Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
AUTHENTICATION DEVICE WITH PHOTOSENSITIVE INPUT KEYS
Document Type and Number:
WIPO Patent Application WO/2012/143039
Kind Code:
A1
Abstract:
An authentication device with photosensitive input keys, a photosensitive input key consisting of a key switch paired with a photosensor disposed sufficiently close to said key switch that at each keystroke the user's finger will at first obstruct and then allow light to said photosensor. By correlating contacts closure-opening with variations in the level of light reaching said photosensor, a keystroke can hence be detected in a very reliable way. The very same photosensor is also used for transferring optically encoded data to the authentication device.

More Like This:
Inventors:
GHISLANZONI LUCA (IT)
Application Number:
PCT/EP2011/056166
Publication Date:
October 26, 2012
Filing Date:
April 18, 2011
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SIGMA S R L C (IT)
GHISLANZONI LUCA (IT)
International Classes:
G06K19/073; G06Q20/00; G06K19/077; G07F7/08
Domestic Patent References:
WO2009148980A22009-12-10
WO2006138440A22006-12-28
WO2007057603A12007-05-24
WO2008107008A12008-09-12
WO2009114616A12009-09-17
Foreign References:
US20060161789A12006-07-20
US20110079646A12011-04-07
GB2407189A2005-04-20
FR2728710A11996-06-28
US20040004366W2004-02-13
US5136644A1992-08-04
Download PDF:
Claims:
CLAIMS

1. An authentication device having the shape of a credit card, and hence featuring a major front face parallel to a major back face, comprising:

a. a photosensitive input key consisting of a key switch paired with a photosensor, wherein said key switch is electrically connected in such a way that a voltage pulse is generated when a keystroke is applied to said key switch by a user of the authentication device, said voltage pulse having a start and an end, and wherein said photosensor is disposed sufficiently close to said key switch so that when the user of the authentication device applies a keystroke by pressing said key switch with a finger, or between two fingers pressing from the two opposite faces of the authentication device, said finger also covers the photosensor substantially reducing the amount of light reaching said photosensor; b. a battery for powering the authentication device;

c. a microprocessor unit, whereby said microprocessor unit is arranged so that it is at first awakened from sleep mode by the start of a keystroke's voltage pulse to then wait for the end of said keystroke's voltage pulse, after which it verifies whether a predetermined increase of the amount of light reaching the photosensor heretofore has taken place substantially at the same time as the end of said keystroke's voltage pulse, and in case of positive verification it generates a one time password, while in all cases the

microprocessor unit switches back to sleep mode within predetermined lengths of time; d. a display device for displaying the one time password heretofore.

2. The authentication device of claim 1, further comprising a real time clock, wherein the one time password generation algorithm is of a current time based type making use of the time value counted by said real time clock.

3. An authentication device having the shape of a credit card, and hence featuring a major front face parallel to a major back face, comprising:

a. a photosensitive input key consisting of a key switch paired with a photosensor, wherein said key switch is electrically connected in such a way that a voltage pulse is generated when a keystroke is applied to said key switch by a user of the authentication device, said voltage pulse having a start and an end, and wherein said photosensor is disposed sufficiently close to said key switch so that when the user of the authentication device applies a keystroke by pressing said key switch with a finger, or between two fingers pressing from the two opposite faces of the authentication device, said finger also covers the photosensor substantially reducing the amount of light reaching said photosensor; b. a battery for powering the authentication device;

c. a microprocessor unit, whereby said microprocessor unit is arranged so that it is at first awakened from sleep mode by the start of a keystroke's voltage pulse to then wait for the end of said keystroke's voltage pulse, at which moment it verifies whether an increase of the amount of light reaching the photosensor heretofore has taken place substantially at the same time as the end of said keystroke's voltage pulse, and in case of positive verification it further waits for more light modulated signals from said photosensor until it detects a valid code, and consequently it starts the process of generating a one time password when said valid code represents a challenge code, or the process of generating a transaction authorization number when said valid code represents to-be-signed data, or the process of writing to memory the user specific secret seed when said valid code represents a secret seed and the authentication device has not yet been personalised, while in all cases the microprocessor unit switches back to sleep mode within

predetermined lengths of time;

d. a display device for displaying said one time password, or said transaction authorisation number.

