiments, updates to the seed or seeds included in the USRelement at the computers can be updated as described above to maintaincurrent information in the computer for the user(s).

At act 428, the user requests authorization from the USR for any of asecure payment, authorization for other types of financial transactions,authorization for access to a secure network or physical space, orauthorization for any of the activities described previously for whichthe USR can be employed to authorize the user's action to a third party.That is, once the mobile device is provided with the application and theseed is communicated to the mobile device, the user has the elements inplace with which they can employ the process 420 as generally shown inFIG. 4 to identify themselves in a secure manner to a USR. Accordingly,in some embodiments, the process 420 ends at act 426 for userregistration and system activation. Thereafter, the process 420 laterbegins at act 428, when the user requests authorization to take one or aplurality of the listed actions.

Beginning at act 430, the process 420 illustrates a general approachemploying the USR to identify the user to authorize an action requestedby the user either directly by the user or via an intermediary, forexample, a third party conducting a transaction with the user. At act430, the user employs the mobile device to generate a one-time code, forexample, a one-time non-predictable pseudo random code. According to oneembodiment, the random code is generated by employing a combination oftime and the seed that was previously assigned to the user andcommunicated to the mobile device. In some embodiments, the ESN isemployed with the preceding. As described further herein, embodimentscan allow the time to be substantially synchronized between the USR andthe mobile device to provide a highly secure manner of identifying theuser. Further, the seed that is assigned by the USR is stored andmaintained by the USR such that the USR has all the information requiredby which it can generate the random one-time code that corresponds tothe random one-time code generated using the mobile device.

In accordance to some embodiments, the USR maintains a database for aplurality of user's where the database includes a random seed that isunique to each user where the seeds are assigned by the USR server. Asused herein, the term unique indicates that there is no probability thatthe USR will assign an identical seed (that is, a seed having anidentical value) to more than one user for example, pseudo-random seedgeneration with the result compared to all previously generated seedsand rejected if there is a match.

According to various embodiments, the random one-time code is a discretevalue that is generated by an algorithm that employs a combination ofthe seed assigned to the user via the USR and at least one of time (forexample, Coordinated Universal Time), an electronic serial number of themobile device, a SIM card number of the SIM card included in the deviceand a PIN number provided by the user. According to some embodiments,any of the seed, the electronic serial number, the SIM card number andthe PIN can be stored in a secure element provided with the mobiledevice. In various embodiments, the secure element can include amicrocontroller, memory or other electronic components that can beprovided in the mobile device. Further, in various embodiments, therandom one-time code is generated by employing a PIN in combination withany one of or any combination of an electronic serial number of theuser-device, a SIM number of the user-device and a seed associated withthe device.

At act 432, the one-time code is communicated to the USR. In accordancewith one embodiment, at act 434, the USR employs a code-matchingalgorithm to locate a match between the random one-time codecommunicated from the mobile device and the random one-time codes thatare calculated for each of a plurality of registered users as providedby the USR. That is, because the USR can host tens of millions or moreregistered users, the USR is programmed to conduct code-matchingsearches by first determining a current code associated with each userand then comparing the random one-time code received from the user bythe mobile device with all the codes calculated for that moment in-timeby the USR. At act 436, the user is identified if a match is found. TheUSR then reviews the authorization request to determine whether theidentified-user has the permission required to take the requestedaction, i.e., the USR determines whether the requested action isconsistent with those associated with the user.

According to some embodiments, registered users are organized intogroups, for example, based on the geography, to reduce the plurality ofusers that are processed with the code-matching algorithm on receipt ofa random one-time code. In one embodiment, location information can betransmitted with the random one-time code from a user's mobile device.

According to some embodiments, the approach illustrated in FIG. 4 can beemployed over periods of time for a variety of authorized activitiesrequested by the user. Thus, at act 438, the mobile device and the USRare available for identification to support the user's subsequentactivities as needed. In accordance with the illustrated embodiment, theprocess begins again for a subsequent act at act 426, however, in someembodiments, the process can begin at act 428. Where, for example, thesame seed is to be employed in the subsequent authorization request maderelatively close in time to the first request.

FIG. 4 also illustrates an embodiment in which there are a plurality ofongoing actions that can take place in the process 420. For example, atact 440, an updated seed is assigned to the user by the USR andcommunicated to the mobile device. The preceding can be conducted at aknown interval (i.e., periodically) or in a more random nature that issufficient to maintain the level of security required of the process420. Thus, in various embodiments, the updated seed can be provided atact 440 on the frequency of less than one minute, between one andfifteen minutes, hourly, daily, weekly, or at some other interval thatis either a known frequency or a variable frequency. In someembodiments, the interval can be established to achieve a desired levelof security, for example, where the more frequently the seed is updatedthe greater the security.

As also illustrated in FIG. 4, according to some embodiments, theprocess 420 can be used to assist a user in making payments and/or fundtransfers from the user's account which is maintained with the USR. Asis described in greater detail herein, such an approach can provide theuser with a means by which the mobile device can be employed to transferfunds between their account and the account of another authorized userafter the parties have agreed to the transfer and after the USR has beenemployed to identify the parties to the transaction. In addition, theUSR can be employed to maintain the accounts such that the transfer offunds occurs within the USR from an account of a USR-account of thepayor to a USR-account of the payee.

According to one embodiment, the user can establish a fund's transferaccount with the USR during the act of registration 422 or sometimethereafter. In the illustrated embodiment, the user establishes thefunds-transfer account at Act 442. Further, the user can activate theaccount by transferring funds to the USR, for example, such aselectronically transferring the funds, wiring the funds, charging thefunds to an account or mailing a check to the USR administrators. Oncepopulated with funds, the account can be employed to make or receivepayments or otherwise transfer funds between their accounts and theaccounts of other authorized, registered USR users.

In some embodiments, authorized users (that is, payors or payees) areestablished on temporary, real-time basis to conduct a one-timetransaction. In further embodiments, registered USR users are authorizedby a payor for an anticipated series of transactions over a longerperiod of time in the future.

Further, one of the ongoing actions illustrated in 420 includes the act444 at which automatic replenishment of funds can be applied to theuser's account. Such an approach can rely on preauthorized transfers ordebits from the user's existing bank accounts or other forms ofelectronic transfer funds such as a transfer of funds from a credit cardor debit account. The acts 442 and 444 are illustrated in phantombecause they are optional in accordance with some embodiments.

Referring now to FIG. 5, a process 460 is illustrated by which a usercan employ a mobile device to receive an authorization for one or moreof the user's activities. Some embodiments include a process by which auser activates a mobile device for use in having their identificationconfirmed. According to one embodiment, the process 460 includes act 462in which a user enters a PIN number in their mobile device and at Act464, the PIN number is communicated to the USR, for example, in anencrypted form. According to some embodiments, at Act 466, the USRcompares the PIN to PINs associated with a plurality of users all storedat the USR, and where the PIN matches the identity of a user,communicates the multi-character numeric value to the user's mobiledevice. According to this embodiment, the user's spoken input of thenumeric value is employed to authenticate the user to activate themobile device for use in an identification process with the USR. Thus,in accordance with one embodiment, the user's spoken input iscommunicated to the USR for authentication in order to activate themobile device. According to another embodiment, at Act 466, theauthentication of the user's spoken input is accomplished at the mobiledevice. In other embodiments, the mobile device can have limitedfunctionality (for example, allowing a user to make phone calls orbrowse the Internet) prior to device activation while preventing themobile device from being employed to execute secure transactions or takeother actions that require interaction with USR based-authenticationuntil a device activation process is complete (for example, acts 462,464 and 466 of the process 460).

In some embodiments, entry of a PIN is not required. Instead, aselection of the USR application results in the multi-character valuebeing presented to the user in a display of their mobile device. Theuser's spoken input of the multi-character value is then authenticatedat act 466.

According to various embodiments, the device activation portion of theprocess 460 (the acts 462, 464, and 466) can differ from that describedabove, for example, the PIN may be used to derive a non-predictablevalue that is used to identify the user prior to communication of themulti-character numeric value. In still further embodiments, the process460 does not include the acts 462, 464 and 466.

Although the process 460 is described a employing a multi-characternumeric value, other embodiments can employ a multi-character stringthat includes either or both alpha or numeric characters. In someembodiments, the user interface of the mobile device (for example, thewireless user device 652, 735) is configured to display amulti-character string including at least one of a plurality ofalpha-characters and a plurality of numeric-characters where a processorincluded in the mobile device is programmed to authenticate the userbased on the spoken input of the multi-character string by the user. Ina further embodiment, the processor included in the mobile device isprogrammed to authenticate the spoken input on a character-by-characterbasis.

According to various embodiments, the device activation portion of theprocess 460 (the acts 462, 464, and 466) can be employed by a user toallow their identity to be confirmed and their actions authorized in anyof a wide variety of environments and situations. For example, at act468, the activated mobile device can be employed with the mobile deviceto make a financial payment or credit/debit card payment or fundstransfer using the USR. At act 470, the mobile device can be activatedto make a direct personal payment and/or funds transfer between accountswithin the USR, including third-party accounts. In accordance with afurther embodiment, at act 472, the device can be activated to allow theuser's identity to be determined and their actions authorized in anumber of other situations, for example, to gain access to a securecomputer network, to perform other types of commercial transactions, toproceed through security checkpoints, access physical facilities, etc.

Returning again to act 468 and the use of the mobile device with USRbased identification system, the process 460 can be employed at apoint-of-sale. For example, a user located in a store or othercommercial environment at the point-of-sale. The transaction details arecommunicated from the point-of-sale to the mobile device for review bythe user. Such transaction details can include information, for example,the purchase amount, the name of the vendor, time and date, and even alist of the individual item or items that are being purchased. Thisprovides the user with an opportunity to review and approve thetransaction on their mobile device. At act 474, the user can elect toaccept the transaction by, for example, selecting an element in the userinterface of the mobile device or cancel the transaction. Where, forexample, the user elects to cancel the transaction, the process 460 endsat act 476. Alternatively, should the user accept the transaction, theprocess moves to act 478. At act 478, the mobile device generates arandom one-time code as described, for example, in the embodiments ofFIG. 4. At act 480, the one-time code is communicated to the USR alongwith the transactions details. In some embodiments, the transactiondetails can include a code representing one of a plurality of accounts.

The communication with the USR can occur via the POS or independent ofthe POS, depending on the embodiment. At act 482, the USR receives therandom one-time code and employs the code-matching search to identifythe user. The user is identified when a match is found between therandom one-time code communicated to the USR and the USR-calculatedcodes determined for the registered group or groups of users. Thisregistered group or groups of users can be those other registered userswho also employ the identification approach described herein.Alternatively, the various group or groups can be divided into subgroupsof users who may have some common association or identifying featurethat USR can employ in organizing and segmenting the data in thedatabase to increase the processing speed of the code-matchingalgorithm. Regardless of the size of the group, however, the USR employsa code-matching search and identifies the user when a match is foundbetween a USR-calculated code included among a plurality of codescalculated for the plurality of users, respectively, and the codegenerated with the mobile device.

At act 484, the USR determines whether the identified-user is authorizedto complete the transaction, for example, does the identified-user havea financial account with USR and if so are they credit-worthy. At act488, the USR communicates a denial of a transaction if the identifieduser is not authorized to complete such a transaction. At act 486, theUSR communicates an authorization, for example, communicates theauthorization to the point-of-sale along with a digital image of theuser if the identified user is authorized to complete the transaction.The digital image may come directly from USR or partially from USR andpartially from the mobile device.

