Abstract: The present invention discloses a method and a server for authentication adaptive to a secured application. The method comprising encrypting a part of continuous streams of random real-time data using a user’s public key to form a first encrypted data when the request is received 10 from a first entity, transmitting the first encrypted data to the first entity, wherein the first entity communicates the first encrypted data to a second entity, receiving a second encrypted data from the second entity, wherein the second encrypted data is created by decrypting the first encrypted data using a user’s private key and encrypting the decrypted data using the user’s private key, authenticating the second encrypted data received from the second entity by 15 comparing data decrypted from the second encrypted data with the part of continuous streams of random real-time data stored in the authentication server and initiating action based on authentication. Fig. 1
1. A method of authentication adaptive to a secured application, when the secured
application initiates an authentication request, the method comprising:
5 receiving, by an authentication server, a request for authentication of a session of the
secured application initiated on a first entity;
encrypting, by the authentication server, a part of continuous streams of random real¬
time data using a user’s public key to form a first encrypted data when the request is received;
transmitting, by the authentication server, the first encrypted data to the first entity,
10 wherein the first entity communicates the first encrypted data to a second entity;
receiving, by the authentication server, a second encrypted data from the second entity,
wherein the second encrypted data is created by decrypting the first encrypted data using a
user’s private key to get the part of continuous streams of random real-time data and encrypting
the part of continuous streams of random real-time data using the user’s private key;
15 authenticating, by the authentication server, the second encrypted data received from
the second entity by comparing data decrypted from the second encrypted data with the part of continuous streams of random real-time data stored in the authentication server;
initiating, by the authentication server, first action to allow access or to continue the
access to the session of the secured application when the authentication is successful; and
20 initiating, by the authentication server, second action to terminate the session of the
secured application when the authentication is unsuccessful.
2. The method as claimed in claim 1, wherein the second entity is registered with the
authentication server.
25
3. The method as claimed in claim 1, wherein the continuous streams of random real-time
data generation are based on at least one of dynamic parameters and random severity score.
4. The method as claimed in claim 3, wherein the random severity score depends on a type
30 of the secured application.
5. The method as claimed in claim 3, wherein the dynamic parameters comprise at least
one of matching factor, maximum acceptable time delay, buffer size of the first entity and the
second entity, type of data, data rate, the type of the secured application, type of the first entity
and the second entity, network latency among the authentication server, the first entity and the second entity, type of communication mechanism used between the first entity and the second entity and technical limitations of the communication mechanism used between the first entity and the second entity. 5
6. The method as claimed in claim 1, wherein communication mechanism between the
first entity and the second entity comprises Wi-Fi, Bluetooth, Near Field Communication (NFC) and modulation techniques to convert data to audio, video, vibration and light transfer.
10 7. The method as claimed in claim 1, wherein the first entity and the second entity are a
same device.
8. The method as claimed in claim 1, wherein the initiating first action to allow access or
to continue the access to the session of the secured application comprises:
15 if the compared data matches or exceeds threshold value calculated by the
authentication server, granting, by the authentication server, the access to the session of the secured application or allowing, by the authentication server, to continue the access to the session of the secured application.
20 9. The method as claimed in claim 1, wherein the initiating second action to terminate the
session of the secured application comprises:
if the compared data does not match or exceed the threshold value calculated by the authentication server, denying, by the authentication server, the access to the session of the secured application. 25
10. An authentication server for authentication adaptive to a secured application, the server
comprising:
a processor; and
a memory communicatively coupled to the processor, wherein the memory stores
30 processor-executable instructions, which on execution, cause the processor to:
receive a request for authentication of a session of the secured application initiated on a first entity;