4. The authentication device of claim 3 wherein if said microprocessor unit detects a second keystroke while waiting for a valid code, and the authentication device has already been personalised with the user specific secret seed, then the one time password is instead generated according to an event based type of algorithm.

5. The authentication device of claim 3 further comprising a real time clock, and wherein if said microprocessor unit detects a second keystroke while waiting for a valid code, and the authentication device has already been personalised with the user specific secret seed, then the one time password is instead generated according to a time based type of algorithm making use of the time value counted by said real time clock.

6. The authentication device of claim 3, and further including one or more additional photosensors disposed in such a way that by laying the authentication device against a screen, each photosensor overlaps a different area of an image pattern shown on said screen, each of said image pattern's areas switching between a high and a low level of light intensity according to a time sequence encoding for the data to be transferred in parallel, whereby higher rates of data transfer can be achieved.

7. The authentication device of claim 6, wherein if said microprocessor unit detects a second keystroke while waiting for a valid code, and the authentication device has already been personalised with the user specific secret seed, then the one time password is instead generated according to an event based type of algorithm.

8. The authentication device of claim 6, further comprising a real time clock, and wherein if said microprocessor unit detects a second keystroke while waiting for a valid code, and the authentication device has already been personalised with the user specific secret seed, then the one time password is instead generated according to a time based type of algorithm making use of the time value counted by said real time clock.

9. The authentication device of claim 3, further including at least one more of said

photosensitive input key, whereby it now becomes easier for the user of the authentication device to transfer to the microprocessor unit, by means of keystrokes combinations, more complex requests and data.

10. The authentication device of claim 4, further including at least one more of said

photosensitive input key, whereby it now becomes easier for the user of the authentication device to transfer to the microprocessor unit, by means of keystrokes combinations, more complex requests and data.

11. The authentication device of claim 5, further including at least one more of said

photosensitive input key, whereby it now becomes easier for the user of the authentication device to transfer to the microprocessor unit, by means of keystrokes combinations, more complex requests and data.

12. The authentication device of claim 1, wherein said battery is removed and the authentication device is instead powered from the light collected by the photosensor of said photosensitive input key, said photosensor now being a photovoltaic element.

13. The authentication device of claim 3 or dependent claims 4, 6, 1, 9, 10 thereof, wherein said battery is removed and at least one of the photosensors of said photosensitive input keys is a photovoltaic element, whereby the authentication device is now powered from the light collected by said photovoltaic element.

Description:
AUTHENTICATION DEVICE WITH PHOTOSENSITIVE INPUT KEYS

Background Art

The present invention relates to authentication systems and more in particular to an authentication device capable of accepting inputs from the user, as well as of reading and decoding data displayed on a computer monitor as a time sequence of images of variable brightness (e.g. a time sequence of white and black rectangles). It combines the function of a conventional input key switch with the function of a photosensor in order to obtain a very reliable detection of switch activation, while allowing the detection of variations in incident light for the purpose of transferring data to the authentication device.

In order to grant access to secure systems, various methods and apparatuses for user's authentication are already known to the skilled in the art. Remote banking, internet shopping, Virtual Private Networks (VPNs) access, are typical services that can benefit from a secure user authentication procedure. The most widely adopted of said well-known procedures are typically based on a two factors authentication approach: after entering the User ID to start a login session, the user enter a Secret Code (the first factor) known only to the user and to the provider of the authentication service (called hereafter Authorisation Authority); the user is then asked to enter a One Time Password, OTP (the second factor), generated when the user presses a key switch available on the token, thereby starting an OTP generation process based on any of the encryption methods known in the art; after verification of consistency of both first and second factors, the server at the Authorisation Authority side finally grants access to the user.