According to some embodiments, the random one-time code generated at act478 is communicated along with static identifying information at act480, for example, where a verification process is employed toauthenticate the identity of the user of the mobile device. According toother embodiments, static identifying information is not communicated toUSR with the random one-time code generated at act 478, for example,where an identification process is employed to authenticate the identityof the user of the mobile device.

In addition, a device activation process (for example, the deviceactivation provided in by acts 462, 464, 466) can be employed withoutthe remaining acts included in the process 460 illustrated in FIG. 5.For example, the acts 462, 464, 466 can be employed independently in aprocess that may not include any communication with the USR and/or maynot include generation of a one-time code using the mobile device.

Referring now to FIG. 7, a functional block diagram of the USR isillustrated in accordance with one embodiment. According to someembodiments, the USR 640 is employed to identify a user from among aplurality of users based on the receipt of a random one-time code from aremote system element. According to various embodiments, the remotesystem element can include any of: an electronic device such as ahandheld electronic device; a point-of-sale device; a computer, serveror other network device, for example, wireless user devices 652 and 735described herein. Accordingly, in some embodiments the remote systemelement includes a mobile phone such as a smart phone. Further, in someembodiments, any of the elements illustrated in FIG. 7 can be includedin the USR systems or portions thereof illustrated in FIGS. 1-3 eitheralone or in any combination with other elements described herein.

In the embodiment illustrated in FIG. 7, the USR 640 includes a seedgeneration module 642, a database of assigned seeds 644, a generationmodule 646, a time reference 648, a comparison module 645, a firstcommunication module 647 and a second communication module 649. Otherarrangements and system configurations are possible depending upon thedesired functionality. For example, the embodiment illustrated in FIG. 7can be employed with the USR system configurations illustrated herein.Accordingly, in some embodiments system elements that communicate withthe USR to execute the processes illustrated in FIGS. 32, 33 and 34 caninclude any of the mobile device 674, the POS terminal 676, theinterface device 682, the mobile device 652, the network access device658, the wireless user-device 735 and the computer 736 as some examples.In some embodiments, one or more of the preceding system elements cancommunicate with the system 640 via the second communication module 649.Further, functionality other than that illustrated in FIG. 7 can also beprovided with the USR. In particular, the USR illustrated in FIG. 7 caninclude functionality such as any or select portions of thefunctionality described herein concerning other embodiments of the USR.Further, any of the illustrated modules can be configured in hardware,software or a combination of hardware and software depending upon theembodiment.

Accordingly, it should be appreciated that embodiments can include othermodules and/or modules configured differently than those illustrated.For example, the first communication module 647 and the secondcommunication module 649 can be included in the same module; thecomparison module 645 can include a database, data-table or data-tree tostore the current random one-time codes for comparison, oralternatively, a separate database, data-table or data-tree can beincluded to store the current random one-time codes which are providedto the comparison module 645 for comparison. In various embodiment s,each of the modules included in the USR 640 is coupled to others of themodules.

According to one embodiment, the seed generation module 642 is incommunication with at least the database module 644 and the secondcommunication module 649. The database module 644 is in communicationwith at least with the generation module 646. Further, in theillustrated embodiment, the time reference 648 is in communication withthe generation module 646. In addition, the generation module 646 is incommunication with the comparison module 645, while the comparisonmodule 645 is also in communication with each of the first communicationmodule 647 and the second communication module 649.

In accordance with one embodiment, the seed generation module 642operates to randomly generate (for example, without replacement) andassign seeds for a plurality of users registered with the USR, forexample, users 1-N. Further, the generation module 642 communicates theseeds and their assignments to the database module 644 where theassigned seed associated with each user for a given time period arestored in association with one another such that they can be searchedand retrieved. According to a further embodiment, a separate assignmentmodule is included in the USR and operates to receive the seeds from theseed generation module 642 and assign the seeds to the plurality ofusers. In accordance with various embodiments, the database module 644can include a relational database such as relational database such asOracle® Database by Oracle Corp. of Redwood Shores, Calif., AdvantageDatabase Server or SQL Anywhere, each by Sybase of Dublin, Calif.,MySQL™ by Sun Microsystems of Santa Clara, Calif., DB2® by IBM Corp. ofArmonk, N.Y., or InterBase by Embarcadero Technologies of San Francisco,Calif. In other embodiments, the database module can include anobject-oriented database such as InterSystems CACHE by InterSystemsCorp. of Cambridge, Mass., JADE by Jade Software Corp. of Christchurch,New Zealand, or FastObjects by Versant Corp. of Redwood City, Calif.

In accordance with some embodiments, the second communication module649, communicates seeds to the system elements including user-devices,secured computers and other elements included in the USR system. In oneembodiment, seed updates are performed without requiring any userinteraction. For example, in one embodiment, a seed in a user device orremote USR element (for example, the USR element 768 illustrated in FIG.12) is updated in the background at a time when the device or registryelement are in communication. In a further embodiment, the update occurswithout knowledge of the user. Thus, the systems described herein caninclude automatic reseeding of remote end user devices and USR systemselements.

In accordance with the illustrated embodiment, the generation module 646receives a time reference from the time reference module 648 andreceives the assigned seeds and users from which it generates randomone-time code at the time T for the users 1-N and communicates thatinformation to the comparison module 645.

According to some embodiments, the comparison module 645 receives, viacommunication module 647, a random one-time code from a remote systemelement such as mobile device, POS device or the like and compares,using a code-matching search, the received random one-time code withthose generated by the generation module 646 to determine whether amatch exists. Depending on the embodiment, the communication of therandom one-time code can be over a network such as the networks 28, 656and 738 as illustrated and described herein. According to someembodiments, the current codes of a plurality of users are organized ina table, for example, a table that is organized numerically. In oneembodiment, the table can be searched using a search algorithm such as abinary search. In a further embodiment, the search begins by comparingthe value that is sought to the middle item of the table. If the valuematches the middle item, the search is successful. If the value is lessthan the middle item, then the higher half of the table is eliminatedfrom the search. If the value is greater than the middle item, then thelower half of the table is eliminated. The process is then repeated, forexample, depending on the embodiment either iteratively or recursively,within each remaining half of the table until a match is identified.According to various embodiments, other search techniques may be used tosearch the table.

In other embodiments, the current codes of the plurality of users areorganized in a tree data structure. According to one embodiment, thetree can be searched using a search algorithm, such as a binary searchtree. For example, a tree can include a plurality of nodes connected ina hierarchical tree structure, where each node to the left of a rootnode only contains a value less than the value that is contained in theroot node, and where each node to the right of the root node onlycontains a value greater than contained in the root node. Using a binarysearch tree, the search begins by comparing the value that is sought toa value stored in the root node of the tree. If the value matches, thesearch is successful. If the value is less than the value of the rootnode, for example, then the nodes of the left subtree are searchediteratively or recursively. If the value is greater than the value ofthe root node, then the nodes of the right subtree are searched. Thisprocess is repeated, descending the nodes of each subtree, until a matchis identified. According to various embodiments, other search techniquesmay be used to search the tree data structure.

As should be appreciated, the USR 640 illustrated in FIG. 7 can beemployed in embodiments that use an identification process andembodiments that use a verification process. Where an identificationprocess is used, the random one-time codes received by the firstcommunication module 647 are received without any static identifyinginformation. The comparison module 645 compares the received code withthe current codes for a plurality of users to authenticate an identityof the user. Where a verification process is employed, a static nominalconstant is included with the random one-time code, for example,appended to the random one-time code as a suffix or prefix. Here, thecomparison module 645 indexes the database by the static number toverify an identity of the user by determining whether the current randomone-time code is associated with the user who is identified by thestatic number. In some embodiments, the random one-time code is discreteand constantly changing with each change from one period of time to thenext.

It should also be appreciated that the system illustrated in anddescribed with reference to FIG. 7 can be employed with any embodimentdescribed herein in which the USR is employed to authenticate identity(using either an identification process or a verification process) basedon receipt of a random (or pseudo random) one-time code.

Referring now to FIG. 8 a system 670 includes a POS system 672 and amobile device 674. According to some embodiments the mobile device 674can include a wireless device, for example, a tablet computer, netbookcomputer, laptop computer, a mobile phone, a PDA, a smart card,electronic passport and the like.

In accordance with some embodiments, the POS system 672 includes a POSterminal 676, a credit/debit card interface 678, and a barcode reader680. Further, according to some embodiments, the POS system 672 includesa communication interface 681 which can include a wireless communicationdevice and/or a hardwired communication device. In accordance withvarious embodiments, the system element of the POS system 672 caninclude conventional system elements such as a conventional POSterminal, conventional credit/debit card interface and a conventionalbarcode reader. In various embodiments, the system 670 can include moreor fewer elements than those illustrated in FIG. 8. However, in additionto any of the preceding, the POS system 672 includes an interface device682 which is integrated with the POS system 672. In accordance with someembodiments, the interface device 682 includes a processor 684, a memory686, a display 688, a user interface 690, a wireless interface 692 and ahardwired communication interface 694.

In accordance with some embodiments, the interface device 682 operatesto allow a registered user of the USR in possession of the mobile device674 to conduct transactions using the USR and the conventional POSsystem elements. For example, the mobile device 674 can be used by theuser to conduct a transaction in the manner illustrated and describedwith reference to FIG. 4.

In accordance with some embodiments, the interface device 682 isemployed by an operator of the POS terminal of the POS system 672, forexample, a cashier or service person. Further, in some embodiments thePOS terminal 676 includes a cash register as is traditionally found in aretail establishment.

In accordance with various embodiments, the credit/debit card interface678 can include a magnetic stripe card reader or other means by whichaccount information is traditionally provided by the credit/debit cardholder to the point-of-sale system. Thus, in some embodiments thecredit/debit card interface can include a wireless interface that can,for example, communicate wirelessly with a smart card. However, asindicated here, these traditional credit/debit card interfaces may notalways be configured to allow a user of a mobile device 674 to takeadvantage of the functionality and greater security provided by the USRfor financial transactions even where the mobile device 674 includes asmart card. Thus, the interface device 682 provides transitionalhardware and software to allow the user of the mobile device 674 to takeadvantage of the functionality and increased security provided by theUSR. These advantages are also beneficial to the operator of the POSsystem 672 because they provide a higher degree of security forfinancial transactions that are conducted using the POS system 672. Theincreased security can be provided as described herein by using the USRand the mobile device in an identification process rather than averification process to authenticate the user of the mobile device 674and to confirm their credit worthiness.

In accordance with one embodiment, the processor 684 includes a memory686 while in accordance with other embodiments at least some of thememory 686 is external to the processor. In accordance with someembodiments, a microcontroller is included in the interface device 682where the microcontroller includes the processor 684 and at least someof the memory 686.

Further, in accordance with some embodiments, the display 688 includesan LCD display that can be employed by either or both of the operator ofthe POS system 672 and the user of the mobile device 674 to displayinformation. The user interface 690 can include a touch screenintegrated in the display 688 that employs icons or other graphicalsymbols to allow operation of the interface device 682 to facilitateprocessing of the financial transaction.

In accordance with various embodiments, the interface device 682includes any one or any combination of wireless communication protocolsand associated hardware including any of Wi-Fi communication 695, nearfield communication (NFC) 696, GSM (or other cellular communicationprotocols) 697 and Bluetooth communication 698. In accordance withvarious embodiments, one or more of these wireless communicationprotocols can be employed to communicate between the interface device682 and the mobile device 674 as well to communicate between theinterface device 682 and the USR. In other embodiments, alternate formsof wireless communication protocols and/or hardware can be employed inthe system 670. According to some embodiments a first wireless networkincluded in the wireless interface 692 is employed to communicatelocally between the mobile device 674 and the interface device 682 whilea second of the wireless networks 692 is employed to communicate betweenthe interface device 682 and the USR. In further embodiments, a wiredcommunication network is connected to the communication interface 681.

