Home
Multi-Factor Authorization System and Method
Contents
1. sonal portable device used in the transaction the IP address of the data connection the geographical location of the IP address the geographical location of the portable device as determined by the network it is connected to or by a Global Positionning System functionality the name of the account holder as registered by a third party service provider The Mar 11 2010 portable computing device can be equipped with a client software or widgets utilizing such programming technology as J2ME BREW or other equivalent technology and can access on line data and services such as mobile internet pages or WAP enabled web pages or IVR enabled services 0007 In an embodiment the system of the present inven tion includes authentication rules and a configuration engine to identify which authentication rules need to be applied for various transactions and activities depending on the stage of the life cycle of the associated accounts on the financial risk associated with the transaction or activity and the access channel used to complete the transaction or activity 0008 In an embodiment the system of the present inven tion can include a plurality of repositories storing information used in completing a multi factor authentication where such repositories are associated with systems to identify a personal computing device or with systems to identify a network connection service such as a broadband or wireless service or with systems to
2. L gt N LE X Se Z EN Nid jou p sybip n pexoo H gt lt oN gt lt sou s Aug aen een d gt oer SLPS N A ON 3 1003 re Anyen Sev Pu a Anoy Ort Nid ou L e4 liqolN SOV 4 SS 1d L ewootem qon 00 aniy VAIN 1948 uondesSUBLI SINS dVM US 2010 0063935 A1 Mar 11 2010 Sheet 6 of 7 Patent Application Publication pamba JOUV4IN uluii 1 q as ey did YA nil did SINS anal did ISSAVM esjey dZd 155 ddy 15S UON onal did q9M os ey did 1SSqQ A pounbay odA uo van UECHT fpuuey 9 81 UOISIDSQ VIN UondeSUBA did SS30144 UOD2PSUSD did eunsay yeqe VAIN W4opiad uonoesueJ1 dZd puadsns Pon bal4N ulwaq uonpesueJ dzd a uqns si rd m st um GO UOH2BESUEJ did SS8204d UO11OESuED dzd HWANS E weideiq ui91s S YAWN 9 24314 Azonsaday uoneonuoumnyv BWEN Nid N S OI BSE SI8T16S POUTSH VAN US 2010 0063935 A1 ug jos poya YAN Hg 38s poau v Ji SI nnn AAA e N A peumnbos VAN z gan ISS SIDA SINS ejep SSAIM 2 QUURYO i a EE S i uonduossp uonoesuei i 21035 UonenbyuoJ SSE ege SOAK UOnSESUEI pue sein VAN a mm S c ABBE A 0 0 N x oe ee EE euiBug uoneinBuuo5 suoniugog sed uonoesuegjj pezuouyny pue seins VIA J89pIAOJd 321A49S 4 9unB14 Patent Application
3. Mar 11 2010 card or a bank account including ACH transfers or the purchase ofan item or aresponseto arequest for money from a third party As with the process illustrated in FIG 2 for purposes of clarity the process illustrated in FIG 3 omits steps not important to an understanding of the invention including for example a verification that sufficient funds are available or offering the user alternative funding sources and so on 0031 In systems using the SMS protocol for transactions MFA verifications can be performed in a manner similar to that shown in FIG 3 In an embodiment of such a process the user sends a message to a pre defined number comprising the send command the recipient s identification and the trans action amount Thereafter the system initiates an IVR call to the user who confirms the transaction as with the WAP pro cess described above Once the confirmation data is verified the transaction completes Other transactions including requests for money accept money and get money can all be handled in a substantially similar manner where the key elements are the indicia unique to the transaction followed by an IVR call to confirm at least some of those details with the transaction completing once the confirmation data is verified It will be appreciated that the confirmation occurs substan tially instantaneously making the confirmation process user friendly while maintaining near
4. is also similar in at least some embodiments where the user is sent a manual SMS message with a security string and the user must enter the security string to permit authentication to complete 0029 Transactions involving the WAP protocol can in some embodiments ofthe invention involve an IVR callback as shown in FIG 3 The process starts with the user accessing a WAP enabled website as shown at 200 The user then logs in typically by providing a unique indicia such as their phone number together with their PIN as shown at 205 The system presents the user with one or more transaction types and the user selects the appropriate one as shown at 210 The user then enters the recipient s together with the transaction amount as shown at 215 and this information is transmitted to the system The system then initiates an IVR call to the user s device shown at 220 Depending upon the particular embodiment a text to speech system can be used to convert the user s spoken word into data or keypad entries can be used but in either event the user is prompted to confirm the transaction typically by confirming the transaction amount together with re entering their PIN as shown at 225 Once the confirmation is verified the transaction completes as shown at 230 0030 Other types of transactions can be performed using a WAP protocol with IVR callback including loading add ing funds to a prepaid card or account using either a credit