Most of the commercially available authentication devices generate OTPs applying one of the basic methods well known to the skilled in the art:

Event Based: whereby a new OTP is generated each time the user activates a push-button. Time Based: whereby the authentication device includes a Real Time Clock capable of counting a Time Value. Various proprietary and open-source algorithms then exist to encrypt said Time Value with a secret user specific Seed value as to generate a new OTP. Said Seed is secretly stored within the authentication device, and it is known only to the Authorisation Authority.

Challenge Code Encryption: whereby the authentication device features means for entering a Challenge Code issued by the Authorisation Authority (a different Challenge Code is issued at each login session). Various proprietary and open-source algorithms then exist to encrypt said Challenge Code with a secret user specific Seed value as to generate a new OTP. Said l Seed is secretly stored within the authentication device, and it is known only to the Authorisation Authority.

Challenge Response Transaction Signature: whereby the authentication device, besides featuring one of the authentication methods heretofore, is in addition capable of digitally sign transaction data. The data referring to the transaction ( in the following generically referred to as To-Be-Signed Data) are keyed in by the user on the keypad of the authentication device, which then applies a digital signature as to generate a few digits code displayed on its display device. Notable examples are the German "Sm@rt-TAN" and "Sm@rt-TAN Optic" protocols.

In the following we will refer to the above authentication methods as "Authentication Methods Known to the Art". A recent example of a credit card size, Event Based, OTP generator device is represented by the VeriSign ® VIP Security Card. Notable examples of a commercially available solutions implementing Time Value Encryption are the authentication tokens from RSA Security (SecurlD ® token). An apparatus exploiting the Challenge Code Encryption approach is disclosed in PCT/US2004/004366 (in the following it will be referred to as Dl), "Portable Access Device", Bloomberg LP, Feb. 13, 2004, whereby, by means of photo-sensors, the token can read a challenge code issued by the service provider by decoding modulated light signals displayed on a computer monitor. A further example is described in WO 2007/057603 Al (in the following it will be referred to as D2), "Microprocessor and/or memory card provided with a display", Innovative Card Technologies, May 24, 2007, whereby a new OTP is generated each time the user authenticates itself by entering a secret code through the small keypad featured on one side of the device. Said keypad can further be used to enter a challenge code. A recent example of authentication device capable of reading modulated light signals displayed on a computer monitor is disclosed in WO 2008/107008 (in the following referred to as D3), " Authentication method and token using screen light for both communication and powering", Luca Ghislanzoni March 7, 2007 (the inventor is the same person as the inventor of this invention). A further example of authentication method capable of reading, by means of optical sensors, modulated light signals from computer monitors is disclosed in WO 2009/114616 (in the following referred to as D4), " A method and an apparatus to convert a light signal emitted by a display into digital signals", Vasco Data Security, March 11, 2009.

The earliest example of an apparatus reading modulated light signals from a computer monitor for authentication purposes is perhaps the one disclosed in US Patent 5,136,644 (in the following referred to as D5), " Portable electronic device for use in conjunction with a screen", Telecash, filed Sep. 19, 1989. Scope of the present invention

For credit card size authentication devices activated by means of key switches, a concern is the reliability of the detection of the key switch activation. Credit card format type of authentication devices are preferred by the average user, as they can simply be stored in a wallet, making it very convenient and practical to carry them around. However, while in a wallet the token can be subject to flexing and other non predictable forces exerted on its sides by various objects (coins, for example). This might in turn result in spurious activations of the authentication device, with difficult to predict impacts on its overall reliability of use. The attempt to remedy this problem usually results in key switch designs requiring more force to activate contact closure, with the disadvantage for the user of a decreased tactile feedback of positive contact closure.