In general, the interface device 682 operates to receive and displaytransaction information concerning the transaction being conductedbetween the user of the mobile device 674 and the operator of the POSterminal 676 by, for example, displaying transaction details,authentication requests, approvals, and the like to either or both ofthe user of the mobile device 674 and the operator of the POS system 672on the display 688. Thus, in some embodiments the interface device 682receives the information that is generally provided to the credit/debitcard interface 678 concerning the transaction such as the totaltransaction amount, the cost of individual items being purchased,account information concerning an account of the user of the mobiledevice, merchant identification and current time and date. In someembodiments, this information is received and displayed at the interfacedevice 682 and also at the credit/debit card interface 678 in thetraditional manner, however, where the USR is employed the interfacedevice 682 can operate to take the place of the credit/debit cardinterface 678. For example, the interface device can receive theinformation necessary to authorize and complete the transaction from themobile device 674. In one embodiment, the electrical connection of theinterface device 682 to the POS terminal 676 can be completed byconnecting the interface device 682 in series between the POS terminal676 and the credit/debit card interface 678. According to thisembodiment, signals are transmitted from the POS terminal 676 to theinterface device 682 and are then communicated to the credit/debit cardinterface 678. According to another embodiment, the interface device 682is connected in parallel with the credit/debit card interface 678 suchthat communication of data from the POS terminal 676 occurs with thedirect receipt of the information by each of the credit/debit cardinterface 678 and the interface device 682.

In operation, and in accordance with one embodiment, a user of themobile device 674 activates the mobile device 674 for conducting afinancial transaction such as a purchase of an item at a retail or othercommercial establishment. In accordance with one embodiment, the deviceis activated in the manner illustrated and described at acts 462 to 466of FIG. 5. That is, the user first enters a PIN in the mobile device andcommunicates it to the USR. Following a receipt of the PIN by the USR amulti character numeric value is communicated to the mobile device andthe user's spoken input of the numeric value is employed to authenticatethe user and activate the device for the transaction. In accordance withone embodiment, the communication between the mobile device 674 and theUSR to activate the mobile device 674 is conducted without employing theinterface device 682. Thus, in accordance with one embodiment, thecommunication is over cellular network or other wide area networkbetween the mobile device 674 and the USR.

Once the mobile device 674 is activated, the communication link can beestablished between the mobile device 674 and the POS system 672. Ingeneral in these embodiments, a wireless communication link isestablished between the mobile device 674 and the POS system 672 via theinterface device 682. The user or an operator of the POS terminal 676can employ a barcode reader 680 or other conventional means to enterinformation that identifies the item or items being purchased into thePOS system 672. The POS terminal 676 receives the information concerningthe selected item or items and processes it in a conventional manner toprovide a total transaction amount.

In accordance with one embodiment a transaction summary is communicatedto the user's mobile device for display, review and approval. In someembodiments, the transaction summary is communicated via the interfacedevice where it may it also be displayed using the display 688. Thisprovides the user with an opportunity to review and if agreed, acceptthe transaction and request authorization from the USR to execute thetransaction. In accordance with one embodiment, the USR applicationprovided on the mobile device 674 allows the user to select anacceptance key or icon to indicate their agreement with the transaction,see for example, act 474 in FIG. 5. In accordance with furtherembodiments, the mobile device 674 using the USR application operates togenerate a random one-time code and communicate the random one-time codeto the USR along with all or some of the transaction details. As isdescribed with reference to FIG. 5, the USR performs a code matchingalgorithm to identify the user by locating a match between the USRcalculated code included among a plurality of codes calculated for aplurality of users, respectively, and the code generated by andcommunicated from the mobile 674. According to some embodiments, thecommunication between the mobile device 674 and the POS and the USR canbe completed at this stage using the information provided from the POSsystem 672 but without the need to communicate directly between the POSterminal 676 and the USR. However, successful completion of the codematching algorithm and check for the credit worthiness of the user ofthe mobile device 674 results in the USR communicating an approval backto the merchant and/or operator of the POS system 672. In a furtherembodiment, an acknowledgement of the transaction-approval is alsoprovided to the mobile device from the USR. According to someembodiments, the receipt of this information occurs at the interfacedevice 682 where it is displayed to the operator of the POS terminal676. According to another embodiment, the communication from the USR ofthe acceptance or denial of the transaction is communicated to one ofthe conventional elements included in the POS system 672, for example,the POS terminal 676.

In some embodiments, the mobile device 674 communicates the randomone-time code to the POS system 672. According to these embodiments, thePOS system 672 combines the code with information concerning any or allof the selected products and prices and a merchant account code. Thecombined information is communicated from the POS system 672 to the USR.Here too, a successful completion of the code matching algorithm andcheck for the credit worthiness of the user of the mobile device 674results in the USR communicating an approval back to the merchant and/oroperator of the POS system 672.

According to further embodiments, the USR can be employed to provideapparatus, systems and methods to conduct financial transactions betweenparties directly, securely and with greater convenience than currentapproaches. Further, in various embodiments, these approaches provideincreased security relative to known approaches by eliminating thenecessity to communicate any of, or at least any one of, accountnumbers, user names, PIN numbers or passwords. In addition, someembodiments are employed in mobile devices that allow flexibility inwhere and how these approaches are employed. For example, in variousembodiments the secure financial transactions can be conducted with auser's mobile device at vending machines, parking meters and at avariety of other locations. Further, the approaches described herein canbe employed even in situations in which the parties to the transaction(for example, two users employing mobile devices) are not incommunication with the USR at the time of the transaction and/or not inclose proximity to one another.

According to one embodiment, two users, each registered with the USR andeach having a funds transfer account, in close proximity to one another,intend to conduct a transaction that will result in a transfer fundsbetween their accounts. Each user independently activates theirrespective mobile device, for example, using the approach illustratedand described concerning acts 462-466 of FIG. 5. According to someembodiments, the device activation includes multifactor authenticationin which a biometric is employed. Further, in some embodiments, thecurrent seed provided from the USR is used in combination with thebiometric to activate the device. In some embodiments, the activation ofthe two mobile devices can include separate authentication protocolssuch that the user of a first mobile device is identified in amulti-factor authentication process that does not employ a biometric andthe user of a second mobile device is identified in a multi-factorauthentication process that does include a biometric.

According to a further embodiment, the mobile devices can store defaultvalues which can be employed in a financial transaction. The defaultvalues can be used to allow a more rapid completion of the transactionby reducing the amount of data that must be entered by the user of themobile device.

In some embodiments, the two users select the “Funds Transfer”application via the user interface of the respective mobile devices, forexample, by using a keypad (a soft keypad, a pushbutton-style keypad,etc.) or an icon located in a graphical user interface displayed at themobile device. Once the two users have opened the applications, thepayor-user enters the amount of the transfer. According to someembodiments, the payee-user then presses a “receive” control element(GUI icon, pushbutton etc.) which is available at the payee's mobiledevice via operation of the funds-transfer application. According tosome embodiments, the payor-user presses a “send” control element(either alone or in combination with the payee-user pressing the“receive” control element) which is available on their mobile device viaoperation of the funds-transfer application.

Communication is opened between the two mobile devices and data isexchanged. According to the embodiment, a selected one of a variety ofwireless communication protocols can be employed. These may includeBluetooth, NFC, or infrared or other optical or RF signals depending onthe embodiment.

According to another embodiment, the mobile devices each include anaccelerometer, shock switch or other shock sensor such thatcommunication between the two devices can be initiated when the twousers bring the two mobile devices into contact with one another. Forexample, the two mobile devices can be “bumped” into one another(directly or indirectly, for example, via contact between the users'hands) so that the transmitted shock/vibration acts on each to opencommunication via the funds-transfer application. In addition, thepreceding can be employed in combination with other user acts such as aselection of an icon in the display of the user's mobile device.

In some embodiments, the two devices can remain in communication forcompletion of the funds-transfer authorization via the USR. According toone approach, the user-payor employs the mobile device to generate andcommunicate to the USR a first random one-time code that is employed bythe USR to identify the payor. Further, the user-payee employs theirmobile device to generate and communicate to the USR a second randomcode that is employed by the USR to identify the payee. The USR canseparately employ a code-matching algorithm, as described herein, toperform the identification of the parties to the transaction.

In general, at least the payor includes the transaction amount in thecommunication with the USR while in a further embodiment, each of thepayor and the payee communicate the agreed upon transaction amount tothe USR. According to this later embodiment, the transaction amountsmust agree for the transaction to proceed.

According to some further embodiments, the USR separately authenticatesitself to the two mobile devices employed in the transaction bygenerating a subsequent random one time code based on a seed associatedwith the respective mobile device and the current time. The one timerandom code generated by the USR for the user-payor is communicated tothe payor's mobile device and the one time random code generated by theUSR for the user-payee is communicated to the payee's mobile device. Thetwo mobile devices each employ their respective seed with the time thatthe USR generated the random one-time code to confirm the identity ofthe USR.

The USR can communicate (subsequent to or along with the communicationof the respective random codes) a digital image of the payor to thepayee and a digital image of the payee to the payor. Further, for addedsecurity, the USR can transmit multiple images (for example, a “line-up”of images) of a plurality of individuals to the two parties and thefunds transfer is not finalized until the payor accurately selects theimage of the payee and the payee accurately selects the image of thepayor from among the respective plurality of images which are received.Security of such an approach can be increased by allowing each of theparties only one or some other limited number of selections in which toaccurately identify the correct image.

The parties communicate via the respective mobile devices theconfirmation of the visual identity of the other party to the USR whichthen operates to transfer (for example, electronically transfer) therequested amount of funds from the payor's account to the payee'saccount.

According to some embodiments, a funds transfer can also be completedbetween a payor and payee even where the two parties are not inproximity with one another. According to these embodiments, the payoractivates their mobile device and selects the funds transferapplication. The payor then enters an identifier that identifies thepayee such as the payee's mobile phone number, the payee's email, etc.along with the amount of the transfer. The payor communicates with theUSR and transmits a one-time random code that the USR employs toidentify the user. The USR identifies itself to the payor bytransmitting a subsequent random one-time code based on the seedassociated with the payor's mobile device and the current time.According to this embodiment, the payor confirms the identity of the USRbased on the received one-time random code. In some embodiments, thepayee is identified by the USR and the payee confirms the identity ofthe USR in a similar manner. Here too, the USR can communicate a digitalimage of the payee to the payor and an image of the payor to the payeefor increased security. Provided that the preceding identity-process issuccessfully completed, in some embodiments, the payor can then selectthe “pay” soft-key provided by the funds transfer application.

According to another embodiment, the USR and a mobile device of aregistered user with a funds transfer account can be employed by theuser to conduct transactions (for example, make purchases) at a vendingmachine, self-service check out, unmanned-kiosk and the like. Accordingto these embodiments, the owner or proprietor of the unmanned system isalso registered with the USR and has an account that includes the fundstransfer option. According to this embodiment, the payor opens the fundstransfer application as previously described and communicates with theunmanned system to conduct a transaction. Information concerning thetransaction such as the selected item, the cost, sales tax (if any), theidentity of the parties and the like can be communicated. According toone embodiment, the owner or proprietor is a corporation or otherbusiness entity. According to this embodiment, the logo of the businessentity is communicated to the mobile device for display to the user. Theuser can visually confirm that they are dealing with the correctbusiness entity and then enter the amount of the transaction and acceptthe purchase by selecting the appropriate soft-key generated by thefunds transfer application.

