Secure on line accounts (SOLA) system using cell phones and other wireless devices

ABSTRACT

This invention describes a cell phone, or other wireless device (henceforth known as “device”), to transmit sound (audible and inaudible) alphanumeric code in any language, special characters or symbols or graphic or pictures or videos or any combination thereof, to an on-line account at a web server that is equipped with a compatible digital transceiver card and software driver and/or firmware for the operation, management and maintenance of this system. Upon verification of the transmitted code or sound, by the web server, access is granted. The said server then transmits a randomly selected new code of any combination of the codes or sounds stated above to the device for storage. The said transmission from the web server cannot be stored in any other device. The device has a menu item and/or numeric code for each on-line account of the user.

This invention relates to a cell phone or other wireless device(“device”) with a Secure On-Line Account system (SOLA) utilizing adigital code that is changed after each use of the system.

Most “devices” are equipped with an internet browser. Many web sites,e.g., of financial institutions and scientific bodies, provide webaccounts for member logins. These OLAs are frequently accessed using the“devices”. Coventional security systems for OLAs utilize one of severalmethods, i.e., by provision of a User ID and password, by voicerecognition, or by using biometrics systems. Passwords need to be easilyremembered but should not be able to be “guessed” and should not bewritten down. However, these restrictions also leave the systemvulnerable to hacking by unauthorized users using software or spyware atthe web site or by “phishing” the OLA holder. Voice recognition systemsrequire appreciable memory space, are slower to respond, and voices canbe recorded accurately and played back to the OLA web server leaving thesystem vulnerable to hacking. Biometrics systems can encounter userresistance since the biometrics information can be misused if it fallsinto malevolent hands. Theoretically, even biometrics information can berecorded by spyware leaving the system vulnerable. Even security systemsusing 32 bit encryption, one of the most secure systems in use, havebeen hacked using software. Banking, investment and other on-linefinancial accounts have been hacked and their accounts depleted withoutknowledge of the account holder.

Clearly a need is identified for a “hacker proof” security systemespecially for use in systems deployed for on-line accounts (OLA) at websites and anywhere where sensitive data and documents are stored.

The drawbacks of the present practice for security of OLAs areeliminated with the use of the said device equipped with the SOLAsystem. Such a device is capable of transmitting (and receiving andstoring) a sound or alphanumeric code in any language, or specialcharacters or symbols or graphic or pictures or videos or anycombination thereof. The source of sound can be device generated orpre-recorded from a vast array of sources. These sources are listed in,but not limited to, the list in appendix 1. The list of pictures orvideos can be similarly taken from, but not limited to the saidappendix. Variables for alphanumuric in any language, specialcharacters, symbols, or graphics are equally vast. A code comprised ofany one of these would present a daunting task to any hacker. When usedin combination, the system would be impossible to hack. Each OLA wouldrequire a different menu item selected from a pre-defined list and/or anumeric code. The transmitted code stored is specific for each OLA.

When setting up on-line accounts using the conventional system, the useris prompted to enter a User Identity (ID) and a password and to re-enterthe password to check for accuracy and repeatability. If the host webserver is equipped with the SOLA system, the user is prompted to selectthe conventional or SOLA system. If the SOLA system is selected, theuser is asked for a ID and then prompted for a password. The user entersa numeric code or selects an item from a pre-defined list displayed onthe screen on the device. The said numeric code is not the password andonly serves to locate the stored code for the specific OLA. The user isnot requested to reenter the password.

FIG. 1 illustrates the use of the system. On selecting the menu item orentering the code for the site, on first use, the device (A) with theSOLA system generates a random combination of the sounds or alphanumericcode in any language, or special characters or symbols or graphic orpictures or videos or any combination thereof. The signal is transmittedvia the cell phone service provider to the web server hosting the OLA(B). The said server then transmits a random combination of the saidsignals via the cell phone service provider to the device. This new codeis stored in ‘A’ as well as ‘B’.

On subsequent use of the SOLA system to access ‘A’ the new code istransmitted. Upon verification of the code by ‘B’ access is granted. Theserver then transmits a new randomly generated code for storage in ‘A’as well as ‘B’.

This process continues for each use of the system. Therefore passwordsare specific for each OLA and are changed on each use of the system anddo not need to be remembered. The codes would be impossible to hack.Recording the transmitted signal would serve no purpose as this signalis changed on each use. Recording of the code by any spyware would serveno purpose for the same reason. The response time to this system wouldbe much quicker and require less memory space than voice recognitionsystems. The new code transmitted by ‘B’ cannot be received and storedin any other device. Needless to say, the device ‘A’ has to be locatedin a secure place.

In the event, the “device” is lost or stolen, the user, as is the normalpractice, calls the cell phone service provider who will place arestriction on the “device” after the user satisfactorily answers a fewsecurity questions. On acquiring a new “device” the user will need toset up the OLAs again by calling the respective sites to re-set thepasswords. This can be inconvenient and is similar to losing a bunch ofkeys. However, if the “device” is tagged by a “War AMPS” tag for examplethe “device” can be returned to the user.