The present invention addresses the problem of reliable detection of contact closure by adding suitable photo-sensor(s) implementing a logic AND operation with said contact closures: when the user presses and then releases a key, the resulting switch contact closure-opening sequence is further processed by the microprocessor only if the corresponding photosensor detects a correlated variation in light input, resulting from the user's finger first obstructing and then allowing light to said photosensor. By correlating a key's contact closure-opening sequence with variations in the associated photosensor light input, a key activation can now be detected in a very reliable way. Spurious random switch closures taking place while the authentication device is stored in a wallet, and hence in darkness, now will not result in any spurious key activation, as there will not be any concurrent variation in light input. A further benefit resulting from the availability of photo-sensitive elements is that the latter can in addition be used to input data to the authentication device in the form of modulated light signals generated by a computer monitor, or mobile phone display, and the like.

Detailed Description

The following description will refer to input key switches, which are used for activating the authentication token, and-or to input data to it. The authentication token actually reacts to keystrokes, by that meaning the change of status of the key switch before going back to its normal status. From an electrical point of view a keystroke correspond to a voltage pulse, characterized by a start (e.g.: the voltage variation resulting from the closing of normally open contacts, or the opening of normally closed contacts) and an end (e.g.: the voltage variation resulting from the reopening of normally open contacts, or the reclosing of normally closed contacts). Various types of suitable key switches are known to the skilled in the art: • contacts closure based button and dome key switches, whereby the keystroke is defined as the pressing of the key switch, followed by its release ;

• piezoelectric, whereby the keystroke is defined by the voltage pulse generated when the user's finger first applies and then removes mechanical stress to a suitably mounted piezoelectric element;

• capacitive, whereby the keystroke is defined by the voltage pulse resulting from variation of the capacitance of a sensing element as a result of the user's finger first approaching and then withdrawing.

Based on the above considerations, in the following we will refer to the start of a keystroke as the start of the corresponding voltage pulse, and to the end of a keystroke as the end of the corresponding voltage pulse. The particular choice of switch technology being irrelevant to the scope of the present invention, we will use the term keystroke to implicitly refer to a keystroke generated by any of the different types of key switches listed above

Referring then to the photosensor, it may be selected from any of the common types known to the skilled in the art:

• photodiodes;

• phototransistors;

• photoresistors;

• photovoltaic cells.

FIG. 1A illustrates the preferred embodiment for a basic version. All components are of a sufficiently small size as to allow embedding into a card of standard ISO 7816 dimensions.

When pressed by the user, the input key switch 1 activates the authentication device. A photosensor 2 is located sufficiently close to said key, so that when the user places his finger to press the key, the finger will concurrently block light to the photosensor.

Photosensor 2 may also be located on the back face of the card, as a suitable and ergonomic way to activate key switch 1 consists in holding the card with one hand, while pressing said key switch between the thumb and the index finger of the other hand. In fact, most users would hold the card with the left hand while facing the display on the front face, and then press the key between the right hand thumb pushing from the front face and the right hand index pushing from the back face. Upon detection of an input keystroke, a Microprocessor Unit, MPU, embedded in the card, generates a One Time Password and displays it on the display device 3 (suitable thin and flexible segmented displays are manufactured for example by the E-Ink corporation, www.eink.com). A very convenient embodiment would then add to the just described authentication device also all those other features characterising conventional credit cards and ATM cards, such as:

• embossed personalization data fields 4, consisting in card number, validity dates, Card Holder Name (as the embossing process may damage electronic components, the geometry of the embedded electronic circuitry of the authentication device is designed in such a way that no electronic components will be located in correspondence of the fields 4 reserved for the embossing of personalization data);

• an area 5 reserved for the security hologram present in most credit cards;

• a chip module 6, for adding smart card functionalities.