According to some embodiments, the funds transfer described in thepreceding paragraph is completed using an authentication process withthe USR on a substantially real-time basis. For example, the identity ofthe payor can be performed as described above prior to the payor receiptof the item. Where real-time communication between the mobile device andthe USR is unavailable for the transaction, the actual funds transfer iscompleted at a later point in time as described below.

According to any of the preceding embodiments, execution of financialtransactions (including purchases, etc.) approved and authorized by apayor and a payee can be deferred if the two parties are not incommunication with the USR at the time the parties agree to thetransaction. The completion of the transaction including thecommunication of the random one-time codes, successful identification ofthe USR and cross-identification by the parties can be separatelycompleted by the payor and the payee when they are next in communicationwith the USR. The USR can defer the transaction until each of the twoparties completes the parts of the transaction for which they areresponsible. According to some embodiments, the communication betweenthe users' mobile devices and the USR is automatically established whensuch communication is next available.

Referring now to FIG. 6, a process 500 is illustrated by which users canemploy their mobile devices for use in a personal payment transaction,or other types of interactions during periods where the user devices arein communication with USR. The process generally includes theauthentication of the users by their respective devices, for example, bytheir mobile devices. The process 500 may, in some embodiments, alsoinclude communication between the two devices, for example, wirelesscommunication between the two devices. However, in other embodiments,communication between the two devices is not employed. In someembodiments, identities of each of the two users are authenticated byUSR. In other embodiments, USR authenticates an identity of only one ofthe two users, for example, the payor. Further, in some embodiments, USRauthenticates itself to either or both of the devices via a “handshake”process as described below.

The approaches described herein generally employ multi-factorauthentication. According to some embodiments, the approaches employ 3+factor security. As referred to herein 3+ factor security employs eachof something the user knows, something the user has, and something theuser is, and in addition, employs one of the preceding three factorsmore than once. Such approaches are described in greater detail herein.

Referring to the process 500, at Act 502, user #1 is authenticated bytheir mobile device (Device 1). Similarly, at Act 504, user #2 isauthenticated by their mobile device (Device 2). According to someembodiments, the process 500 includes Act 506 in which Device 1 andDevice 2 establish a communication protocol with one another. Thecommunication protocol may allow the wireless exchange of identifyinginformation (for example, public identifying information) for each ofuser #1 and user #2. For example, Device 1 can transmit a public ID ofuser #1 to Device 2 while Device 2 transmits a public ID of user #2 toDevice 1. Act 506 is identified as optional because, according to someembodiments, the process 500 is completed without any directcommunication between Device #1 and Device #2.

Although the current embodiment is described with reference to afinancial transaction that involves user #1 and user #2, the approachesdescribed herein may be employed by two or more parties to authorize(and/or agree to) a variety of actions. According to these embodiments,the user selects an identity of the other party(ies), the agreed uponact, and if necessary, any other details, constraints or qualifiers. Aswill be apparent to those of ordinary skill in the art, the partyidentification is in the form of something other than a “payee” or“payor” where the action does not involve a payment. Further, regardlessof the form of transaction the identification of the parties to thetransaction can include the identification of an entity such as acompany or other organization rather than an individual.

According to one embodiment, at Act 508 user #1 selects each of thepayee and an amount of a financial transaction. Further, user #1 canalso select, at Act 508 an amount of the transaction and/or an accounttype (or other identifier) suitable with the selected transaction.

According to this embodiment, user #1 can select/enter the payeeidentification using data stored in the mobile device or by manuallyentering the ID information in the device. According to one embodiment,the identifying information of user #2 is located in the contact oraddress book in Device 1. Therefore, depending on the embodiment, theidentifying information of user #2 can be provided by user #1 in theform of any of a name, a shorthand identification, an email address orphone number of user #2 which is selected from the contacts stored inDevice 1. Alternatively, where the process 500 includes the Act 506 thepayee identification can be provided to user #1 by transmission fromDevice 2 to Device 1. Similarly, at Act 510 user #2 selects each of apayor (user #1) and an amount of the financial transaction.

In some embodiments, the information selected by user #1 is communicatedto USR at Act 512 (for example, wirelessly transmitted). In addition,Device 1 can be employed to generate a non-predictable value, asdescribed elsewhere herein, that is used to authenticate the identity ofuser #1 at USR. In the illustrated embodiment, the transmission of thenon-predictable value is included in Act 512. According to otherembodiments, the non-predictable value is transmitted in a separate actthat precedes Act 512. In addition, Act 512 can be preceded with a stepor series of steps included in the process 500 in which USRauthenticates itself to the device. For example, as illustrated in theprocess 580 of FIG. 10.

At Act 514, user #2 employs Device 2 to generate and communicate atransaction request/authorization to USR in a similar manner to thatdescribed with reference to Act 512. Here too, a non-predictable valuecan be communicated from the user's device (Device 2) to USR along withthe payor ID and the dollar amount of the transaction. Further,according to some embodiments, Device 2 can be employed to generate anon-predictable value, as described elsewhere herein, that is used toauthenticate the identity of user #2 at USR. In addition, Act 514 can bepreceded with a step or series of steps in which USR authenticatesitself to the device. For example, as illustrated in the process 580 ofFIG. 10.

At Act 516, USR authenticates identities of user #1 and user #2,respectively. According to various embodiments, Act 516 can include oneor more additional acts. For example, provided that the authenticationof user #1 is successful, USR can also check the availability funds forthe requested transaction.

At Act 517, where the authentication of either or both of user #1 anduser #2 is unsuccessful or the necessary funds are unavailable USR cancommunicate the fact to either or both of user #1 and user #2. Accordingto some embodiments, the process 500 ends where at least one of theauthentications is unsuccessful. In some embodiments, following act 517,the process 500 can include a subsequent attempt to complete thetransaction by either or both of user #1 and user #2.

According to further embodiments, execution of the transaction can alsorequire confirmation by the respective users of the identity of theothers. For example, as illustrated in FIG. 6, at Act 518 USR transmitsan image of the payor (user #1) to the payee (user #2) and an image ofthe payee to the payor for local authentication of identity by theparties to the transaction. According to this embodiment, an image ofthe payor (user #1) appears on display of Device 2 and an image of thepayee (user #2) appears on a display included in Device 1.

According to this embodiment, USR defers executing the transaction untilthe users accept the identity of one another based on the image, see Act520. For example, where user #1 accepts the identity of the displayedimage of user #2 and communicates acceptance to USR (for example, byselecting a key or icon included in the display of Device 1) and user #2confirms the identity of user #1 in the same manner using Device 2. Inaccordance with some embodiments, only one of the two parties to thetransaction receives an image of the other. In accordance with stillother embodiments, neither party receives an image of the other, forexample, the process 500 does not include Act 518. Here too, the processcan terminate where USR does not receive either or both of theacceptances.

According to some embodiments, the process 500 does not include Act 506.Instead, the mobile devices of the two users do not directly share anyinformation with one another. According to this embodiment, Device 1communicates identification of the payee in the form of theidentification selected from data included in the mobile device ormanually entered by user #1. User #2 can employ the same approach usingDevice 2 to identify the payor.

Referring now to FIG. 9, a process 540 is illustrated where atransaction is initiated by two users in situations in which either orboth of the associated devices is not in communication with USR. This issometimes referred to as an out-of-band transaction. At Act 542, Device1 authenticates user #1 and at Act 544, Device 2 authenticates user #2.Either of Act 542 and Act 544 can be accomplished as described elsewhereherein by local authentication of the user, respectively (for example,by the user's mobile device).

At Act 546, the devices open a communication protocol with one anotherto initiate the transaction by, for example, exchanging public IDinformation as described concerning Act 506 illustrated in FIG. 6.According to other embodiments, the process 500 does not include adirect communication between the two devices and the mobile devices ofthe two users do not directly share any information with one another.Instead, the public ID info is provided to the USR by the respectiveuser as described with reference to the process 500.

At Act 548, user #1 selects each of a payee and an amount of the desiredfinancial transaction. Similarly, at Act 550, user #2 selects each ofthe payor and an amount of the financial transaction.

Although the current embodiment is described with reference to afinancial transaction that involves user #1 and user #2, the approachesdescribed herein may be employed by two or more parties to authorize(and/or agree to) a variety of actions. According to these embodiments,the user selects an identity of the other party(ies), the agreed uponact, and if necessary, any other details, constraints or qualifiers. Aswill be apparent to those of ordinary skill in the art, the partyidentification is in the form of something other than a “payee” or“payor” where the action does not involve a payment. Further, regardlessof the form of transaction the identification of the parties to thetransaction can include the identification of an entity such as acompany or other organization rather than an individual. As will also beapparent, where the action/permission to be agreed upon does not includea payment, the respective parties can provide USR with a descriptionconcerning the requested action, for example, access to a particularphysical space or secure electronic system during a specific time-periodand/or for an agreed upon cumulative amount of time.

In the illustrated embodiment, where Device 1 is not in communicationwith USR, the authentication of user #1 and processing of the paymentrequest is delayed until such time that Device 1 can communicate withUSR. Similarly, where Device 2 is not in communication with USR, theauthentication of the identity of user #2 and the processing of thepayment is deferred until such time that Device 2 is in communicationwith the USR. Accordingly, the transaction is not completed until eachof Device 1 and Device 2 are in communication with USR, subsequent toacts 548 and 550, such that remaining acts included in the process 540can be completed.

For example, where Device 1 is not in communication with USR at the timeuser #1 requests the transaction then the non-predictable valueassociated with user #1 is transmitted to USR along with a payee ID andthe dollar amount of the transaction when Device 1 is next incommunication with USR. Similarly, at Act 554, where Device 2 is not incommunication with USR at the time user #2 requests the transaction thenthe non-predictable value associated with user #2 is transmitted to USRalong with the payor ID and the dollar amount when Device 2 is next incommunication with USR. As described with reference to the process 500of FIG. 6, either or both of the acts 552 and 554 can be preceded by anauthentication of USR to the respective mobile devices, for example, asillustrated in acts 586 to 590 of the process 580 in FIG. 10.

At Act 556, USR authenticates the identity of the payor (user #1) usingthe non-predictable value received from Device 1 while at Act 558 USRauthenticates the identity of the payee (user #2) using thenon-predictable value communicated from Device 2.

At Act 560, where USR successfully authenticates the identities of bothpayor and payee, the request is processed. Alternatively, shouldauthentication of at least one of the parties to the transaction failUSR will not complete the transaction but will instead notify theparties that the request cannot be processed, at Act 561. Where thetransaction is completed successfully, USR transmits confirmation to thepayee and payor at Act 562.

Referring now to FIG. 10, a process 580 is illustrated includingmulti-factor security where the factors include each of something theuser knows, something the user has, and something the user is. The useof one of the preceding factors more than once in an authenticationprocess (in the same or different form) adds an additional level ofsecurity that provides 3+ security. For example, in some embodiments, afirst form of biometric is included in the original three factors thatare authenticated (for example, voice recognition) and a second form ofbiometric (for example, an image) must also be authenticated to allowthe action (for example, a financial transaction) to proceed. Accordingto some embodiments, the respective factors may be authenticated by thesame elements or different elements included in the process. Forexample, one or more factor can be authenticated for device activation,while the same or different factor(s) are authenticated by USR. In afurther embodiment, the same or different factors for the same user orentity are authenticated by a third party, for example, an operator of aPOS or a party to a personal payment.

At Act 582, a user's device authenticates the user based on a biometricinput. The biometric input can be any of the variety of biometric inputsdescribed herein including voice, fingerprint, handwriting, retinal scanor any other form of biometric that can be sensed and processed by thedevice. Although illustrated as authentication using a biometric, otherforms of device-based user authentication can be used in accordance withvarious embodiments.

