Sign In to Follow Application
View All Documents & Correspondence

Authenticated Self Service Terminal (Sst) Access

Abstract: An SST (120 or 400) facilitates authentication of a user through an external service via a mobile device (110) operated by the user. The SST (120 or 400) also obtains independent verification of an access command sent from a server (140) through a cryptographic peripheral module (123) integrated into the SST (120 or 400) before sending a command to grant authenticated access to the SST (120 or 400) in response to the access command.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
12 October 2015
Publication Number
36/2016
Publication Type
INA
Invention Field
MECHANICAL ENGINEERING
Status
Email
patent@depenning.com
Parent Application
Patent Number
Legal Status
Grant Date
2023-04-03
Renewal Date

Applicants

NCR CORPORATION
of 3097 Satellite Blvd., Duluth, Georgia 30096, USA

Inventors

1. Colin Herkes
of 20 Kilburn Road, Crossford, Dunfermline, Fife KY 12 8PH, Scotland, United Kingdom
2. Avril Kidd
of 16A Newtyle Road, Muirhead, Dundee DD2 5QP, Scotland, United Kingdom
3. Charles Harrow
of 11 Beaumont Terrace, Broughty Ferry, Dundee DD5 3LR, United kingdom

Specification

We Claim:
1. A method of providing authenticated access to a secure resource of a self-service terminal (120 or 400), the method comprising:
generating, by a control application of the self-service terminal (120 or 400), in response to receiving a request for access to the secure resource sent from a mobile device (110), an authentication token (step 211 or step 213 or step 214);
providing, by the control application, the authentication token (step 210) comprising presenting the authentication token on a display (401) of the self-service terminal (120 or 400);
a mobile application of the mobile device (110) scanning the authentication token and contacting an authentication server (130) over a wireless connection;
the authentication server (130) independently authenticating the mobile device (110) using the generated authentication token;
once the mobile device (110) has been authenticated by the authentication server (130), the method being characterized by
the authentication server (130) instructing a controller server (140) to send an access command to the control application of the self-service terminal (120 or 400);
obtaining, by the control application, the access command from the controller server (140) (step 220);
requesting, by the control application, a cryptographic peripheral device (123) to validate the access command (step 230);
the cryptographic peripheral device (123), in response to the request to validate the access command, sending a challenge message to the controller server (140);
the controller server (140) digitally signing and sending the challenge message back to the cryptographic peripheral device (123) as a response;
the cryptographic peripheral device (123) validating the response, and providing authenticated access to the secure resource of the self-service terminal (120 or 400) upon verification by the cryptographic peripheral device
22

(123) that the response was a valid response to the challenge message (step 230).
2. The method as claimed in claim 1, wherein the request for access to the secure resource comprises a wireless request sent from the mobile device (110) (step 211 or step 213).
3. The method as claimed in claim 2, wherein the step of generating the authentication token includes creating the authentication token as a two dimensional barcode encoded with a mobile device identifier for the mobile device (110), a terminal identifier for the self-service terminal (120 or 400), an indication of the wireless request, and a date and time when the barcode was created.
4. The method as claimed in any of claims 1 to 3, wherein the step of obtaining the access command from the controller server (140) includes re- presenting a new authentication token on the display (401) when a adapted period of time elapses before the access command is received from the server (140) (step 221).
5. The method as claimed in any of claims 1 to 4, wherein the step of requesting the cryptographic peripheral device (123) to validate the access command includes acting as an intermediary to forward encrypted information between the cryptographic peripheral device (123) and the controller server (140) to assist the cryptographic peripheral device (123) in independently validating the access command on behalf of the self-service terminal (120 or 400), wherein the control application (121) in the self-service terminal (120 or 400) is incapable of decrypting the encrypted information (step 231).
6. The method as claimed in any of claims 1 to 5, wherein the method comprises
sending audit data to the controller server (140) when the authenticated access
is granted (step 240), and
maintaining audit data in a log on the terminal (120 or 400) (step 241).
23

7. A self-service terminal (120 or 400) comprising:
a secure resource;
a controller executing a control application (121 or 402); and a cryptographic peripheral device (123) in communication with the controller and executing a cryptographic application (403); the control application (121 or 402) being adapted to:
receive a request from a mobile device (110) for access to the secure resource and
provide an authentication token comprising presenting the authentication token on a display (401) of the self-service terminal (120 or 400), wherein the authentication token is generated in response to the request from the mobile device (110); wherein the self-service terminal is characterized in that the control application is adapted to:
obtain an access command from a controller server (140), wherein the access command is sent in response to an instruction from an authentication server (130) after the authentication server (130) has independently authenticated the mobile device (110) using the generated authentication token as scanned by the mobile device and sent to the authentication server (130);
request the cryptographic peripheral device (123) to validate the access command,
forward a challenge message from the cryptographic application (403) to the controller server (140),
receive a response comprising a digitally signed challenge message from the controller server (140), and
provide authenticated access to the secure resource upon verification by the cryptographic application (403) that the received response was a valid response to the challenge message.
8. The terminal as claimed in claim 7, wherein the secure resource comprises
devices located within a secure area of the terminal (120 or 400), and the control
24

application (121 or 402) is adapted to provide the authenticated access by electronically unlocking an access panel to the secure resource.
9. The terminal as claimed in claim 7, wherein the secure resource comprises an administrative interface to the terminal (120 or 400).
10. The terminal as claimed in any of claims 7 to 9, wherein the terminal (120 or 400) comprises an automated teller machine, and the cryptographic peripheral device (123) comprises an encrypting PINpad.