Said chip module is in fact a small circuit on whose back side it is mounted a specialised tamper- resistant microprocessor chip, called smart card chip, which is then electrically connected to the contacts on the front side, contacts whose layout and functions are defined by ISO/IEC 7816 standard. Said chip module is then glued inside of a cavity milled on the front face of the card. For authentication devices featuring on their front face a chip module with smart card functionalities it is a simple task to add the possibility for the authentication device's MPU to exchange serial data, through the ISO/IEC 7816's specified T=0 or T=l protocols, with said chip module. In this way it becomes possible to transfer to the authentication device MPU's memory useful data such as account balance, list of transactions, and the like, so that the user may then decide to review them on the display device 3. Furthermore, a chip module represents a convenient place, from a manufacturing point of view, where to locate input key 1 and photosensor 2.

FIG. IB schematically represents an example of suitable circuitry for the hardware implementation of the authentication device. A thin and flexible battery (for example, of the type of those manufactured by SOLICORE, www.solicore.com) supplies a MPU. To minimise power consumption, the MPU is held in SLEEP mode. When the user presses the input key switch 1, its contacts closure brings to OV the voltage at the MPU input pin IOi. This event awakes the MPU from SLEEP, which immediately sets to logic HIGH output pin I0 2 , thereby biasing phototransistor 2 (while in SLEEP mode, pin I0 2 is set to logic LOW, so as to minimise overall current consumption). If no light is concurrently falling on phototransistor 2 (because of the user's finger blocking light), the voltage at input IO 3 will therefore also be logic HIGH. Upon the release of the input key switch the voltage at input IOi rises back to V DD (through the pull-up resistor Ri ), prompting the MPU to verify whether the voltage at input IO 3 has in the meantime fallen to logic LOW, as a result of light now being allowed to reach phototransistor 2 following the removal of the user's finger. For the skilled in the art it will then be obvious how to realise equivalent configurations using pull-down resistors, rather than pull-up resistors, or vice versa. Upon successful verification of the sequence of events heretofore, the MPU will hence start the OTP generation algorithm, to then display the generated OTP on the display device 3. After displaying said OTP the MPU will finally switch back to SLEEP mode. In order to spare battery energy, the MPU will switch back to SLEEP mode also in the case of a keystroke not validated by a corresponding increase, at the end of said keystroke, of the amount of light reaching the photosensor, as well as in the case of a keystroke lasting longer than a predetermined length of time, as these types of events would probably be the result of unwanted contacts closures.

To summarize, the MPU will start the OTP generation algorithm if:

a. it was first awakened from SLEEP mode by the start of a keystroke's voltage pulse at one of its inputs;

b. AND it has then detected, simultaneously with the end of said keystroke's voltage pulse, an increase of the amount of light reaching photosensor 2.

FIG. 1C illustrates an alternative way to connect phototransistor 2, and whose main advantage is to require just one input/output pin instead of two, albeit at the cost of one added capacitor C. Following wake up from SLEEP the MPU configures pin I0 2 as output, and sets it to logic HIGH. As no light is falling on phototransistor 2, which is covered by the user's finger pressing on the activation key, capacitor C is consequently allowed to charge up to a voltage above the threshold for logic HIGH (most MPUs feature Schmitt trigger inputs), and this during a time shorter than the typical keystroke's voltage pulse duration. As soon as the contacts of switch 1 open again, and the end of the keystroke's voltage pulse is consequently detected, the MPU configures pin I0 2 back to input, while C is still charged to logic HIGH. As light is now allowed back to phototransistor 2 (which is no longer covered by the user's finger), capacitor C discharges towards zero, and a transition HIGH to LOW can be detected at input pin I0 2 .