encrypt a part of continuous streams of random real-time data using a user’s public key to form a first encrypted data when the request is received;
transmit the first encrypted data to the first entity, wherein the first entity communicates the first encrypted data to a second entity;
receive a second encrypted data from the second entity, wherein the second
encrypted data is created by decrypting the first encrypted data using a user’s private
5 key to get the part of continuous streams of random real-time data and encrypting the
part of continuous streams of random real-time data using the user’s private key;
authenticate the second encrypted data received from the second entity by
comparing data decrypted from the second encrypted data with the part of continuous
streams of random real-time data stored in the authentication server;
10 initiate first action to allow access or to continue the access to the session of the
secured application when the authentication is successful; and
initiate second action to terminate the session of the secured application when the authentication is unsuccessful.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 202041023563-IntimationOfGrant13-08-2024.pdf | 2024-08-13 |
| 1 | 202041023563-STATEMENT OF UNDERTAKING (FORM 3) [04-06-2020(online)].pdf | 2020-06-04 |
| 2 | 202041023563-PatentCertificate13-08-2024.pdf | 2024-08-13 |
| 2 | 202041023563-REQUEST FOR EXAMINATION (FORM-18) [04-06-2020(online)].pdf | 2020-06-04 |
| 3 | 202041023563-Written submissions and relevant documents [06-08-2024(online)].pdf | 2024-08-06 |
| 3 | 202041023563-PROOF OF RIGHT [04-06-2020(online)].pdf | 2020-06-04 |
| 4 | 202041023563-POWER OF AUTHORITY [04-06-2020(online)].pdf | 2020-06-04 |
| 4 | 202041023563-Correspondence to notify the Controller [08-07-2024(online)].pdf | 2024-07-08 |
| 5 | 202041023563-US(14)-HearingNotice-(HearingDate-24-07-2024).pdf | 2024-07-05 |
| 5 | 202041023563-FORM 18 [04-06-2020(online)].pdf | 2020-06-04 |
| 6 | 202041023563-FORM 1 [04-06-2020(online)].pdf | 2020-06-04 |
| 6 | 202041023563-AMENDED DOCUMENTS [31-05-2022(online)].pdf | 2022-05-31 |
| 7 | 202041023563-FIGURE OF ABSTRACT [04-06-2020(online)].pdf | 2020-06-04 |
| 7 | 202041023563-CLAIMS [31-05-2022(online)].pdf | 2022-05-31 |
| 8 | 202041023563-FER_SER_REPLY [31-05-2022(online)].pdf | 2022-05-31 |
| 8 | 202041023563-DRAWINGS [04-06-2020(online)].pdf | 2020-06-04 |
| 9 | 202041023563-DECLARATION OF INVENTORSHIP (FORM 5) [04-06-2020(online)].pdf | 2020-06-04 |
| 9 | 202041023563-FORM 13 [31-05-2022(online)].pdf | 2022-05-31 |
| 10 | 202041023563-COMPLETE SPECIFICATION [04-06-2020(online)].pdf | 2020-06-04 |
| 10 | 202041023563-FORM 3 [31-05-2022(online)].pdf | 2022-05-31 |
| 11 | 202041023563-OTHERS [31-05-2022(online)].pdf | 2022-05-31 |
| 11 | 202041023563-Request Letter-Correspondence [16-06-2020(online)].pdf | 2020-06-16 |
| 12 | 202041023563-POA [31-05-2022(online)].pdf | 2022-05-31 |
| 12 | 202041023563-Power of Attorney [16-06-2020(online)].pdf | 2020-06-16 |
| 13 | 202041023563-FER.pdf | 2022-01-11 |
| 13 | 202041023563-Form 1 (Submitted on date of filing) [16-06-2020(online)].pdf | 2020-06-16 |
| 14 | 202041023563-FORM 3 [04-06-2021(online)].pdf | 2021-06-04 |
| 15 | 202041023563-FER.pdf | 2022-01-11 |
| 15 | 202041023563-Form 1 (Submitted on date of filing) [16-06-2020(online)].pdf | 2020-06-16 |
| 16 | 202041023563-POA [31-05-2022(online)].pdf | 2022-05-31 |
| 16 | 202041023563-Power of Attorney [16-06-2020(online)].pdf | 2020-06-16 |
| 17 | 202041023563-Request Letter-Correspondence [16-06-2020(online)].pdf | 2020-06-16 |
| 17 | 202041023563-OTHERS [31-05-2022(online)].pdf | 2022-05-31 |
| 18 | 202041023563-FORM 3 [31-05-2022(online)].pdf | 2022-05-31 |
| 18 | 202041023563-COMPLETE SPECIFICATION [04-06-2020(online)].pdf | 2020-06-04 |
| 19 | 202041023563-DECLARATION OF INVENTORSHIP (FORM 5) [04-06-2020(online)].pdf | 2020-06-04 |
| 19 | 202041023563-FORM 13 [31-05-2022(online)].pdf | 2022-05-31 |
| 20 | 202041023563-DRAWINGS [04-06-2020(online)].pdf | 2020-06-04 |
| 20 | 202041023563-FER_SER_REPLY [31-05-2022(online)].pdf | 2022-05-31 |
| 21 | 202041023563-CLAIMS [31-05-2022(online)].pdf | 2022-05-31 |
| 21 | 202041023563-FIGURE OF ABSTRACT [04-06-2020(online)].pdf | 2020-06-04 |
| 22 | 202041023563-AMENDED DOCUMENTS [31-05-2022(online)].pdf | 2022-05-31 |
| 22 | 202041023563-FORM 1 [04-06-2020(online)].pdf | 2020-06-04 |
| 23 | 202041023563-FORM 18 [04-06-2020(online)].pdf | 2020-06-04 |
| 23 | 202041023563-US(14)-HearingNotice-(HearingDate-24-07-2024).pdf | 2024-07-05 |
| 24 | 202041023563-Correspondence to notify the Controller [08-07-2024(online)].pdf | 2024-07-08 |
| 24 | 202041023563-POWER OF AUTHORITY [04-06-2020(online)].pdf | 2020-06-04 |
| 25 | 202041023563-Written submissions and relevant documents [06-08-2024(online)].pdf | 2024-08-06 |
| 25 | 202041023563-PROOF OF RIGHT [04-06-2020(online)].pdf | 2020-06-04 |
| 26 | 202041023563-REQUEST FOR EXAMINATION (FORM-18) [04-06-2020(online)].pdf | 2020-06-04 |
| 26 | 202041023563-PatentCertificate13-08-2024.pdf | 2024-08-13 |
| 27 | 202041023563-STATEMENT OF UNDERTAKING (FORM 3) [04-06-2020(online)].pdf | 2020-06-04 |
| 27 | 202041023563-IntimationOfGrant13-08-2024.pdf | 2024-08-13 |
| 1 | SearchHistoryE_11-01-2022.pdf |