Documents

Application Documents

# Name Date
1 5448-CHE-2015-IntimationOfGrant03-04-2023.pdf 2023-04-03
1 Form 5 [12-10-2015(online)].pdf 2015-10-12
2 5448-CHE-2015-PatentCertificate03-04-2023.pdf 2023-04-03
2 Form 3 [12-10-2015(online)].pdf 2015-10-12
3 Form 18 [12-10-2015(online)].pdf 2015-10-12
3 5448-CHE-2015-FORM 3 [13-02-2020(online)].pdf 2020-02-13
4 Form 1 [12-10-2015(online)].pdf 2015-10-12
4 5448-CHE-2015-Correspondence_22-01-2020.pdf 2020-01-22
5 Drawing [12-10-2015(online)].pdf 2015-10-12
5 5448-CHE-2015-Priority Document_ (As Filed)_22-01-2020.pdf 2020-01-22
6 Description(Complete) [12-10-2015(online)].pdf 2015-10-12
6 5448-CHE-2015-Certified Copy of Priority Document (MANDATORY) [20-01-2020(online)].pdf 2020-01-20
7 5448-CHE-2015-Power of Attorney-271015.pdf 2016-04-05
7 5448-CHE-2015-PETITION UNDER RULE 137 [20-01-2020(online)].pdf 2020-01-20
8 5448-CHE-2015-Correspondence-Power of Attorney-Notarized Assignment-271015.pdf 2016-04-05
8 5448-CHE-2015-ABSTRACT [26-12-2019(online)].pdf 2019-12-26
9 5448-CHE-2015-Assignment-271015.pdf 2016-04-05
9 5448-CHE-2015-CLAIMS [26-12-2019(online)].pdf 2019-12-26
10 5448-CHE-2015-COMPLETE SPECIFICATION [26-12-2019(online)].pdf 2019-12-26
10 5448-CHE-2015-Form 3-040416.pdf 2016-06-14
11 5448-CHE-2015-Correspondence-040416.pdf 2016-06-14
11 5448-CHE-2015-DRAWING [26-12-2019(online)].pdf 2019-12-26
12 5448-CHE-2015-FER.pdf 2019-06-27
12 5448-CHE-2015-FER_SER_REPLY [26-12-2019(online)].pdf 2019-12-26
13 5448-CHE-2015-FORM 3 [26-12-2019(online)].pdf 2019-12-26
13 5448-CHE-2015-OTHERS [26-12-2019(online)].pdf 2019-12-26
14 5448-CHE-2015-FORM 3 [26-12-2019(online)].pdf 2019-12-26
14 5448-CHE-2015-OTHERS [26-12-2019(online)].pdf 2019-12-26
15 5448-CHE-2015-FER.pdf 2019-06-27
15 5448-CHE-2015-FER_SER_REPLY [26-12-2019(online)].pdf 2019-12-26
16 5448-CHE-2015-Correspondence-040416.pdf 2016-06-14
16 5448-CHE-2015-DRAWING [26-12-2019(online)].pdf 2019-12-26
17 5448-CHE-2015-Form 3-040416.pdf 2016-06-14
17 5448-CHE-2015-COMPLETE SPECIFICATION [26-12-2019(online)].pdf 2019-12-26
18 5448-CHE-2015-Assignment-271015.pdf 2016-04-05
18 5448-CHE-2015-CLAIMS [26-12-2019(online)].pdf 2019-12-26
19 5448-CHE-2015-ABSTRACT [26-12-2019(online)].pdf 2019-12-26
19 5448-CHE-2015-Correspondence-Power of Attorney-Notarized Assignment-271015.pdf 2016-04-05
20 5448-CHE-2015-PETITION UNDER RULE 137 [20-01-2020(online)].pdf 2020-01-20
20 5448-CHE-2015-Power of Attorney-271015.pdf 2016-04-05
21 5448-CHE-2015-Certified Copy of Priority Document (MANDATORY) [20-01-2020(online)].pdf 2020-01-20
21 Description(Complete) [12-10-2015(online)].pdf 2015-10-12
22 5448-CHE-2015-Priority Document_ (As Filed)_22-01-2020.pdf 2020-01-22
22 Drawing [12-10-2015(online)].pdf 2015-10-12
23 5448-CHE-2015-Correspondence_22-01-2020.pdf 2020-01-22
23 Form 1 [12-10-2015(online)].pdf 2015-10-12
24 5448-CHE-2015-FORM 3 [13-02-2020(online)].pdf 2020-02-13
24 Form 18 [12-10-2015(online)].pdf 2015-10-12
25 Form 3 [12-10-2015(online)].pdf 2015-10-12
25 5448-CHE-2015-PatentCertificate03-04-2023.pdf 2023-04-03
26 Form 5 [12-10-2015(online)].pdf 2015-10-12
26 5448-CHE-2015-IntimationOfGrant03-04-2023.pdf 2023-04-03

Search Strategy

1 SEARCH5448_19-06-2019.pdf

ERegister / Renewals

3rd: 11 Apr 2023

From 12/10/2017 - To 12/10/2018

4th: 11 Apr 2023

From 12/10/2018 - To 12/10/2019

5th: 11 Apr 2023

From 12/10/2019 - To 12/10/2020

6th: 11 Apr 2023

From 12/10/2020 - To 12/10/2021

7th: 11 Apr 2023

From 12/10/2021 - To 12/10/2022

8th: 11 Apr 2023

From 12/10/2022 - To 12/10/2023

9th: 05 Oct 2023

From 12/10/2023 - To 12/10/2024

10th: 03 Oct 2024

From 12/10/2024 - To 12/10/2025

11th: 30 Sep 2025

From 12/10/2025 - To 12/10/2026