FIG. ID illustrates yet another configuration, and which allows to reduce to just one the number of required input/output pins. While the MPU is in SLEEP mode its IOi pin is configured as input, and the pull-down resistor Ri makes sure that said IOi input sees a LOW logic level when the user's finger already obstructs light to phototransistor 2 before the actual contacts closure of switch 1 (in fact, if the worst case dark current of phototransistor 2 were sufficiently large, then Ri would not be necessary). When the user presses the input key switch 1, its contacts closure brings to logic HIGH the voltage at the MPU input pin IOi. This LOW to HIGH transition awakes the MPU from SLEEP. As no light is falling on phototransistor 2, which is covered by the user's finger pressing on the activation key, capacitor C is allowed to charge up to a voltage above the threshold for logic HIGH, and this during a time shorter than the typical keystroke's voltage pulse duration. As soon as the contacts of switch 1 open again, light is allowed back to phototransistor 2 (no longer covered by the user's finger), capacitor C quickly discharges towards zero, and a transition HIGH to LOW can be detected at input pin I0 2 . In case of spurious switch activation while inside a wallet, at the keystroke end no light will fall on phototransistor 2, so that said HIGH to LOW transition will now be delayed by a time interval proportional to the product Ri C (or proportionally to the value of the phototransistor dark current discharging C ). By selecting said delay to last longer than a typical keystroke duration it hence becomes possible to discriminate between valid keystrokes and spurious keystrokes.

For the skilled in the art it will then be obvious how to realise equivalent configurations using pull-down resistors, rather than pull-up resistors, or vice versa.

FIG. IE illustrates the use of photovoltaic cells for photosensor 2. The current source represents the photovoltaic cells current, which is the parameter most sensitive to the amount of illumination. Shunt resistor Ri converts said current to a voltage, then read by the MPU's input pin I0 2 . In this case the presence of light will correspond to a logic HIGH voltage level (as individual photovoltaic cells typically provide only up to 0.5V-0.6V, it may turn out necessary to serially connect more cells).

FIG. 2A illustrates a second preferred embodiment, whereby photosensor 2 is a photovoltaic element whose generated energy is sufficient to cover the overall energy demand of the authentication token. Said photovoltaic element is actually a string of photovoltaic cells, serially connected in sufficient number (typically from 4 to 6 cells are sufficient) as to obtain a voltage level suitable for the operation of the MPU. Photosensor 2 is represented with a dashed outline, to mean that it is mounted on the back face of the card. As shown in the block diagram of FIG. 2B, when exposed to light the photovoltaic element charges a capacitor Cb through a diode D. When the user presses the key switch, the finger pressing from the back face will obstruct light to said photovoltaic element. As a result of this action the generated current drops significantly, and to such a low value that the voltage across the shunt resistor Rs is read as a logic LOW by the MPU's I0 2 input. Capacitor Cb is sized to hold an amount of charge sufficient to ensure correct operation of the token until the end of the keystroke, when light will again illuminate the photovoltaic element. In a variation of said second preferred embodiment, the voltage across shunt resistor Rs is no longer directly read by the MPU's I0 2 input, but it is first processed by a Threshold Detector circuitry, for example of the type known to the skilled in the art as comparator circuits. Such a circuit allows more flexibility in the choice of the threshold voltage value below which the logic level asserted to the MPU's I0 2 input is switched to its complement state. In turn, this allows to increase the sensitivity of the detection of a black rectangle following a white rectangle, which in practice means that the user is now allowed to hold the authentication token at a larger distance from the screen, and hence increasing the tolerance with respect to unwanted movements of the user's hand holding the authentication device.

In addition to improving the reliability of keystrokes detection, the very same photosensor can then be exploited also for receiving data encoded in light modulated signals generated by suitable sources as to obtain at least two levels: a HIGH level of illumination, and a LOW level of illumination. In such case, said photosensor is mounted facing the back side, as to receive light from the back side of the authentication device. For the configuration of FIG. IB the discrimination between said HIGH and LOW levels of illumination could be achieved by holding HIGH output pin I0 2 , while monitoring voltage level variations at input pin IO 3 . For the configurations of FIG. 1C and FIG. ID the status of the corresponding input-output pin (I0 2 when referring to FIG. 1C, IOi when referring to FIG. ID) is periodically sampled by first setting it as output, writing to it a HIGH logic level, waiting until capacitor C is fully charged to logic level HIGH, and then setting said IO pin as input. When a HIGH level of illumination reaches phototransistor 2, the voltage at said MPU's input will quickly drop from logic level HIGH to logic level LOW, whereas a LOW level of illumination will result in a significantly postponed HIGH to LOW transition at said IO pin.