5. legal liabilities require that certain degrees of authenti cation be performed to manage the risks associated with the transactions 0039 Examples of Transaction Types for each of the Ser vices supported include all aspects of the management of the lifecycle of a transaction or an account including the initial registration for the service the activation of the account and the delivery of the first transaction the normal use of the account and the service the servicing of the account through activities such as balance inquiries account information updates statements etc and the servicing of the account in exception situations such as a reversal of a transaction the blocking of an account the closure of an account etc 0040 Examples of MFA methods include PIN or Pass code validation identity validation such as name address social security number drivers license number serial number of the device or a secure element contained in the device phone number or IP address associated with the device loca tion of the Personal Computing Device at the time of the transaction etc Authentications may include a query to the user ofthe service a call back or message back to validate the origin of the transaction a query to the Personal Computing Device and or a query to a 3 7 party provider holding infor mation associated with the identity of the user or of the Personal Computing Device 0041 Having fully described a p
6. Publication US 2010 0063935 Al MULTI FACTOR AUTHORIZATION SYSTEM AND METHOD RELATED APPLICATIONS 0001 The present application is related to and claims the benefit under 35 USC Section 119 of U S provisional Patent Application Ser No 61 095 290 filed Sep 8 2008 entitled Multi Factor Authorization System and Method as well as U S patent application Ser No 11 694 747 filed Mar 30 2007 entitled Mobile Person to Person Payment System and U S patent application Ser No 12 470 482 filed May 21 2009 entitled Mobile Person to Person Payment System all of which are incorporated herein by reference FIELD OF THE INVENTION 0002 This application relates generally to methods and techniques for authenticating the identity ofa party to a trans action and more particularly relates to methods and tech niques for authenticating the identity of a person executing a transaction over wired or wireless networks using a personal device This invention applies throughout the lifecycle of either or both the transaction and the associated accounts BACKGROUND OF THE INVENTION 0003 Onedifficulty in managing accounts and conducting financial transactions via electronic networks is the challenge of verifying that the person conducting the transaction is actually authorized to perform the transaction in question The difficulty of authenticating the identity of a person con ducting such a transaction has led to the proposal of m
7. US 20100063935A1 a Patent Application Publication ao Pub No US 2010 0063935 A1 av United States Thomas et al 43 Pub Date Mar 11 2010 54 MULTI FACTOR AUTHORIZATION SYSTEM AND METHOD 75 Inventors Ajit Thomas San Francisco CA US Rodney Robinson Los Altos Hills CA US John Michael Tumminaro Mountain View CA US John Tumminaro Palo Alto CA US Correspondence Address Law Offices of James E Eakin P O Box 1250 Menlo Park CA 94026 US 73 Assignee Obopay Inc Redwood City CA US 12 555 772 Sep 8 2009 21 Appl No 22 Filed Related U S Application Data 63 Continuation of application No 11 694 747 filed on Mar 30 2007 Continuation of application No 12 470 482 filed on May 21 2009 60 Provisional application No 61 095 290 filed on Sep 8 2008 Publication Classification 51 Int Cl G06Q 10 00 2006 01 52 DS CL cias 705 325 57 ABSTRACT Method and system for authenticating the identity of a party to a transaction being executing over wired or wireless net works using a personal device A transaction system is adapted to receive messages over a network from a connected device where the messages are intended to initiate a transac tion The system comprises authentication rules and an asso ciated engine for identifying the type of transaction and for each type of transaction whether MFA is required If so the necessary MFA attr
8. a welcome message is played displayed or otherwise communicated as shown 400 If the user enters a key not permitted in their PIN or otherwise fails to proceed properly the call terminates at Mobile Fail 1 shown at 405 However if the user begins entry of a PIN a check is made at 415 to determine whether their account is locked If it is an error occurs at step 420 and the transaction cancels at step 425 0035 Ifthe account is not locked the process advances to step 430 where a check is made to see whether the PIN entered by the user has an appropriate number of digits If not anerroris indicated at 435 and the process loops to 410 after which the user is permitted to enter their PIN again Ifthe user makes repeated PIN entry errors the account is locked and the US 2010 0063935 Al transaction cancels at 425 Ifthe user enters a proper number of digits but still the wrong PIN an error is noted at 440 and the user is invited to reenter their PIN In some embodiments lock out occurs immediately where the number of characters is too few whereas multiple tries are permitted before lockout where the number of digits is closer to correct 0036 However in most cases the PIN is correct and the process advances to step 445 A general error can still occurs as noted at 450 resulting in a hang up as shown at 455 and 460 However where the PIN is correct and no other failure occurs the process advances to step 465 and the transact