APPENDIX 1

Sources and agents of sound and pictures include but not limited to:

-   1. Human beings and animals, birds, insects. fish, whales, dolphins.-   2. In any language, music, songs, videos, themes music from films.    Musical instruments and tuning forks,-   3. Running water, rain water, waterfalls, tributaries, rivers lakes,    melting snow and ice, piped water, treated and untreated water,    icebergs, glaciers.-   4. Volcanoes, hurricanes, tornadoes, gales, ordinary wind, solar    wind, earthquakes, tsunami, lightning and thunder or any other    sounds from nature.-   5. Operating machines of any size, anywhere in any industry    including ultrasound.-   6. Transport vehicles of any size, powered or manual, used anywhere.-   7. Objects falling to earth from sky.-   8. Explosions, avalanches.-   9. Elevators.-   10. Sporting events and stadiums, race courses.-   11. Church or religious services conducted anywhere in any religion.-   12. Clock tower bells, church bells in any religion anywhere, door    bells and chimes.-   13. Public meetings and demonstrations.-   14. Theme park, funfare and circus sounds.-   15. Farms and markets.

1-14. (canceled)
 15. A system for providing access authorization to anon-line account associated with a server, comprising: a security devicefor transmitting a current signal upon user command once only along acommunications interface to the server and for receiving a subsequentsignal along the communications interface; and security means associatedwith the on-line account for: a. precluding user access to the on-lineaccount until the security means receives a signal along thecommunications interface that matches the current signal; and b.thereafter generating and transmitting along the communicationsinterface the subsequent signal for authorizing a subsequent user accessof the on-line account.
 16. The system according to claim 15, whereinthe security device comprises means for temporarily storing the currentsignal received along the communications interface until it isretransmitted back along the communications interface.
 17. The systemaccording to claim 15, wherein the security means comprises means fortemporarily storing the current signal until it is successfully matchedagainst the received signal along the communications interface.
 18. Thesystem according to claim 15, wherein the security device and thesecurity means are preconfigured before use with a default signal as thecurrent signal.
 19. The system according to claim 18, wherein thepreconfiguration comprises the security device transmitting the defaultsignal along the communications interface in a configuration mode. 20.The system according to claim 15, wherein the communications interfaceis restricted to communications between the security device and thesecurity means.
 21. The system according to claim 15, wherein thesecurity device is a cellular phone.
 22. The system according to claim15, wherein the signals passing along the communications interface arebased on technology selected from a group consisting of: audible sound,inaudible sound, codes for alphanumeric characters in a language, codesfor special characters, codes for symbols, codes for graphics, codes forpictures and a combination of one or more of the members of the group.23. The system according to claim 15, wherein the signals passing alongthe communications interface are recorded from a source selected from agroup consisting of: computer-generated material; human beings, animals,birds, insects, fish, whales, dolphins; music, songs, videos, thememusic from films, musical instruments, tuning forks, running water, rainwater, waterfalls, tributaries, rivers, lakes, melting snow, meltingice, piped water, treated water, untreated water, icebergs, glaciers,volcanoes, hurricanes, tornadoes, gales, ordinary wind, solar wind,earthquakes, tsunami, lightning, thunder, sounds from nature, operatingmachines of any size anywhere in any industry, ultrasound, transportvehicles of any size, powered or manual, used anywhere, objects fallingto earth from sky, explosions, avalanches, elevators, sporting events,stadiums, race courses, church or religious services conducted anywherein any religion, clock tower bells, church bells in any religionanywhere, door bells, chimes, public meetings, demonstrations, themeparks, funfare, circus sounds, farms and markets.
 24. The systemaccording to claim 15, wherein the current signal and/or the subsequentsignal is randomly selected.
 25. The system according to claim 15,wherein the security device is a handheld device.
 26. A method ofproviding access authorization to an on-line account, comprising theacts of: a. providing to a user a security device; b. restricting accessto the on-line account by the user until a security means associatedwith the on-line account receives a signal along a communicationsinterface to the server that matches the current signal; c. upon userinput at the security device, transmitting once only the current signalalong the communications interface; d. thereafter generating at thesecurity means a subsequent signal for authorizing a subsequent useraccess of the on-line account; and e. the security means transmittingthe subsequent signal to the security device along the communicationsinterface.
 27. A security device for providing access authorization toan on-line account associated with a server, adapted to transmit, uponuser command, a current signal once only along a communicationsinterface to the server and thereafter to receive a subsequent signalalong the communications interface, and; whereby security meansassociated with the on-line account may: a. preclude user access to theon-line account until the security means receives a signal along thecommunications interface that matches the current signal; and b.thereafter generate and transmit along the communications interface thesubsequent signal for authorizing a subsequent user access of theon-line account.
 28. A security means associated with an on-line accountassociated with a server for: a. precluding user access to the on-lineaccount until the security means receives a current signal along acommunications interface to the server that matches a current signal;and b. thereafter generating and transmitting along the communicationsinterface a subsequent signal for authorizing a subsequent user accessof the on-line account; whereby a security device configured totransmit, upon user command, the current signal once only along thecommunications interface and thereafter to receive the subsequent signalalong the communications interface may provide access authorization tothe on-line account.