Abstract: An SST (120 or 400) facilitates authentication of a user through an external service via a mobile device (110) operated by the user. The SST (120 or 400) also obtains independent verification of an access command sent from a server (140) through a cryptographic peripheral module (123) integrated into the SST (120 or 400) before sending a command to grant authenticated access to the SST (120 or 400) in response to the access command.
We Claim:
1. A method of providing authenticated access to a secure resource of a self-service terminal (120 or 400), the method comprising:
generating, by a control application of the self-service terminal (120 or 400), in response to receiving a request for access to the secure resource sent from a mobile device (110), an authentication token (step 211 or step 213 or step 214);
providing, by the control application, the authentication token (step 210) comprising presenting the authentication token on a display (401) of the self-service terminal (120 or 400);
a mobile application of the mobile device (110) scanning the authentication token and contacting an authentication server (130) over a wireless connection;
the authentication server (130) independently authenticating the mobile device (110) using the generated authentication token;
once the mobile device (110) has been authenticated by the authentication server (130), the method being characterized by
the authentication server (130) instructing a controller server (140) to send an access command to the control application of the self-service terminal (120 or 400);
obtaining, by the control application, the access command from the controller server (140) (step 220);
requesting, by the control application, a cryptographic peripheral device (123) to validate the access command (step 230);
the cryptographic peripheral device (123), in response to the request to validate the access command, sending a challenge message to the controller server (140);
the controller server (140) digitally signing and sending the challenge message back to the cryptographic peripheral device (123) as a response;
the cryptographic peripheral device (123) validating the response, and providing authenticated access to the secure resource of the self-service terminal (120 or 400) upon verification by the cryptographic peripheral device
22
(123) that the response was a valid response to the challenge message (step 230).
2. The method as claimed in claim 1, wherein the request for access to the secure resource comprises a wireless request sent from the mobile device (110) (step 211 or step 213).
3. The method as claimed in claim 2, wherein the step of generating the authentication token includes creating the authentication token as a two dimensional barcode encoded with a mobile device identifier for the mobile device (110), a terminal identifier for the self-service terminal (120 or 400), an indication of the wireless request, and a date and time when the barcode was created.
4. The method as claimed in any of claims 1 to 3, wherein the step of obtaining the access command from the controller server (140) includes re- presenting a new authentication token on the display (401) when a adapted period of time elapses before the access command is received from the server (140) (step 221).
5. The method as claimed in any of claims 1 to 4, wherein the step of requesting the cryptographic peripheral device (123) to validate the access command includes acting as an intermediary to forward encrypted information between the cryptographic peripheral device (123) and the controller server (140) to assist the cryptographic peripheral device (123) in independently validating the access command on behalf of the self-service terminal (120 or 400), wherein the control application (121) in the self-service terminal (120 or 400) is incapable of decrypting the encrypted information (step 231).
6. The method as claimed in any of claims 1 to 5, wherein the method comprises
sending audit data to the controller server (140) when the authenticated access
is granted (step 240), and
maintaining audit data in a log on the terminal (120 or 400) (step 241).
23
7. A self-service terminal (120 or 400) comprising:
a secure resource;
a controller executing a control application (121 or 402); and a cryptographic peripheral device (123) in communication with the controller and executing a cryptographic application (403); the control application (121 or 402) being adapted to:
receive a request from a mobile device (110) for access to the secure resource and
provide an authentication token comprising presenting the authentication token on a display (401) of the self-service terminal (120 or 400), wherein the authentication token is generated in response to the request from the mobile device (110); wherein the self-service terminal is characterized in that the control application is adapted to:
obtain an access command from a controller server (140), wherein the access command is sent in response to an instruction from an authentication server (130) after the authentication server (130) has independently authenticated the mobile device (110) using the generated authentication token as scanned by the mobile device and sent to the authentication server (130);
request the cryptographic peripheral device (123) to validate the access command,
forward a challenge message from the cryptographic application (403) to the controller server (140),
receive a response comprising a digitally signed challenge message from the controller server (140), and
provide authenticated access to the secure resource upon verification by the cryptographic application (403) that the received response was a valid response to the challenge message.
8. The terminal as claimed in claim 7, wherein the secure resource comprises
devices located within a secure area of the terminal (120 or 400), and the control
24
application (121 or 402) is adapted to provide the authenticated access by electronically unlocking an access panel to the secure resource.
9. The terminal as claimed in claim 7, wherein the secure resource comprises an administrative interface to the terminal (120 or 400).