9. any different sorts of authentication and verification techniques most of which offer limited utility particularly for transac tions conducted over a wireless network such as transactions conducted from a mobile phone 0004 Thus there has been a long felt need for methods and techniques for efficiently and reliably authenticating the identity of those transacting network based business SUMMARY OF THE INVENTION 0005 The present invention provides a configurable sys tem and methods for implementing multi factor authentica tion MEA for protection of transactions and customer information when transactions are being conducted through any of a variety of channels utilizing a consumer personal computing device communicating through data networks such as the Internet or proprietary networks utilizing such transport mechanism as voice communication services broadband data services wireless data services SMS AIM or other instant messaging services over such protocols as TCP IP or proprietary data transport protocols 0006 The implementations associated with each channel check for something the user knows and something the user has to maintain and verify the authenticity of the user and therefore to secure private information and transaction capa bility Such authentication methods can include the verifica tion of a PIN or Passcode the phone number serial number secure element ID associated with the mobile device or per
10. g the net work through which the Personal Computing Device is accessing the service for which the transaction is performed or the third party authentication service 40G and associated data store 40H Each Repository responds to the authentica tion request with any query to the User 5 or Personal Com puting Device 10 necessary to authentication such user or device Upon receiving a response the Repository 40 vali dates the identity of user 5 or the device and provides the Authentication Processing Engine 20 with a response to the authentication request 0022 The sequence described here above is illustrative only and a person skilled in the art will recognize that the communications between the various systems of the present invention can be implemented in a number of ways such that the foregoing description is not intended to be limiting Rather the present invention is to be limited only by the appended claims Likewise those skilled in the art will rec ognize that the functionalities of the various systems can all be incorporated into a single server or distributed across mul tiple servers Likewise the repositories and data stores can reside in a single database or multiple databases in a single repository orcan be distributed across multiple databases and multiple repositories 0023 Referring next to FIG 2 an embodiment of an MFA process is illustrated in the context of user sign up Although the present invention encompasses
11. ibutes are requested thus permitting completion of the transaction in a comparatively secure man ner and also permitting management of the accounts associ ated with the party 77 440 User Selects Sign Up 115 Collect User Data elan Set Mobile PIN PUSH SMS sent containing i security string NE SAN 0 125 1 130 PUSH SMS wakes application E CONS 135 Device Calls Back to System j US 2010 0063935 A1 Mar 11 2010 Sheet 1 of 7 Patent Application Publication HOY 3401S ejeg 0p 2014199 j OL Od 8uiswoig gan uoneonueuiny Aueg pe uoneonueuiny Ayed sc i Se i pm ie10 S uoneinByuo2 pue samu V IN 301 euoug SUIS 02 uoneulolu YONN juowabeuey OMAN auiBu3 uoneanfijuo2 Jor 91015 Beg gor WajsAs pue soma VAN d CO asinag p lqeu3 sasmoig l S x GL ulojs g UOnIJESUBAL dop 8015 ejeq 20r Wa sAS 4 uogeuuoju BALES juauaBeuey ages YOL euoug p lqeu3 SWS oz i I A euiBug ES Buiss 5oiq I gt B 80r 21015 ejeq voy wajs s uoneonuayny I Ol 901490 JUSWIBRUEA 99190 i H i ES 4 4 VOL 9euoug pajqeuz dvA L 91nBi14 OP uoneunojul i j OL 921 eg uoneanueujny ULM souojisoday pue swajsAs i I Bunndwo9 Ieuosi q Patent Application Publication Figure 2 Launch application Capture Phone Number User Selects Sign Up Collect User Data Set Mobile PIN PUSH SMS sent containing security st
12. ion completes at 470 including a hangup 0037 Next FIG 6 depicts an embodiment ofthe system of the present invention where the service access is for Person to Person money transfer across a variety of channels for which different authentication rules are required Referring to FIG 6 the types of channels where MFA is not required is indi cated by a hollow star whereas channels where MFA are required are indicated by a solid star In addition the need to perform MFA using an IVR call is shown by the suspend resume process shown in the steps at the upper right of FIG 6 It will also be appreciated that IVR is available as an independent channel for performing MFA 0038 Referring to FIG 7 an embodiment of the Multi factor Authentication Configurations and Rules Engine 30 is illustrated It is understood that the MFA Configurations and Rules Engine 030 and Associated MFA Rules and Configu rations Stores 035 is composed of one or a plurality of servers and associated databases that are located and managed either by a transactional service provider or by a third party authen tication provider contracted by such transactional service provider to provide high assurance authentication services In a typical arrangement the third party authentication provider provides such MFA services to a plurality of transactional service providers The MFA Configuration and Rules Engine 030 utilizes a set of tables or data structures describing f