At Act 584, the user enters a PIN in the device. Further, the PIN isemployed along with the time and the seed which was previously providedto the device by USR to provide a non-predictable value, NPV #1. As willbe recognized, the non-predictable value includes a time-varying valuewhere time is employed in the derivation of the NPV #1. At Act 586, theprocess continues with all or a portion of NPV #1 being transmitted toUSR for an initial identification of the user in possession of thedevice. According to one embodiment, the non-predictable valuesgenerated in the process 580 are 20 digits or more. However, the numberof digits (either generated or transmitted) can be adjusted in advanceto achieve a desired level of security.

For example, Act 586 can include a transmission of a complete 20+ digitnon-predictable value. Alternatively, only a portion of the 20+ digitnon-predictable value can be transmitted from the device to USR for aninitial identification (that is only a subset of digits generated aresubmitted). In some embodiments, a generation and/or transmission of anon-predictable value having a smaller size can increase the efficiencyand speed at which the process 580 is completed. Then, at Act 587, USRemploys the transmitted non-predictable value to determine an identityof the user associated with the device. In various embodiments, one ormore of the code matching approaches described herein can be employed atUSR in Act 587.

Should the initial identification using NPV #1 fail, the process canalso include an Act 589 in which the USR notifies the user that theidentification failed. According to some embodiments, the user may getan opportunity to provide another NPV #1 to USR to initially establishtheir identity.

At Act 588, USR, using the time and the seed associated with the device,determines the next non-predictable value in sequence that would begenerated by the device. The USR generates this next-in-sequencenon-predictable value (NPV #2) and transmits it to the user device. Heretoo, can include a transmission of a complete 20+ digit non-predictablevalue. Alternatively, transmission of the non-predictable value caninclude all or only a portion of a 20+ digit non-predictable value(again, only a subset of digits generated are transmitted).Considerations here include the desired level of security, theprocessing power included in the user's device and the associated amountof time required for the device to perform the comparison required toauthenticate USR.

Should the validation of the USR fail, the process can also include anAct 591 in which the USR receives notification that the validation atthe user device was unsuccessful. According to some embodiments, the USRthe same or a different NPV #2 subsequent to Act 591.

At Act 590, the user device validates USR based on NPV #2. For example,user device can employ the seed and the time of the time increment atwhich NPV #2 was generated to determine the value that is generated byan authentic USR. The user device compares NPV #2 to this value todetermine whether the device is in communication with USR rather than animposter (to detect man-in-the-middle attacks). Provided that USR issuccessfully authenticated by the device, the process 580 proceeds toAct 592.

At Act 592, the user device generates NPV #3 using at least the time andthe seed associated with the device and transmits NPV #3 to USR. In thisinstance, the full 20+ digit non-predictable value is transmitted in itsentirety to provide a high level of security. In addition, asillustrated at Act 594, NPV #3 can be combined with informationidentifying the recipient of funds involved in the transaction as wellas an amount of the transaction before being transmitted. In oneexample, NPV #3 is XORed with the information regarding the recipient ofthe funds and the amount. Further, in some embodiments where lowersecurity is acceptable, act 592 includes transmission of fewer than 20digits to increase the speed of the process 580.

At Act 596, USR authenticates the identity of the user based on thenon-predictable value transmitted from the user device (NPV #3). Inaddition, USR can check for the availability of funds in the user'saccount.

Should the authentication fail, the process can also include an Act 597in which the USR notifies the user that the authentication failed.According to some embodiments, the user may get an opportunity to try asubsequent authentication attempt with USR at Act 597.

At Act 598, USR processes the transaction provided that the identity ofthe user is properly authenticated and that the available funds aresufficient to cover the requested transaction. USR can notify a selectedparty or party to the transaction should the authentication and/orfinancial check fail.

According to alternate embodiments, the USR acts as an intermediary tobanks, credit card companies or other financial service entities.According to these embodiments, the USR communicates the transactiondetails to the financial services company. The approval or denial of thetransaction is then communicated to the user either directly from thefinancial services company or via USR, depending on the embodiment.

In addition, in some embodiments, an image of the user can betransmitted to either the user's device (to allow the user to displaythe image to another party to the transaction) or directly to the deviceof the other party for display. According to these embodiments, USRdefers the processing described at Act 598 until receipt of anacknowledgement by the party who has responsibility for review of theimage authenticating the identity of the user.

In this or any other embodiment in which an image of a first party to atransaction request is displayed for review by a second party, theselection of the image that authenticates the identity of the firstparty can be a pre-requisite to the completion of the transaction. Forexample, as described herein with reference to Act 518 and 520 of FIG. 6or Act 486 of FIG. 5. Further where embodiments include such an act at apoint-of-sale, a clerk or other staff-member can select the image fromamong a plurality of images that are displayed at the POS terminal (forexample, the POS terminal 676 or the interface device 682 illustrated inFIG. 8). In one approach, each of a plurality of customers hasestablished wireless communication with the POS terminal or interfacedevice and an image of each is displayed to the clerk. The clerk selectsthe image of the customer who is currently conducting the salestransaction. For example, the clerk can select the image of the userwith a touch-screen included for the POS (either a fixed location POS ora portable tablet-type POS).

Further, where the close proximity of multiple individuals/partiesrequires a selection of a unique party to the transaction from among aplurality of possible parties, a customer can enter a unique POSidentifier to either initiate or complete a selected transaction. Forexample, the user enter the number associated with a particular checkout station/line, gas pump, etc. According to some embodiments, aproximity signal is employed to restrict transactions to only thosewireless user-devices that are located immediately adjacent to the POS,or the wireless user device of the other party.

According to various embodiments, the non-predictable values employed inthe process 580 are random one-time numbers, for example, pseudo randomnumbers. Further, according to some embodiments, the non-predictablevalues used to identify the user to USR (for example, at act 586) and toidentify the USR to the user (for example, at act 588) are a partial (orsubset of digits) from a non-predictable value generated for a previoustime period for the user that were not employed for authentication. Forexample, the NPV #1 and the NPV #2 are previously generated but unusedrandom one-time numbers, or portions thereof. Further, the precedingembodiments can be used where the USR is a “cloud” resource available tothe user. According to some embodiments, the USR receives a firstportion of NPV #1 from the wireless user-device where the first portionis employed by the USR to identify the wireless user-device to the USR.Prior to authenticating the identity of the user but with a high degreeof certainty that it is communicating with an authorized user-device,the USR transmits a second portion of the NPV #1 to the user-device.Thus, the second portion of NPV #1 is employed as NPV #2 in the process580. Where the second portion matches the value expected (generated as aportion of NPV #1) by the user-device, the user-device has a high degreeof certainty that user-device is communicating with the USR rather thanan imposter to complete the authentication process (for example, theauthentication process 580 beginning at 592).

According to some embodiments, an untransmitted portion of a previouslygenerated non-predictable value may be employed as an exclusive-or (XOR)checksum to insure the integrity and authenticity of the informationbeing transmitted. Similarly, previously generated but unusednon-predictable values can be used to encrypt (for example, using anexclusive-or operation) data communicated from either the user-device orthe USR.

Further, in various embodiments, the random one-time code (for example,any of NPV #1, NPV #2 and NPV #3) is generated by employing a PIN incombination with any one of or any combination of an electronic serialnumber of the user-device, a SIM number of the user-device and a seedassociated with the device. According to one embodiment, the PIN isstored in the user-device while in an alternate embodiment the PIN isnot stored in the user-device.

Referring now to FIG. 11, a system 650 including a USR 654 and aplurality of wireless user devices 652 (for example, wireless tokens1-N) is illustrated in accordance with one embodiment. As used herein,the term “token” refers to a device that represents at least one factoremployed in authenticating an identity of a user or entity. As should beapparent, in some embodiments, a token can include a mobile user devicesuch as a mobile phone where the token represents something the userhas. For example, the token can include a seed that must be employed togenerate authentication information that can be successfully processedby the USR 654. In the illustrated embodiment, the system 650 can alsoinclude one or more network access devices 658, depending upon theembodiment, and a network 656. In general, the system 650 can beemployed by a user in possession of a wireless token such as a smartphone, tablet or other form of wireless electronic device. According tovarious embodiments, the network 656 provides users with access to thecloud where a variety of remote resources (for example, the USR 654) canbe accessed.

In the illustrated embodiment, each of the wireless user devices 652include a biometric sensor 602, a user interface 604, a wirelesstransceiver 606, a processor 608, a display 610, a memory 612 and apower source 614. According to one embodiment, the display 610 isincluded in the user interface 604. In various embodiments, thebiometric sensor 602 can detect at least one of a voiceprint, afingerprint, a signature and a retinal scan. Further, one or morecommunication busses can be included in the wireless user device 652 toa communication of electronic signals within the user device such as thecommunication of data and/or instructions. The processor 608 can, forexample, control communication within the user device 652. According tosome embodiments, the processor is included in a microcontroller.

In some embodiments, the system 650 includes all or some of the featuresand functionality described with reference to the system 730 illustratedin FIG. 12. For example, the wireless networks and wirelesscommunication protocols employed for communication between the wirelessuser devices 652 and/or between the user devices and the network accessdevice 658 can include any of those identified with reference to thesystem 730. As another example, the wireless device 652 can include allor some of the features and functionality described with reference tothe wireless user device 735 of the system 730 illustrated in FIG. 12.For example, the wireless user device 652 can include any of the seed757, the SIM 758 and the ESN 759 illustrated in FIG. 12. Further, insome embodiments, the USR 654 includes all or some of the features andfunctionality of the USR 734 of the 730 illustrated in FIG. 12.

In various embodiments, the system 650 can also be employed as apeer-to-peer secure identification system. According to one embodiment,biometric information for a pre-defined affinity group (for example:U.S. air marshals; FBI, CIA, Secret Service, Homeland Security or TSApersonnel; airline employees, members and/or employees of Congress, theWhite House, the Pentagon, Fortune 500 companies, private organizationsor the armed services) is maintained by the system. The system 650allows members of the affinity group to challenge and/or identifythemselves to one another in a highly secure manner with a high degreeof certainty that the authentication information that is presented islegitimate. According to some embodiments, the wireless user-device 652,for example, the wireless user-device 652 of a challenger is stationaryrather than a mobile device.

In general, authorized individuals register and establish their secureaccount at the USR 654 (see, for example, approaches described withreference to FIGS. 1-3, herein). In some embodiments, their digitalphotograph or other biometric information is obtained and stored in thedatabase included in the USR 654. Other members of the affinity groupregister similarly and an affinity group manager establishes the membersof the group. In one embodiment, the affinity group manager directlymanages the membership on the USR server(s). According to anotherembodiment, the manager contacts the business entity that operates theUSR 654 and that organization implements the necessary change(s) inmembership status. In some embodiments, a different type of biometric isemployed either alone or in combination with the image in anauthentication process.

The stored biometrics and/or images are used as described below toauthenticate identity. According to these embodiment, each of the userdevices 652 stores a first portion (the A portion) of the biometric,respectively, of all members of the affinity group (with the possibleexception of themselves). The user device 652 stores a second portion (aB portion) of the biometric of the user associated with the user device652.

In a further embodiment, when two members of an affinity group meet theyemploy their respective user devices 652 and stored biometricinformation to authenticate one another. In one embodiment, a first userwirelessly transmits the B-portion of their biometric to the user device652 of a second user. The user device 652 of the second user receivesthe B-portion for the first user and combines it with the previouslystored A-portion for the first user to provide the full biometric forthe first user. The second user then reviews this “full” biometric ofthe first user to authenticate the first user. According to oneembodiment, the biometric includes an image where the A-portion and theB-portion are different portions of the image, for example, they may bedifferent halves. The “full” biometric of the first user can bedisplayed in a display included in the user device of the second user.Similarly, in some embodiments, the second user also wirelesslytransmits the B-portion of their biometric to the user device 652 offirst user. The user device 652 of first user receives the B-portion forsecond user and combines it with the previously stored A-portion for thesecond user to provide the full biometric for the second user. The firstuser then reviews this “full” biometric of the second user toauthenticate the second user.