10. The terminal as claimed in any of claims 7 to 9, wherein the terminal (120 or 400) comprises an automated teller machine, and the cryptographic peripheral device (123) comprises an encrypting PINpad.
| # | Name | Date |
|---|---|---|
| 1 | 5448-CHE-2015-IntimationOfGrant03-04-2023.pdf | 2023-04-03 |
| 1 | Form 5 [12-10-2015(online)].pdf | 2015-10-12 |
| 2 | 5448-CHE-2015-PatentCertificate03-04-2023.pdf | 2023-04-03 |
| 2 | Form 3 [12-10-2015(online)].pdf | 2015-10-12 |
| 3 | Form 18 [12-10-2015(online)].pdf | 2015-10-12 |
| 3 | 5448-CHE-2015-FORM 3 [13-02-2020(online)].pdf | 2020-02-13 |
| 4 | Form 1 [12-10-2015(online)].pdf | 2015-10-12 |
| 4 | 5448-CHE-2015-Correspondence_22-01-2020.pdf | 2020-01-22 |
| 5 | Drawing [12-10-2015(online)].pdf | 2015-10-12 |
| 5 | 5448-CHE-2015-Priority Document_ (As Filed)_22-01-2020.pdf | 2020-01-22 |
| 6 | Description(Complete) [12-10-2015(online)].pdf | 2015-10-12 |
| 6 | 5448-CHE-2015-Certified Copy of Priority Document (MANDATORY) [20-01-2020(online)].pdf | 2020-01-20 |
| 7 | 5448-CHE-2015-Power of Attorney-271015.pdf | 2016-04-05 |
| 7 | 5448-CHE-2015-PETITION UNDER RULE 137 [20-01-2020(online)].pdf | 2020-01-20 |
| 8 | 5448-CHE-2015-Correspondence-Power of Attorney-Notarized Assignment-271015.pdf | 2016-04-05 |
| 8 | 5448-CHE-2015-ABSTRACT [26-12-2019(online)].pdf | 2019-12-26 |
| 9 | 5448-CHE-2015-Assignment-271015.pdf | 2016-04-05 |
| 9 | 5448-CHE-2015-CLAIMS [26-12-2019(online)].pdf | 2019-12-26 |
| 10 | 5448-CHE-2015-COMPLETE SPECIFICATION [26-12-2019(online)].pdf | 2019-12-26 |
| 10 | 5448-CHE-2015-Form 3-040416.pdf | 2016-06-14 |
| 11 | 5448-CHE-2015-Correspondence-040416.pdf | 2016-06-14 |
| 11 | 5448-CHE-2015-DRAWING [26-12-2019(online)].pdf | 2019-12-26 |
| 12 | 5448-CHE-2015-FER.pdf | 2019-06-27 |
| 12 | 5448-CHE-2015-FER_SER_REPLY [26-12-2019(online)].pdf | 2019-12-26 |
| 13 | 5448-CHE-2015-FORM 3 [26-12-2019(online)].pdf | 2019-12-26 |
| 13 | 5448-CHE-2015-OTHERS [26-12-2019(online)].pdf | 2019-12-26 |
| 14 | 5448-CHE-2015-FORM 3 [26-12-2019(online)].pdf | 2019-12-26 |
| 14 | 5448-CHE-2015-OTHERS [26-12-2019(online)].pdf | 2019-12-26 |
| 15 | 5448-CHE-2015-FER.pdf | 2019-06-27 |
| 15 | 5448-CHE-2015-FER_SER_REPLY [26-12-2019(online)].pdf | 2019-12-26 |
| 16 | 5448-CHE-2015-Correspondence-040416.pdf | 2016-06-14 |
| 16 | 5448-CHE-2015-DRAWING [26-12-2019(online)].pdf | 2019-12-26 |
| 17 | 5448-CHE-2015-Form 3-040416.pdf | 2016-06-14 |
| 17 | 5448-CHE-2015-COMPLETE SPECIFICATION [26-12-2019(online)].pdf | 2019-12-26 |
| 18 | 5448-CHE-2015-Assignment-271015.pdf | 2016-04-05 |
| 18 | 5448-CHE-2015-CLAIMS [26-12-2019(online)].pdf | 2019-12-26 |
| 19 | 5448-CHE-2015-ABSTRACT [26-12-2019(online)].pdf | 2019-12-26 |
| 19 | 5448-CHE-2015-Correspondence-Power of Attorney-Notarized Assignment-271015.pdf | 2016-04-05 |
| 20 | 5448-CHE-2015-PETITION UNDER RULE 137 [20-01-2020(online)].pdf | 2020-01-20 |
| 20 | 5448-CHE-2015-Power of Attorney-271015.pdf | 2016-04-05 |
| 21 | 5448-CHE-2015-Certified Copy of Priority Document (MANDATORY) [20-01-2020(online)].pdf | 2020-01-20 |
| 21 | Description(Complete) [12-10-2015(online)].pdf | 2015-10-12 |
| 22 | 5448-CHE-2015-Priority Document_ (As Filed)_22-01-2020.pdf | 2020-01-22 |
| 22 | Drawing [12-10-2015(online)].pdf | 2015-10-12 |
| 23 | 5448-CHE-2015-Correspondence_22-01-2020.pdf | 2020-01-22 |
| 23 | Form 1 [12-10-2015(online)].pdf | 2015-10-12 |
| 24 | 5448-CHE-2015-FORM 3 [13-02-2020(online)].pdf | 2020-02-13 |
| 24 | Form 18 [12-10-2015(online)].pdf | 2015-10-12 |
| 25 | Form 3 [12-10-2015(online)].pdf | 2015-10-12 |
| 25 | 5448-CHE-2015-PatentCertificate03-04-2023.pdf | 2023-04-03 |
| 26 | Form 5 [12-10-2015(online)].pdf | 2015-10-12 |
| 26 | 5448-CHE-2015-IntimationOfGrant03-04-2023.pdf | 2023-04-03 |
| 1 | SEARCH5448_19-06-2019.pdf |