13. lustrates the general architecture of multi factor authentication in accordance with the present inven tion 0014 FIG 2 illustrates in logic flow diagram form an embodiment of an MFA process in accordance with the inven tion 0015 FIG 3 illustrates in logic flow diagram from an embodiment of an MFA process using WAP in accordance with the invention 0016 FIG 4 illustrates in flow diagram form an overview ofan embodiment for managing transactions involving multi factor authentication with callbacks 0017 FIG 5 illustrates in logic flow diagram form an MFA process performed at the transaction level using WAP SMS 0018 FIG 6 illustrates in a high level diagram the steps to implement MFA for various channels and platforms in accor dance with the foregoing Figures 0019 FIG 7 illustrates an embodiment of a Multi factor Authentication Configurations and Rules Engine DETAILED DESCRIPTION OF THE INVENTION 0020 Referring first to FIG 1 there is shown therein an embodiment of a multi factor authentication system identi fying the various architectural elements involved in complet ing a Multi factor authentication request User 5 accesses a Transaction System 15 through a Personal Computing Device 10 to obtain a service The Personal Computing Device can be a mobile phone capable of SMS communications or capable of browsing mobile internet pages or capable of executing applications or a personal device capable of b
14. o the device or the user the application offers the user the opportunity to sign up or register with the system The user then selects Sign Up as shown at step 110 after which appropriate user data is collected as shown at step 115 Depending upon the device and the nature of the data appro priate for the particular embodiment the user can be required to enter the user data or if the data resides in the device at an accessible location the application can capture and transmit the user data to the system Then at step 120 the user selects and enters a PIN or PassCode In an embodiment the PIN or PassCode can comprise a multi character string for example US 2010 0063935 Al six numerals or a series of hex numerals or any other string of characters understandable by the system The PIN or Pass Code is transmitted to and stored in the system typically in encrypted form and then as shown at step 125 the system transmits a push SMS message to the phone number cap tured at step 105 The SMS message typically comprises at least a security string 0026 In MIDP Mobile Information Device Profile 2 0 devices or similarly capable devices the pushed SMS wakes up the application as shown at 130 and the application then calls sends back a message or otherwise communicates the security string or other confirming indicia to the system as shown at 135 The successful exchange of communications confirms the device as sho
15. or each service the type of transaction included in the service delivery An exemplary embodiment is shown in FIG 7 as Transaction Service Table 035A together with tables or data structures an exemplary embodiment of which is the Trans action Table Types Table 035B which describe the rules associated with each transaction types Included among such rules is whether a Multi Factor Authentication needs to be performed and the sets of equivalent authentications which must be completed In an embodiment the authentication methods required are described in a set of tables or data structures such as shown by MFA Method Set Table 035C identifying the participating repository the type of authenti cation performed and the acceptable outcome of the authen tication Examples of Transaction Services that can utilize the present invention include information services such as spe cialized weather services sailing flying stock and financial market tickers sports tickers Top Up services for prepaid utilities Account to Account money transfers Person to Person money transfers and remittances Bill pay ment services and merchant account payment services Non public information transfer services such as health informa tion identity information or any services the utilization of which gives rise to a series of transaction with registered and un registered users for which the actual or potential financial Mar 11 2010 and
16. pending upon the type of transaction requested and arules engine for identifying a set of rules applicable to the requested transaction and applying the applicable rules