In some embodiments, the biometric is split in half and the firstportion and the second portion are halves. However, the biometric neednot be split in half. Accordingly, in some embodiments, the percentageof the biometric of other members of the affinity group stored on a userdevice can be either a higher or lower percentage of the full biometric.Regardless of the split, the combination of the two biometrics need onlyprovide a full biometric in combination with the corresponding portion.

According to some embodiments, the biometric (for example, an image) isdivided in a manner that further increases the security of theseapproaches. For example, an algorithm can be employed at each of the USR654 and the user devices 652 to divide the stored images for aparticular affinity group in a varying and irregular manner. Accordingto one embodiment, the division is latitudinally (horizontally) so thatthe first and second portions are upper and lower regions of the image,respectively. According to another embodiment, the division is occurslongitudinally (vertically) so that the first and second portions areleft and right regions of the image, respectively. Employing such analgorithm, the two portions of the images provide the A and B portions,respectively, as a ratio of the percentage of the image included inportion A to the percentage of the image included in portion B varies.

In some embodiments, the parties in an affinity group can, using theirwireless user devices 652 challenge one another when they meet. In oneembodiment, a soft key is selected in a user interface of the mobiledevice 652. The selection of the identity-application on the user deviceinitiates a Bluetooth handshake in which authentication information iscommunicated from one device to another. In general, the communicationserves to establish to each user that the other user appears to be aregistered member of the affinity group, and following that,authenticates their identity. In some embodiments, a proprietaryprotocol is employed by the devices 652. In one embodiment, such aprotocol utilizes asymmetric encryption. A high resolution image of thechallenged individual and relevant identifying information (for example,identifying who they purport to be) is displayed on the user device ofthe challenger. The image is a full image including the A-portion andthe B-portion of the image which are assembled by the wireless userdevice 652 of the challenger.

An approach in which the user devices store the various portions of thebiometrics is advantageous because the user devices need not be incommunication with USR 654 to perform an authentication. According tothese embodiments, access to the network 656 or other network forcommunication with the USR 654 is not required. Thus, the authenticationprocess can be completed in locations where external network access isunavailable such as, for example, underground locations, “black”facilities, in a plane at 30,000 feet of altitude, on land, sea, orspace. However, in other embodiments, the A-halves are not stored on theuser devices 652 but are instead stored at USR 654. According to thisembodiment, USR 654 communicates the A-half of a user on request from amember of the affinity group.

Advantages of these approaches include the fact that the approach israpid. Simple and convenient to use, provides increased securityrelative to other approaches, is incorporated in an existing itemcarried by the great majority of people, does not draw attention to theparticipants when in use, can be field upgradeable with affinity groupadditions and deletions in substantially real-time where communicationwith the USR 654 is available, and cannot be used by a third party iflost or stolen.

Further embodiments can also provide any of: control of secure access toclassified computers and/or networks; provide secure access to physicalfacilities, supplement or replace existing less-secure personal IDapproaches such as conventional ID badges, ID documentation, driverslicenses, and passports); replace credit cards, toll payment devices,activate/deactivate security alarm systems at home or office; andprovide audit trails via, for example, the use of GPS integrated in thewireless user devices 652.

In addition, the system 650 can include the following features in thewireless user device 652: a duress alarm whereby a user can employ theuser device 652 to signal the USR 654 that they are under duress withoutdetection by others (for example, where the user adds a known value (+1)to the PIN at the time of entry); and a self-destruct mode in whicheither or both of hardware or software/stored data of the user device652 is destroyed or rendered inoperable when tampering or abuse of thedevice is detected. In some embodiments, “self-destruct” can also betriggered based on a passage of time without receiving and/or being ableto communicate a reset signal; based on targeted events; or when alocation of the user device 652 is out of a pre-defined geographic area.To further increase security, the user device 652 can cryptographicallyhash data files when not in use.

In some embodiments, the user is challenged by other than an individualwith another wireless user device 652. For example, the precedingapproaches can be applied to point-of-sale transactions or an accesscontrol point. Also, although the above-described approach describes useof an image as the shared biometric, further approaches can employ anyof a fingerprint, a signature, a voiceprint and DNA codes as the sharedbiometric.

Referring now to FIG. 12, a system 730 employing a Universal SecureRegistry (USR) is illustrated in accordance with one embodiment. In theillustrated embodiment, the system 730 includes a USR 734, a wirelessuser device 735, at least one computer 736 and a network 738. Inaccordance with various embodiments, the wireless user device 735 caninclude any of a mobile phone, a tablet computer and a personal digitalassistant or other type of computing device.

In the illustrated embodiment, the USR 734 includes a user interface740, a processor 742, a communication interface 744 and a database 746.The USR 734 can also be configured with fewer than all of the precedingelements or additional elements alone or in combination with thepreceding. For example, the USR 734 can include any of the elementsand/or functionality concerning the USR embodiments described herein.Further, the USR 734 can include one or a plurality of serversco-located or in configurations in which one or more of the servers isgeographically remote from others of the servers. According to oneembodiment, the USR 734 provides a secure centralized registry that canbe employed to facilitate a variety of activities, for example,activities in which authentication of identity is required.

In the illustrated embodiment, the wireless user device 735 includes auser interface 750, a secure element 751, a memory 753, a processor 752,a wireless transceiver 754, a display 755, a biometric sensor 756, aseed 757, a Subscriber Identity Module (“SIM”) 758 and an electronicserial number 759.

In accordance with various embodiments, the user interface 750 caninclude any of a keypad, a camera, a microphone and the display 755. Inone embodiment, the user interface includes a touch screen graphicaluser interface.

In accordance with various embodiments, the memory 753 can include aplurality of memory devices, for example, RAM, ROM, flash memory, SRAMmemory or other memory devices. In one embodiment, the processor 752 isincluded in a microcontroller that includes the processor and memory.Further, the memory can be a discrete memory component, integral to themicrocontroller or include both a discrete component and memory includedin the microcontroller.

In accordance with some embodiments, the wireless transceiver 754provides a communication interface in which the wireless user device 735transmits information including authentication information from thedevice 735. The wireless user device 735 can also include one or morehardwired communication interfaces. As should be apparent, the wirelesstransceiver 754 can also be configured to receive informationtransmitted to the wireless user device 735.

According to some embodiments, the seed 757 is distributed in a manneras described herein concerning the embodiments associated with FIG. 7.In some embodiments, either or both of the seed 757 and the electronicserial number 759 are stored in the memory 753. In further embodiments,the seed 757 and the electronic serial number are stored in a region ofthe memory 753 that is secured in a manner that makes it more difficultto access by unauthorized parties (which may, for example, include theuser). According to some embodiments, the secure element includes anelectronic component such as one or a combination of a processor, amicrocontroller and a memory. In accordance with some embodiments, theUSR seed 757 and/or the electronic serial number 759 are stored in thesecure element 751.

In accordance with one embodiment, the computer 736 includes a wirelesstransceiver 760, a user interface 762, a processor 764, a memory 766 anda USR element 768. Further, the system 730 can include one or aplurality of computers, such as the computers 1-N. For example, a singlewireless user device may be employed to access each of the plurality ofcomputers. In one embodiment, the plurality of computers can include anoffice computer, home computer and any number of computers that cancommunicate with USR and are secured using the system illustrated inFIG. 12. The computer 736 can include a plurality of computers that aregeographically remote from one another. In accordance with variousembodiments, the computer can include anyone of a desktop computer, anotebook computer, a laptop computer, a netbook computer and a tabletcomputer. As will be apparent, other styles and types of computers canbe employed in the system 730. In accordance with some embodiments, thecomputer is a “dumb” terminal that provides access to a network such asa wide area network (the Internet, an intranet or both) that allows anauthorized user to access resources (for example, using a web browser)via the computer terminal.

In accordance with various embodiments, the network 738 can include awide area network, a local area network or a combination of wide areanetwork and a local area network. Further, the network 738 can includewired or wireless networks or combinations of both. Further, accordingto some embodiment the wireless user device 735 can also communicateover the network 738. In still other embodiments, the wireless userdevice 735 can communicate with the USR 734 over one or more additionalnetworks that are not employed for communication between the computer736 and the USR 734.

According to some embodiments, the system 730 is employed asproximity-based computer security system using the wireless user device735 to generate authentication information to allow a user in possessionof the device 735 to unlock the computer 736. According to someembodiments, the wireless user device 735 is employed to provideauthentication information wirelessly to the computer when the wirelessuser device 735 is in proximity of the computer, for example, whereproximity is determined by a range of the wireless network. According tothese embodiments, the wireless network allows the wireless transceiver754 of the device 735 to communicate with the wireless transceiver 760of the computer 736.

In various embodiments the wireless network over which the device 735and the computer 736 can communicate can include any one of Wi-Ficommunication, near field communication (NFC) and Bluetoothcommunication. For the preceding examples, each type of wirelesscommunication has limited range where Wi-Fi communication has thegreatest range, NFC has the most limited range and Bluetooth has a rangegreater than NFC but less than Wi-Fi. Thus, for each of the precedingtypes of wireless communication the wireless user device 735 and thecomputer can remain in wireless communication only so long as the device735 and the computer 736 are in proximity of one another. In furtherembodiments, other forms of wireless communication can be employed.Further, where the inherent maximum communication distance is greaterthan desired, security can be increased by modifying the wirelessnetwork hardware or software such that the range is further limited, forexample, to a few feet.

According to one embodiment, a user can unlock the computer 736 toaccess computer resources by successfully authenticating their identitywith the USR 734 and then keeping their wireless user device 735proximate to the computer 736.

In accordance with some embodiments, at least a portion of USR isincluded in the computer 736. In the illustrated embodiment, the USRelement 768 is deployed in the computer 736. The USR element 768 cantake various forms depending upon the embodiment. According to oneembodiment, the USR element 768 is a software module that performs localauthentication of authentication information received from the wirelessuser device 735. In some embodiments, the USR element 768 includes acombination of hardware and software. Further, where the USR element 768includes software, the USR element can be electronically-distributed tothe computer 736, for example, via the network 738 or via a differentnetwork.

In accordance with other embodiments, the USR element 768 only providesan interface between the computer 736 and the USR 734. In accordancewith this latter embodiment, communication from the wireless user device735 is relayed or can be relayed to the USR 734 via the computer 736using the USR element 768. In still other embodiments, the computer 736can relay authentication information or other communication from thewireless user device 735 over the network 738 without need for the USRelement 768.

In embodiments where USR elements 768 can locally authenticate the userof the wireless user device 735, the USR element can provide it insoftware such that element 768 can be distributed, for example, securelydistributed to a variety of computers 736 that are remote from the USR734. In accordance with one embodiment, the USR element 768 includes aseed for each user authorized to unlock the computer, respectively.According to this embodiment, the complete authentication ofnon-predictable values provided by users can be accomplished locally bythe computer 736. Thus, in some embodiments, authentication, includingbilateral authentication, can be accomplished by the computer 736without any real-time interaction by the computer with the USR 734.These authentication protocols can include all or some of the actsillustrated in FIGS. 33 and 38, where the protocols are employed toallow access to the computer 736 (for example, rather than authorize afinancial transaction). Further, automatic seed updates for both thewireless user device 735 and the computer 736 can occur as describedabove with reference to FIG. 7. These seed updates can occur with orwithout knowledge and/or interaction with the user, for example, theymay occur randomly.

