Sign In to Follow Application
View All Documents & Correspondence

Method And Server For Authentication Using Continuous Real Time Data Stream As An Authentication Factor

Abstract: The present invention discloses a method and a server for authentication adaptive to a secured application. The method comprising encrypting a part of continuous streams of random real-time data using a user’s public key to form a first encrypted data when the request is received 10 from a first entity, transmitting the first encrypted data to the first entity, wherein the first entity communicates the first encrypted data to a second entity, receiving a second encrypted data from the second entity, wherein the second encrypted data is created by decrypting the first encrypted data using a user’s private key and encrypting the decrypted data using the user’s private key, authenticating the second encrypted data received from the second entity by 15 comparing data decrypted from the second encrypted data with the part of continuous streams of random real-time data stored in the authentication server and initiating action based on authentication. Fig. 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
04 June 2020
Publication Number
50/2021
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
ipr@akshipassociates.com
Parent Application
Patent Number
Legal Status
Grant Date
2024-08-13
Renewal Date

Applicants

WIPRO LIMITED
Doddakennelli, Sarjapur Road, Bangalore, Karnataka, India-560035

Inventors

1. NAVEEN KUMAR JEYACHANDRASEKAR
R 1003, Ajmera Infinity Apt, Neeladiri Road, Doddathogur, Electronic city, Bangalore, Karnataka, India 560100
2. KAKI SAI KIRAN
# 478, 3rd Floor, 4th Cross, Thunga Block, Bettadasanapura, Electronic City Phase 1, Bangalore, Karnataka India-560100

Specification

1. A method of authentication adaptive to a secured application, when the secured
application initiates an authentication request, the method comprising:
5 receiving, by an authentication server, a request for authentication of a session of the
secured application initiated on a first entity;
encrypting, by the authentication server, a part of continuous streams of random real¬
time data using a user’s public key to form a first encrypted data when the request is received;
transmitting, by the authentication server, the first encrypted data to the first entity,
10 wherein the first entity communicates the first encrypted data to a second entity;
receiving, by the authentication server, a second encrypted data from the second entity,
wherein the second encrypted data is created by decrypting the first encrypted data using a
user’s private key to get the part of continuous streams of random real-time data and encrypting
the part of continuous streams of random real-time data using the user’s private key;
15 authenticating, by the authentication server, the second encrypted data received from
the second entity by comparing data decrypted from the second encrypted data with the part of continuous streams of random real-time data stored in the authentication server;
initiating, by the authentication server, first action to allow access or to continue the
access to the session of the secured application when the authentication is successful; and
20 initiating, by the authentication server, second action to terminate the session of the
secured application when the authentication is unsuccessful.
2. The method as claimed in claim 1, wherein the second entity is registered with the
authentication server.
25
3. The method as claimed in claim 1, wherein the continuous streams of random real-time
data generation are based on at least one of dynamic parameters and random severity score.
4. The method as claimed in claim 3, wherein the random severity score depends on a type
30 of the secured application.
5. The method as claimed in claim 3, wherein the dynamic parameters comprise at least
one of matching factor, maximum acceptable time delay, buffer size of the first entity and the
second entity, type of data, data rate, the type of the secured application, type of the first entity

and the second entity, network latency among the authentication server, the first entity and the second entity, type of communication mechanism used between the first entity and the second entity and technical limitations of the communication mechanism used between the first entity and the second entity. 5
6. The method as claimed in claim 1, wherein communication mechanism between the
first entity and the second entity comprises Wi-Fi, Bluetooth, Near Field Communication (NFC) and modulation techniques to convert data to audio, video, vibration and light transfer.
10 7. The method as claimed in claim 1, wherein the first entity and the second entity are a
same device.
8. The method as claimed in claim 1, wherein the initiating first action to allow access or
to continue the access to the session of the secured application comprises:
15 if the compared data matches or exceeds threshold value calculated by the
authentication server, granting, by the authentication server, the access to the session of the secured application or allowing, by the authentication server, to continue the access to the session of the secured application.
20 9. The method as claimed in claim 1, wherein the initiating second action to terminate the
session of the secured application comprises:
if the compared data does not match or exceed the threshold value calculated by the authentication server, denying, by the authentication server, the access to the session of the secured application. 25
10. An authentication server for authentication adaptive to a secured application, the server
comprising:
a processor; and
a memory communicatively coupled to the processor, wherein the memory stores
30 processor-executable instructions, which on execution, cause the processor to:
receive a request for authentication of a session of the secured application initiated on a first entity;
encrypt a part of continuous streams of random real-time data using a user’s public key to form a first encrypted data when the request is received;

transmit the first encrypted data to the first entity, wherein the first entity communicates the first encrypted data to a second entity;
receive a second encrypted data from the second entity, wherein the second
encrypted data is created by decrypting the first encrypted data using a user’s private
5 key to get the part of continuous streams of random real-time data and encrypting the
part of continuous streams of random real-time data using the user’s private key;
authenticate the second encrypted data received from the second entity by
comparing data decrypted from the second encrypted data with the part of continuous
streams of random real-time data stored in the authentication server;
10 initiate first action to allow access or to continue the access to the session of the
secured application when the authentication is successful; and
initiate second action to terminate the session of the secured application when the authentication is unsuccessful.