17. real time operation of the present system 0032 In addition the MFA process of the present inven tion can be used for viral transactions or transactions in which a recipient of funds is not otherwise registered with the system In such an arrangement the unregistered user accesses the system via any convenient channel such as the web and selects a pick up money transaction The user then enters appropriate personal information to verify identify along with information identifying where their funds should be sent such as an account at a financial institution a check mailed to their address or other disposition The system communicates to the user s device a temporary PIN and then calls the device The user enters the temporary PIN permit ting the system to complete the transaction 0033 Referring next to FIG 4 an overview of an embodi ment for managing transactions involving multi factor authentication with callbacks is illustrated in process flow form Steps indicated with a dashed line occur asynchro nously The services provided by system applications are indicated as AS while business services are indicated as BS It will be appreciated that the embodiment of the MFA call back itself can be facilitated via any number of protocols channels identities such as SMS IVR email IM etc 0034 Referring next to FIG 5 the phone confirmation IVR process can be better appreciated When the user answers the IVR call
18. referred embodiment of the invention and various alternatives those skilled in the art will recognize given the teachings herein that numerous alternatives and equivalents exist which do not depart from the invention It is therefore intended that the invention not be limited by the foregoing description but only by the appended claims We claim 1 A method for authenticating the identity of a party to a transaction being executed over wired or wireless networks using a personal device comprising the steps of receiving over a network a message to initiate one of a plurality of transactions identifying at least one indicia of the device transmitting the message identifying the type oftransaction where at least one ofthe plurality of transactions requires further authentication and at least another one of the plurality of transactions does not applying a set of rules appropriate to the transaction for transactions requiring further authentication compar ing the party s response to predetermined acceptable responses and accepting or rejecting the transaction request depending upon the outcome of the comparison 2 A system for authenticating the identity of a party to a transaction comprising atransaction engine for receiving messages requesting that a transaction be initiated and identifying the type of transaction being requested at least one repository for storing sets of rules for authen ticating a party de
19. ring PUSH SMS wakes application Device Calls Back to System System confirms device Mar 11 2010 Sheet 2 of 7 100 105 110 115 120 125 130 135 140 US 2010 0063935 A1 Patent Application Publication Mar 11 2010 Sheet 3 of 7 Figure 3 200 Access WAP enabled site n 205 User Log In i get 210 Select Transaction Type i 215 Enter Recipient Data and Transaction Amount I 220 User Receives IVR Call 225 User confirms transaction enters PIN 230 Upon PIN verification Transaction completes US 2010 0063935 A1 US 2010 0063935 A1 Mar 11 2010 Sheet 4 of 7 Patent Application Publication spunya Lo 31015 X L Id 8 qd y eunBi4 1x91u03 XL 3A31119y aunsay dzd 3 H VIAN 31epi A Nid VIN 91epi eA 1senbay VaN p p Ns Su 83o X HUI Sep did 3DIAJIS uoneoijddy Jesf US 2010 0063935 A1 Mar 11 2010 Sheet 5 of 7 Patent Application Publication i dnBueg X L sseoong liqoW ajejdwoj s uonoesuel cop our ON Om S AAA Ti Ye SS dn6uey pales S Joa 210109 sek MEA re vonoeseues ABSI ol 39Jsue1D pe jpo2ueo N NG Uondesueif V Scy 4 L N gt 708v Deeg ad 099 A SSr S A AN Sbr p d Se pr E809 Nid gt GR 9 pd A li ctm 4 oer S9A SOA l OLY P Pc joe Y
20. rowsing the internet for instance using a WiFi connection to an Internet connected access point or a regular phone used to access a automated voice response system or an operator or a Per sonal computer capable of browsing the internet executing local applications or executing widgets Transaction System 15 inquires from the Multi factor Authentication Configura tions and Rules Engine 30 the type of authentication required in order to secure the transaction 0021 The MFA Configurations and Rules Engine 30 accesses the MFA Rules and Configuration Store 35 where the information to process the authentication processed is stored FIG 7 discussed hereinafter illustrates examples if transaction services 35A transaction types 35B and method sets 35C Upon selection ofthe proper authentication require ment the Transaction System 15 interfaces with the Authen tication Processing Engine 20 to complete the authentication process The Authentication Processing Engine 020 sends authentication requests to the various Systems and Reposito ries 40A 40H which can comprise authentication information system and repositories 40 Such systems and repositories 40A 40H can include the service management system 40C of either the transaction provider and or the mobile service pro vider and or a financial services provider as well as the system 40A managing the Personal Computing Devices Mar 11 2010 deployed in the field or the system 40E managin