According to some embodiments, the proximity-based security providedwith the wireless user device 735 in combination with the USR 734 isachieved where a USR element is not included in the computer 736.

The overall operation of the system 730 allows the user to operate thecomputer 736 to access resources using the computer so long as thecomputer periodically receives authentication information from thewireless user device 735 where that authentication information issuccessfully authenticated by the USR system either at the USR 734, atthe USR element 768, or employing each of the USR 734 and the USRelement 768. In some embodiments, a portion of the authenticationprotocol is performed by each of the USR elements 768 and the USR 734.

Various authentication information can be communicated from the wirelessdevice 735 to the USR to authenticate the user of the device 735depending on the embodiment. For example, the information transmittedfrom the wireless user device 735 to the computer 736 can include atime-varying non-predicable value. Multi-factor communication protocolsdescribed herein can be employed including protocols in which atime-varying non-predictable value is generated as a result of 2, 3 or3+ factors.

In some embodiments, the protocol includes the generation of an initialtime-varying non-predictable value by the device 734. This value iswirelessly communicated to the computer 736 for authentication with theUSR. In one embodiment, the USR element 768 authenticates the user basedon the value that is communicated from the device 735. Successfulauthentication allows the user of the device 735 to unlock the computerto access local or remote resources. The resources can include any offiles, images, forms, e-mail, document management systems, catalogs orother information whether located locally on the computer 736 oraccessible over a network such as the Internet or an intranet.Thereafter, the device 735 and the computer 736 can periodicallycommunicate where the device 735 communicates subsequent time-varyingnon-predictable values to the computer for ongoing authentication.According to this embodiment, the computer remains operable to the user(for example, unlocked) so long as the computer continues to receivesubsequent authentication values. In accordance with one embodiment, thesubsequent authentication values also include a time-varyingnon-predictable value.

In one embodiment, the initial time-varying non-predictable value usedto authenticate the user and unlock the computer includes only a portionof a larger time-varying non-predictable value. In this example,subsequent time-varying non-predictable values can include additionalportions of the same time-varying non-predictable value, or a portion ofor all of a newly-generated time-varying non-predictable value. Inalternate embodiments, a complete time-varying non-predictable value(for example, a 20+ character value with the full set of characters asgenerated) is employed for the initial authentication andnewly-generated time-varying non-predictable values are employed foreach of the subsequent authentications, respectively, to maintain thecomputer 736 in an unlocked state. Depending upon the embodiment, thesesubsequent authentications can employ a time-varying non-predictablevalue including a 20+ character value with the full set of characters asgenerated or a time-varying non-predictable value that includes a subsetof the full set of characters. According to some embodiments, thetime-varying non-predictable value only includes numeric characters andthe subset is a subset of digits. According to other embodiments, thetime-varying non-predictable value includes both alpha and numericcharacters (for example, a value represented in hexadecimal notation).

In one embodiment, static identifying information is not included andthe system 730 employs an identification process as described elsewhereherein. In accordance with an alternate embodiment, at least some formof static identifying information concerning the user is communicatedwith the non-predictable value in a verification process that isemployed either locally at the computer 736, with the USR element 768,or remotely at the USR 734 to authenticate the user.

As mentioned above, the system 730 can maintain the computer 736 in theunlocked state so long as time-varying non-predictable values arereceived subsequent to the initial authentication, and provided thatthese later received values are successfully authenticated. Thus, wherethe user moves with the wireless user device out of the proximity of thecomputer (for example, out of wireless range) the computer 736 can gointo a locked state that will prevent its further use until anauthentication protocol is successfully initiated by the same or adifferent user.

In some embodiments, the system 730 employs an initial userauthentication process such as the process 580 described in associationwith embodiments of FIG. 10, for example, a “handshake” or bilateralauthentication must be completed at a start of the process to unlock thecomputer. However, in one embodiment, the computer can temporarilylock-up for a permissible time period following the initial successfuluser authentication. Provided that the user returns within thepermissible time-period, the computer will unlock (provided that asubsequent time-varying non-predictable values is received andsuccessfully authenticated) without need for the user to repeat theinitial user authentication process.

In this example, the computer 736 is unlocked with an initialauthentication and remains in the unlocked state so long as thesubsequent time-varying non-predictable values is received andsuccessfully authenticated. Where a subsequent time-varyingnon-predictable value is received and not successfully authenticated,the computer 736 will return to a locked state that requires a user tocomplete the initial user authentication process to unlock the computer734. However, where the computer stops receiving subsequent time-varyingnon-predictable values for less than a predetermined period of time (forexample, a matter of minutes when the user has momentarily left theimmediate vicinity of the computer) that user can return and unlock thecomputer with the successful authentication of subsequent time-varyingnon-predictable values generated with the wireless user device withoutbeginning the authentication process anew.

The computer 736 can be configured to authenticate one or more users toemploy one or more wireless user devices 735. For example, computer 736can be accessible to a plurality of users where each of the usersemploys a different wireless device 735, respectively. According tothese embodiments, the computer can maintain (or access via USR 734)authentication information such as seeds for each of the plurality ofauthorized users. Further, each of the plurality of wireless userdevices generates time-varying non-predictable values independently ofothers of the plurality of wireless user devices.

Further, activation of the wireless user device 735 can employapproaches described herein using multiple factors including somethingthe user knows, something the user has, something the user is alone orin combination with each other or with additional factors. Thus, inaccordance with one embodiment the wireless user device 735 includes aseed that is used to generate a time-varying non-predictable value. Inaccordance with some embodiments, the seed 757 is provided by the USR734 in the manner described elsewhere herein. In accordance with afurther embodiment, the electronic serial number of the wireless userdevice 735 can also be employed as a seed either alone or in combinationwith the USR seed 757. Similarly, the subscriber identity module caninclude information that is employed alone or in combination with theUSR seed 757 and/or the electronic serial number 759 as a seed that isused to generate a time-varying non-predictable value. As should beapparent, the approach then employs the seed to generate thetime-varying non-predictable value and also employs a temporal elementsuch as the current time, for example, a time at which the code or thevalue is generated. According to some embodiments, the processor of thewireless user device 735 is configured to employ time, secretinformation known to the user and a seed to generate the time-varyingnon-predictable value. In accordance with further embodiments theprocessor is configured to generate the non-predicable value at least inpart by combining the secret information and the seed and in anexclusive-or operation. Either or both of the electronic serial number759 and the SIM number 758 may be employed in any combination with thepreceding to further increase security of the multi-factorauthentication process.

According to some embodiments, the subsequent time-varyingnon-predictable values are generated for subsequent time periods,respectively. The selection of the increment of time that provides thesubsequent time periods can be selected based on the embodiment suchthat a new period of time occurs with a relatively high frequency inhigh security applications or at a lower frequency for lower securityapplications. Accordingly, depending upon the embodiment, the subsequenttime-varying non-predictable value used in an authentication process canrefer to a time-varying non-predictable value that is generated for atime period that is immediately subsequent to the preceding time-periodor a later occurring time-period. For example, the NPV #1, the NPV #2and the NPV #3 can be generated for three consecutive time periods or insequence for time periods that include one or more time periods forwhich a NPV is not generated and transmitted. The approach can varydepending upon a length established for the time periods and the timerequired for a transmission and/or processing of the time-varyingnon-predictable value. In one embodiment, the USR system operates tovary the length of the time periods to increase security.

The preceding embodiments can be employed to provide anuncounterfeitable token that may be used in processes that haveincreased security relative to prior approaches.

According to some embodiments, an electronic wallet included in a mobilephone allows one to use any number of credit or debit cards at thepoint-of-sale where no private, sensitive, or secret information oraccount numbers are stored in the device or transmitted by near fieldcommunication (“NFC”). In further embodiments, the electronic wallet, inaddition to NFC, can also communicate in Bluetooth and Wi-Fi and can beused for interpersonal funds transfer, computer network access, accessto physical facilities and to otherwise authenticate one's identity andact as an individual's trusted agent.

In some embodiments, a user must satisfy 3 factor security to make atransaction, for example, by using a discreet token (the mobile phone),a secret (the users PIN), and a voice print (a biometric). In theseembodiments, the biometric cannot be recorded and replayed because thebiometric required for authentication and/or device activation is a newcode that must be spoken digit-by-digit with each authentication. Inembodiments where a digital picture of the identified user is sent toPOS from USR the requirements of 3+ factor Security™ are met.

Embodiments of the system and method described herein can employidentification technology to increase security because no staticabusable or exploitable static identifier is used. The preceding featuredistinguishes these embodiments from verification technology where someform of static identifier is required. Further, where static identifyinginformation is not employed, the generated, successful, unpredictablecode transmitted from the mobile user device represents satisfaction ofall three security factors and identifies, rather than verifies, theidentification of the user.

Further, the various embodiments described herein can be employed in anidentification process or a verification process depending on thespecific embodiment. For example, in one approach (identification)static identifying information that identifies the user is not includedwith the transmitted random one-time code. Because an identificationprocess provides increased security, in this embodiment, the USR employsa code matching algorithm to authenticate the user's identity withoutbenefit of any static identifying information. In contrast, in anotherapproach for the embodiments described herein the USR employs the staticidentifying information in combination with a code matching algorithm toauthenticate the user's identity.

In some embodiments, no PIN is stored in the token. In some of theseembodiments, the PIN is integrated with the algorithm and never stored,transmitted, or exposed.

In the improbable circumstance where at a particular time period morethan one unpredictable code is generated for more than one user at USR,USR can in some embodiments wait for the next (immediately subsequent intime) code to authenticate based on a user's unique identity.

Further, in some embodiments, a “token” can first send anon-transactional subset non-predictable code to the USR server. Theserver then sends a subset of the next code that the USR token wouldgenerate to the token. Thus, the server has demonstrated itsauthenticity to the token and then the token can send the actual,active, non-predictable code to the now trusted, authenticated secureUSR server.

Still further, in various embodiments, some of the preceding can employ,or be employed in, apparatus, systems and methods where a verificationprocess in used. For example, the non-predictable value can becommunicated along with static identifying information. Where evengreater security is required an identification process can be employed.For example, with the identification process, the non-predictable valuecan be communicated without any static identifying information.

According to any of the preceding embodiments, the mobile devices eachinclude a GPS. According to these embodiments, the GPS capabilities canbe used to track user activities and apply security criteria that canact to limit transaction activity based on the location of the mobiledevice and/or the relative change in position of the mobile device.

According to each of the preceding embodiments in which a PIN isemployed to generate a non-predictable value communicated forauthentication, the PIN need not be stored in the wireless user-device.According to these embodiments, the PIN can be supplied by the user andimmediately employed in an algorithm used to generate thenon-predictable value (for example, a time-varying non-predictablevalue).

According to one aspect a continuous authentication system forcontrolling access to resources on at least one computer is provided.The system comprising a protected computer having associated computerresources, the protected computer connected to a communication network,a portable device configured to communicate with the protected computer,the portable device including a user interface programmed toauthenticate a user based on at least secret information known to theuser of the portable device, a processor programmed to generate apseudo-random non-predictable value following a successfulauthentication, by the portable device, of the user, and a wirelesstransceiver coupled to the processor and configured to transmit awireless signal including the first pseudo-random non-predictable value,and a secure registry system including a communication interface, thesecure registry system configured to receive the first pseudo randomnon-predictable value and successfully authenticate the user where thefirst pseudo-random non-predictable value is matched to the user by thesecure registry system, wherein the user of the handheld device ispermitted to operate the protected computer to access the associatedresources so long as the protected computer receives subsequentauthentication information to re-authenticate the portable device andthat results in a continued successful authentication of the user usingat least a subsequent pseudo-random non-predictable value.