Documents

Orders

Section Controller Decision Date

Application Documents

# Name Date
1 202041023563-IntimationOfGrant13-08-2024.pdf 2024-08-13
1 202041023563-STATEMENT OF UNDERTAKING (FORM 3) [04-06-2020(online)].pdf 2020-06-04
2 202041023563-PatentCertificate13-08-2024.pdf 2024-08-13
2 202041023563-REQUEST FOR EXAMINATION (FORM-18) [04-06-2020(online)].pdf 2020-06-04
3 202041023563-Written submissions and relevant documents [06-08-2024(online)].pdf 2024-08-06
3 202041023563-PROOF OF RIGHT [04-06-2020(online)].pdf 2020-06-04
4 202041023563-POWER OF AUTHORITY [04-06-2020(online)].pdf 2020-06-04
4 202041023563-Correspondence to notify the Controller [08-07-2024(online)].pdf 2024-07-08
5 202041023563-US(14)-HearingNotice-(HearingDate-24-07-2024).pdf 2024-07-05
5 202041023563-FORM 18 [04-06-2020(online)].pdf 2020-06-04
6 202041023563-FORM 1 [04-06-2020(online)].pdf 2020-06-04
6 202041023563-AMENDED DOCUMENTS [31-05-2022(online)].pdf 2022-05-31
7 202041023563-FIGURE OF ABSTRACT [04-06-2020(online)].pdf 2020-06-04
7 202041023563-CLAIMS [31-05-2022(online)].pdf 2022-05-31
8 202041023563-FER_SER_REPLY [31-05-2022(online)].pdf 2022-05-31
8 202041023563-DRAWINGS [04-06-2020(online)].pdf 2020-06-04
9 202041023563-DECLARATION OF INVENTORSHIP (FORM 5) [04-06-2020(online)].pdf 2020-06-04
9 202041023563-FORM 13 [31-05-2022(online)].pdf 2022-05-31
10 202041023563-COMPLETE SPECIFICATION [04-06-2020(online)].pdf 2020-06-04
10 202041023563-FORM 3 [31-05-2022(online)].pdf 2022-05-31
11 202041023563-OTHERS [31-05-2022(online)].pdf 2022-05-31
11 202041023563-Request Letter-Correspondence [16-06-2020(online)].pdf 2020-06-16
12 202041023563-POA [31-05-2022(online)].pdf 2022-05-31
12 202041023563-Power of Attorney [16-06-2020(online)].pdf 2020-06-16
13 202041023563-FER.pdf 2022-01-11
13 202041023563-Form 1 (Submitted on date of filing) [16-06-2020(online)].pdf 2020-06-16
14 202041023563-FORM 3 [04-06-2021(online)].pdf 2021-06-04
15 202041023563-FER.pdf 2022-01-11
15 202041023563-Form 1 (Submitted on date of filing) [16-06-2020(online)].pdf 2020-06-16
16 202041023563-POA [31-05-2022(online)].pdf 2022-05-31
16 202041023563-Power of Attorney [16-06-2020(online)].pdf 2020-06-16
17 202041023563-Request Letter-Correspondence [16-06-2020(online)].pdf 2020-06-16
17 202041023563-OTHERS [31-05-2022(online)].pdf 2022-05-31
18 202041023563-FORM 3 [31-05-2022(online)].pdf 2022-05-31
18 202041023563-COMPLETE SPECIFICATION [04-06-2020(online)].pdf 2020-06-04
19 202041023563-DECLARATION OF INVENTORSHIP (FORM 5) [04-06-2020(online)].pdf 2020-06-04
19 202041023563-FORM 13 [31-05-2022(online)].pdf 2022-05-31
20 202041023563-DRAWINGS [04-06-2020(online)].pdf 2020-06-04
20 202041023563-FER_SER_REPLY [31-05-2022(online)].pdf 2022-05-31
21 202041023563-CLAIMS [31-05-2022(online)].pdf 2022-05-31
21 202041023563-FIGURE OF ABSTRACT [04-06-2020(online)].pdf 2020-06-04
22 202041023563-AMENDED DOCUMENTS [31-05-2022(online)].pdf 2022-05-31
22 202041023563-FORM 1 [04-06-2020(online)].pdf 2020-06-04
23 202041023563-FORM 18 [04-06-2020(online)].pdf 2020-06-04
23 202041023563-US(14)-HearingNotice-(HearingDate-24-07-2024).pdf 2024-07-05
24 202041023563-Correspondence to notify the Controller [08-07-2024(online)].pdf 2024-07-08
24 202041023563-POWER OF AUTHORITY [04-06-2020(online)].pdf 2020-06-04
25 202041023563-Written submissions and relevant documents [06-08-2024(online)].pdf 2024-08-06
25 202041023563-PROOF OF RIGHT [04-06-2020(online)].pdf 2020-06-04
26 202041023563-REQUEST FOR EXAMINATION (FORM-18) [04-06-2020(online)].pdf 2020-06-04
26 202041023563-PatentCertificate13-08-2024.pdf 2024-08-13
27 202041023563-STATEMENT OF UNDERTAKING (FORM 3) [04-06-2020(online)].pdf 2020-06-04
27 202041023563-IntimationOfGrant13-08-2024.pdf 2024-08-13

Search Strategy

1 SearchHistoryE_11-01-2022.pdf

ERegister / Renewals

3rd: 13 Nov 2024

From 04/06/2022 - To 04/06/2023

4th: 13 Nov 2024

From 04/06/2023 - To 04/06/2024

5th: 13 Nov 2024

From 04/06/2024 - To 04/06/2025

6th: 02 Jun 2025

From 04/06/2025 - To 04/06/2026