21. ser of a PIN personal identification number although the PIN can be any character string and not just numbers Then depend ing upon the version of J2ME supported by the handset either a push SMS or a manual SMS is sent to the handset If a push SMS a verification is managed automatically when a push SMS is not available transmission of an SMS mes sage with a verification code followed by the user s manual entry of that verification code permits completion of the MFA process 0012 Ina similar manner MFA processes using BREW WAP SMS and web based platforms are provided in accor dance with the invention In connection with payment or money transfer transactions instances in which MFA proce dures are appropriate comprise the foregoing sign up process and also various user processes including sending of funds whether user initiated or in response to a send money request from a third party loading a prepaid account login using an unregistered device i e a device different than the user s known and validated device s and a one time pickup US 2010 0063935 Al of funds In part the MFA process ensures that for appropri ate transactions for example those in which money is sent the sending user not only knows a secret such as a PIN or a Passcode but also has physical possession ofthe device such as a handset being used to initiate and confirm the transac tion THE FIGURES 0013 FIG 1 il
22. store the name and address of a person participating in a transaction or with the systems for manag ing a communications network 0009 In another embodiment the system of the present invention includes an authentication processing engine used to complete authentication rules processing to address authentication requests to the plurality of repositories used to store authentication information and to determine the result ofthe authentication process based on the conjoint or sequen tial analysis of the result of each individual authentication request 0010 Inan embodiment the system and technique of the present invention can be used to secure the registration and or activation ofa new service account the transfer of moneys or financial assets the payment of goods and services the can cellation or closure of an account the completion of a cus tomer service request such as a balance inquiry a service inquiry or a service upgrade Those skilled in the art will recognize that such multi factor authentication methods sys tem and technique can be used on a variety of transactions performed over networks and carrying a certain financial risk if the participants were not uniquely identified and authenti cated 0011 In an embodiment the techniques of the present invention are used to provide secure enrollment in a service using as one example a J2ME enabled handset In such an embodiment data is collected including input by the u
23. the use of various plat forms and personal computing device technology including J2ME BREW WAP and so on for purposes of clarity the embodiment illustrated in FIG 2 involves a J2ME platform otherwise known as Java ME or a mobile and embedded Java platform 0024 As noted above the illustrated process is for user signup from such a handset and starts at step 100 with the launching of an application resident on the handset The application can be preloaded on the handset by the manufac turer downloaded by the user or carrier or installed on the handset in any convenient manner Following launch of the application by the user at step 105 the phone number of the handset is pulled from the device to the system of the present invention such as that described in U S patent application Ser No 11 694 747 filed Mar 30 2007 entitled Mobile Person to Person Payment System or U S patent application Ser No 12 470 482 filed May 21 2009 having the same time both of which are commonly assigned and incorporated herein by reference The application can in some embodi ments require that the user enter the phone number although in other embodiments the phone number can be automatically retrieved from the device In addition in most embodiments the phone number is communicated to the system in a secure manner 0025 Following capture of the phone number which in other embodiments could alternatively be any other indicia unique t
24. wn at step 140 It will be appreci ated that other steps not important to the invention have been omitted for clarity Such steps can include for example requiring the user to accept various contractual provisions terms and conditions 0027 In other embodiments such as those implemented on MIDP 1 0 J2ME devices or similarly capable devices a manual SMS message is transmitted from the system to the device at step 125 rather than the push SMS shown in FIG 2 In such an arrangement the manual SMS comprises at least a security string which the user is then prompted to enter The security string entered by the user is transmitted to the system permitting confirmation of the device in substantially the same manner as shown in FIG 2 0028 Inanembodiment a similar process is used for login where the user s device has not been registered for example first time login from the wireless device where sign up occurred on a different channel or where there is some other reason to require authentication In an embodiment for such a process the user launches the application as shown in FIG 2 and the user selects log in instead of sign up at step 110 For MIDP 2 0 J2ME devices the process of FIG 2 proceeds substantially as shown including the use of a push SMS with a security string followed by automatic waking of the application and transmission back to the system As with signup the process for MIDP 1 0 J2ME devices
Download Pdf Manuals
Related Search
Related Contents
APOLO DC - Factorydirect INSTALLATION INSTRUCTIONS Philips Drip tray CRP117/01 Samsung MM-G35 Käyttöopas NOTE TO INSTALLER: THIS MANUAL SHOULD BE LEFT WITH Lightolier Calculite Decorative Claritas Art Glass GW User's Manual Maestro3296 Bedienungsanleitung Solo Pro 228A RTF J5 - rc-modellbau Owner`s Manual Saab 9 Copyright © All rights reserved.
Failed to retrieve file