According to another aspect, a continuous authentication system forcontrolling access to resources on at least one computer, the systemcomprising a protected computer having associated computer resources,the protected computer connected to a communication network;

a portable device configured to communicate with the protected computer,the portable device including, a user interface programmed toauthenticate a user to the portable device based on at least secretinformation known to the user of the portable device, a processorprogrammed to generate a pseudo-random non-predictable value following asuccessful authentication, of the user on the portable device, and awireless transceiver coupled to the processor and configured to transmita wireless signal including the first pseudo-random non-predictablevalue, and a secure registry component, executing at least in part on atleast one computer system including a communication interface, (the USR)configured to receive the first pseudo-random non-predictable value andsuccessfully authenticate the user where the first pseudo-randomnon-predictable value is matched to the user by the (USR) component, andfurther configured to pass the successful authentication to theprotected computer wherein the user of the handheld device is permittedto operate the protected computer to access the associated resourcesthrough the at least one computer system, so long as the protectedcomputer receives subsequent authentication information tore-authenticate the portable device and that results in a continuedsuccessful authentication of the user using at least a subsequentpseudo-random non-predictable value.

According to embodiments of the preceding aspects, the wireless signalcomprises a radio frequency transmission. According to embodiments ofthe preceding aspects, the radio frequency transmission includes a lowenergy Bluetooth signal or other RF signal such as Near Field RF.According to embodiments of the preceding aspects, the protectedcomputer triggers a re-authentication request. According to embodimentsof the preceding aspects, the protected computer is further configuredto continuously trigger re-authentication.

According to embodiments of the preceding aspects, the protectedcomputer triggers re-authentication responsive to computer eventsexecuted on the protected computer. According to embodiments of thepreceding aspects, the computer events may include any one or more of: arequest to copy files or data, request to print, request to accesssensitive designated information, request to access sensitive files,request to display sensitive information, request to alter stored data,request to alter viewed data, other sensitive protected actions orrequest to use privilege, exceeding a threshold number of requests oractivities, exceeding a fixed or random time period.

According to embodiments of the preceding aspects, the protectedcomputer generates a time signal, and triggers the continuousre-authentication based on a periodic or random time. According toembodiments of the preceding aspects, the protected computer and theportable device are configured to execute a handshake protocol tore-authenticate. According to embodiments of the preceding aspects, theprotected computer executes the handshake protocol by sending a next PRCto the portable device, and the portable device authenticates the nextPRC, and communicates a subsequent PRC to the protected computer.According to embodiments of the preceding aspects, the protectedcomputer and the portable device are configured to execute achallenge/response protocol to re-authenticate. In further embodiments,the pseudo-random non-predictable value is a time varying value capableof authentication through multiple authentication factors (e.g., two, ormore authentication factors). It should also be appreciated that any ofthe apparatus, systems and methods described herein can be used with, orin the manner described in U.S. Pat. Nos. 7,237,117; 7,809,651;7,805,372; 8,001,055; and U.S. patent application Ser. No. 12/393,586each of which is herein incorporated by reference in its entirety forall purposes. For example, in various embodiments, the systems 650 and730 disclosed herein can operate in the manner of any one of the systemsdescribed in the previously-identified U.S. Patents and Application andprovide any of the functionality of the systems described therein.Similarly, in various embodiments, the USRs 10, 640, 654 and 734disclosed herein can operate in the manner of any one of the secureregistries described in the previously-identified U.S. Patents andApplications and provide the functionality of any of the secureregistries described therein. Further, the wireless user devices and/ortokens 674, 652 and 734 can take the form of any one of the user devicesand/or tokens that are described in the previously-identified U.S.Patents and Applications and provide the functionality of any of theuser devices and/or tokens described therein.

As used herein, the terms “wireless device” and “wireless user device”describe apparatus that can wirelessly communicate. These termsencompass devices that can include both wireless communication and wiredcommunication depending upon the manner in which the apparatus is used.For example, as used herein, a “wireless device” can include a USB orother hardwired communication port for temporary or permanent connectionto another device and/or network. As will be apparent, a “wirelessdevice” can also include a port for connection to a power source foroperating power and/or battery recharging. Further, the embodiments ofthe wireless user devices described herein can each include a clock(such as an oscillator) used as a time-reference. In some embodiments,the clock is a discrete element while in other embodiments the clock canbe included in another element, for example, a microcontroller of thewireless user device. Wireless user devices can also include any ofelectronic ID devices, mobile phones, PDAs, personal computers, fobs,wristwatches, passports, pens, credit cards and dongles as someexamples.

Having thus described several aspects of at least one embodiment of thisinvention, it is to be appreciated various alterations, modifications,and improvements will readily occur to those skilled in the art. Suchalterations, modifications, and improvements are intended to be part ofthis disclosure, and are intended to be within the spirit and scope ofthe invention. Accordingly, the foregoing description and drawings areby way of example only.

What is claimed is:
 1. An authentication system for controlling accessto resources on at least one computer, the authentication systemcomprising: a protected computer having associated computer resources,the protected computer including a wireless signal receiver forreceiving a wireless signal, a portable device configured to communicatewith the protected computer, the portable device including: a processorconfigured to provide a user interface configured to receive and toauthenticate an identity of a user based on at least secret informationknown to the user of the portable device; the processor furtherconfigured to generate a first unique value following a successfulauthentication, by the portable device, of the user; and a wirelesstransceiver coupled to the processor and configured to transmit thewireless signal including the first unique value; and a secure registrycomponent, connected to the protected computer, the secure registrycomponent configured to receive the first unique value and successfullyauthenticate the user of the portable device where the first uniquevalue is matched to the user by the secure registry component, whereinthe secure registry component is further configured to permit access tothe user of the portable device to operate the protected computer toaccess the associated computer resources based on the successfulauthentication of the user, and is further configured to maintain accessto the user of the portable device to operate the protected computer toaccess the associated computer resources so long as: the portable deviceis determined, by the protected computer, to be within a minimumwireless signal proximity of the wireless signal receiver of theprotected computer, and the secure registry component periodicallyreceives at least one second unique value that maintains authenticationof the portable device to the secure registry component, the at leastone second unique value being different than the first unique value. 2.The system of claim 1 wherein the portable device is configured toperiodically re-send a unique code to the protected computer.
 3. Thesystem of claim 1, wherein the wireless signal comprises a radiofrequency transmission.
 4. The system of claim 3, wherein the radiofrequency transmission includes at least one of a low-energy signaltransmitted according to a wireless technology standard, and a radiofrequency identification signal.
 5. The system of claim 1, wherein theprotected computer triggers a re-authentication request of the portabledevice that is transmitted to the portable device by the wirelesssignal.
 6. The system of claim 5, wherein the protected computer isfurther configured to periodically re-authenticate the portable device.7. The system of claim 6, wherein the protected computer generates atime signal, and wherein the protected computer periodicallyre-authenticates the portable device based on a periodic or random time.8. The system of claim 5, wherein the protected computer is configuredto trigger re-authentication responsive to one or more events executedon the protected computer.
 9. The system of claim 8, wherein the one ormore events include any one or more of: a request to copy files or data,request to print, request to access sensitive designated information,request to access sensitive files, request to display sensitiveinformation, request to alter stored data, request to alter viewed data,or any sensitive protected action, or request to use privilege,exceeding a threshold number of requests or activities, exceeding afixed or random time period.
 10. The system of claim 1, wherein theprotected computer and the portable device are configured to execute ahandshake protocol to re-authenticate the portable device responsive todetermining that the portable device is within the minimum wirelesssignal proximity subsequent to being outside of the minimum wirelesssignal proximity for a threshold period of time.
 11. The system of claim10, wherein the portable device and the protected computer execute thehandshake protocol by the protected computer sending a pseudo randomcode to the portable device that authenticates the pseudo random code,by the portable device sending a next pseudo random code to theprotected computer that the protected computer authenticates, and by theprotected computer communicating a subsequent pseudo random code to theportable device.
 12. The system of claim 1, wherein the protectedcomputer and the portable device are configured to execute achallenge/response protocol to re-authenticate the portable device tothe protected computer.
 13. The system of claim 1, wherein a signalstrength of the transmitted wireless signal is used to determine whetherthe portable device is within the minimum wireless signal proximity ofthe wireless signal receiver of the protected computer.
 14. The systemof claim 1, wherein each of the first unique value and the at least onesecond unique value is a time- or event-varying Pseudo Random Code. 15.An authentication system for controlling access to resources on at leastone computer, the authentication system comprising: a protected computerhaving associated computer resources, the protected computer including awireless signal receiver for receiving a wireless signal; a portabledevice configured to communicate with the protected computer, theportable device including: a processor configured to provide a userinterface programmed to authenticate a user to the portable device basedon at least secret information known to the user of the portable device;the processor programmed to generate a first unique value following asuccessful authentication of the user to the portable device; and awireless transceiver coupled to the processor and configured to transmita wireless signal including the first unique value; and a secureregistry component, executing at least in part on the protected computerincluding a communication interface, the secure registry componentconfigured to receive the first unique value and successfullyauthenticate the user of the portable device to the protected computerwhere the first unique value is matched to the user by the secureregistry component, and further configured to pass the successfulauthentication to the protected computer; wherein the user of theportable device is permitted to operate the protected computer to accessthe associated computer resources based on the successful authenticationof the user, and is permitted to continue operating the protectedcomputer so long as: the portable device is determined, by the protectedcomputer, to be within a minimum wireless signal proximity of thewireless signal receiver of the protected computer, and the secureregistry component periodically receives at least one second uniquevalue that maintains authentication of the portable device to the secureregistry component, the at least one second unique value being differentthan the first unique value.
 16. The system of claim 15, wherein theportable device is configured to periodically re-send a unique code tothe protected computer.
 17. The system of claim 15, wherein theprotected computer sends a re-authentication request to the portabledevice by the wireless signal.
 18. The system of claim 17, wherein theprotected computer is configured to periodically requestre-authentication of the portable device.
 19. The system of claim 17,wherein the protected computer is configured to requestre-authentication responsive to one or more events executed on theprotected computer.
 20. The system of claim 19, wherein the one or moreevents include any one or more of: a request to copy files or data,request to print, request to access sensitive designated information,request to access sensitive files, request to display sensitiveinformation, request to alter stored data, request to alter viewed data,or any sensitive protected action, or request to use privilege,exceeding a threshold number of requests or activities, exceeding afixed or random time period.
 21. The system claim 15, wherein theprotected computer and the portable device are configured to execute ahandshake protocol to re-authenticate the portable device responsive todetermining that the portable device is within the minimum wirelesssignal proximity subsequent to being outside of the minimum wirelesssignal proximity for a threshold period of time.
 22. The system of claim21, wherein the portable device and the protected computer execute thehandshake protocol by the protected computer sending a pseudo randomcode to the portable device that authenticates the pseudo random code,by the portable device sending a next pseudo random code to theprotected computer that the protected computer authenticates, and by theprotected computer communicating a subsequent pseudo random code to theportable device.
 23. The system of claim 15, wherein the protectedcomputer and the portable device are configured to execute achallenge/response protocol to re-authenticate the portable device tothe protected computer.
 24. The system of claim 15, wherein a signalstrength of the transmitted wireless signal is used to determine whetherthe portable device is within a minimum wireless signal proximity of thewireless signal receiver of the protected computer to remain unlocked.25. The system of claim 15, wherein the unique value is a time- orevent-varying Pseudo Random Code.