Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multifunction authentication systems

a multi-functional authentication and authentication system technology, applied in the field of multi-functional authentication systems, can solve the problems of users changing, prone to change, and the process of purchasing these types of instruments takes a considerable amount of time, so as to shorten the accounting cycle, increase the propensity to buy, and increase the sales propensity

Inactive Publication Date: 2011-11-17
OMARCO NETWORK SOLUTIONS
View PDF9 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0019]This process enables enough information to be provided by the terminal in relation to the user transaction to meet the demands of many different functions (including legal requirements) and also without taking too much time at the terminal. For example, those functions requiring a user account to be set up, such as a long-term bond, are accommodated because the user account can at least initially be set up on the basic information provided. For most functions, this level of information is sufficient. If a function dictates that further identifying information is required, then a second part of the registration procedure can be carried out in a secure location not at the same terminal, thereby preventing slowing down of the number of transactions being processed by the terminal. In some cases, this second stage of registration can be carried out at as part of the redemption stage.
[0089]Apart from the issues that there may be errors in the name due to transliteration errors or user-generated errors, there may also be people of a similar name and similar initials with a similar birth date. The present invention enables the purchase to be tied to the purchaser in such a unique way (using symbol authentication), that arguably only he could claim specific identity of that purchase. The requirement to generate this in such a way that it does not slow up the purchase process using a lottery system is met. This process is capable of manufacture in a cheaply-generated identity card which may be created at first purchase, repeat generated at purchase, or generated from a remote vending machine and still be secure enough that the purchaser's identity with regard to the purchase cannot be fraudulently replicated by another. This purchaser-generated specific secure item is included in the manufacturing process and sales process across a several different systems including mobile phones, Internet sites, central systems and paper-generated purchase dockets all with ease of use, convenience and speed.

Problems solved by technology

Typically, the process of purchasing these types of instruments takes a considerable amount of time as not only do many details have to be provided but also supporting documentation to prove the user's identity and place of residence; such verification documents can be birth certificates, passports, identity cards, and utility bills.
A further problem with providing personal details, for example a user's name and initial and possible address, is that these details whilst useful for registration purposes, are commonly available (sometimes outside the country of issue / residence) and are susceptible to change.
Thus, users typically change address over a long period of time such as 20 years.
This can lead to a fraud opportunity of an unscrupulous person changing their name by deed poll to the name of the valid user who purchased the ticket, for example and thereafter seeking to redeem the value of the ticket on maturity.
There is, of course, also the common and prevalent problem with forged documents being used by such unscrupulous people to ‘prove’ their stolen identity and thereby obtain access to an account and funds.
This problem stems from the reliance upon the proof of identity documents to validate a person's identity with out any further cross-check with for example a central authority being required.
Therefore, a lottery ticket typically can be printed cheaply on thermographic paper, which degrades on average within a year because the lottery ticket will only have a functional validity life for around six months.
The difficulty with these types of authentication is that their users often forget the PIN or password particularly when there is a need to remember several different PINs and passwords for different systems.
As such, either the authentication requires a secure password / PIN carrier e.g. credit card / debit card that stores the password / PIN in an encrypted format for use with a complimentary password / PIN reader terminal and which carrier and terminal are highly expensive, or the PIN or password can be guessed through trial and error and as such the security can be compromised.
This can in particular lead to long-term financial instruments being more vulnerable to bulk system hacking.
Furthermore, existing authentication systems and methods are typically not well suited to the blind or illiterate.
Also even for literate people, some of them may not be able to or desire to have a bank account and this can cause difficulties in some authentication systems and methods when seeking to acquire a financial instrument or take part in a financial transaction.
However, a significant proportion, if not the majority of the world's population, do not have a mother tongue which is based on Latin script and so use of current authentication systems is either not useable or requires assistance (which may compromise security).
Often, there will be a mix between Latin script being used on the central server authentication system and local scripts being used at the terminal interface in such a way that transliteration errors can and do occur.
Therefore it is highly desirable to have a unified system of security that makes it uneconomic, impractical or impossible for insiders or outsiders to fraudulently access an otherwise secure system via the weakest link of an insecure and relatively permeable backdoor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multifunction authentication systems
  • Multifunction authentication systems
  • Multifunction authentication systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0114]A first embodiment of the present invention is implemented on a terminal-based system 10 as shown in FIG. 1. The system 10 comprises a central server 12 and multiple lottery ticket terminals 14 in communication via a communications network 16 with the central server 12. The central server 12 has associated with it a central data store 18 in which are stored account files 20 relating to each of the authorised tickets 22 the ticket terminals 14 have issued. The account files 20 can be linked to a lottery or other form of prize draw event which is to take place at a given date and time. However, there are also other uses for the account files 20 which will become evident from the following description. The system also comprises a symbolic secure loop server 24 together with a corresponding local data store 26 which is used to further enhance the security of the decryption and encryption functionality of the central server (as will be explained in greater detail later).

[0115]The t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of generating a personal authenticated transaction ticket with a registered-user redemption functionality is described. The method is inplemented using a remote transaction information device and a central authentication server. The method comprises receiving data at the remote transaction information device from a user, the data including i. a symbol key comprising at least one symbol selected from a plurality of symbols, and ii. personal information identifying the user, the personal information including at least the user name, digitising and encrypting the symbol key and the personal information, transmitting the encrypted data to the central server, receiving a unique transaction number associated with the symbol key and personal information, and providing the unique transaction number to the user as part of the transaction ticket, the unique transaction number confirming the registration of the user and the authentication of the transaction ticket with the central server.

Description

FIELD OF THE INVENTION[0001]The present invention concerns improvements relating to multifunction authentication systems and more particularly, though not exclusively, to a system for and a method of authenticating users in a secure and robust manner but utilising a low-cost network of data input and authentication terminals, such as gaming (lottery) terminals and / or Automated Teller Machines ATM's. The present invention can be used for authenticating functions, which require the user to have an account set up and those, which do not (namely anonymous functions). The present invention can be used to support authorisation and authentication of multiple diverse functions such as money transfer, gaming, prize incentive bonds, savings for the unbanked, insurance, advance insurance payments, payroll and / or cheque payment functions, utility payments and other investments on a common low-cost authentication system.BACKGROUND OF THE INVENTION[0002]Various different authentication systems ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): A63F9/24G06F21/33G06F21/36
CPCG06F21/33G06F21/36G06F2221/2107G06F2221/2117H04L63/0807H04L9/3218H04L2463/062H04L9/3213H04L2209/56H04L2209/80H04L63/105G07F17/3241G07F17/3262G07F17/329
Inventor OMAR, RALPH MAHMOUD
Owner OMARCO NETWORK SOLUTIONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products