Then, a practical procedure is the following:

• the authentication device is activated by the detection of a keystroke, further validated by an increase of illumination on photosensor 2 at said keystroke's end, exactly as already explained above;

• once activated, instead of immediately generating an OTP the authentication device now enters a state in which it waits for further variations in the illumination of photosensor 2 ;

• as illustrated in FIG. 2D, the authentication device shall now be laid against image 7, which will for example be shown on a computer screen, said image containing a time sequence of white rectangles suitably interleaved with black rectangles, sequence whose detailed structure encodes for a Challenge Code (typically 20 bits long, and continuously repeated until an OTP is entered by the user);

• upon detecting said Challenge Code, the MPU generates the corresponding OTP, and displays it on the display device 3;

• to spare battery energy, if a valid Challenge Code is not detected within a predetermined length of time the MPU will switch back to SLEEP mode.

A particularly useful embodiment adds to the authentication device a Real Time Clock, so that a Time based OTP can be generated even for those transactions where a screen capable of displaying the time sequence of black and white rectangles heretofore is not available (e.g.: transactions over the phone). In such case, after detecting a first keystroke the authentication device enters the state in which it waits for further variations in the illumination of photosensor 2, but if a second keystroke is detected then the one time password is instead generated according to a Time based type of algorithm making use of the time value counted by the Real Time Clock heretofore.

The capability to detect optically encoded data can be exploited at the personalization stage, whereby the secret user specific Seed needs to be securely transferred to the authentication device. A further useful application consists in exploiting said optical data transfer capability for sending To-Be-Signed Data to the authentication device, and so allowing to implement strategies very effective against attacks of the kind known to the skilled in the art as "man-in-the-middle" or "man-in-the-browser" attacks. In such cases, a typical transaction session would follow the few basic steps of the following example:

• a user wishes to order a bank transfer through a remote banking service;

• after successfully logging in to the required service, the user enters the amount to be transferred and the account number of the recipient;

• a sequence of white and black rectangles is then displayed on the corresponding web page, sequence which encodes for the most significant digits of the amount to be transferred (the number of most significant digits may vary according to type of currency, type of encryption method, etc.) grouping them with digits extracted from the recipient's account number, said group of digits representing the above mentioned To-Be-Signed Data, and further appending a Transaction Code (alternatively, said Transaction Code may simply consist in a counter value stored locally in the authentication device's MPU, and updated at each transaction, or in a time value generated by a real time clock added to the authentication device);

• by applying a keystroke to the input key, the user activates the authentication device, and then lays it against said encoding image to read said To-Be-Signed Data and appended Transaction Code;

• after successfully reading said data, the MPU displays on the authentication device's display the most significant digits of the amount to be transferred, as well as the digits extracted from the recipient's account number;

• verified that the digits shown on the authentication device's display correctly correspond to the requested transfer amount and recipient's account number, the user confirms them with a keystroke applied to the authentication device's input key; • the MPU will then encrypt, with the user specific Seed, said To-Be-Signed Data and appended Transaction Code, to finally generate and display a One Time Password (or more precisely, a Transaction Authorisation Number, TAN), which the user will then need to enter for authorising the requested bank transfer.

Concerning the coding scheme and structure of the set of optically encoded data, no particular choice is detailed in this patent, as anyone skilled in the art can figure out several suitable solutions, and it would hence be too restrictive to bind the scope of this patent to a particular choice. It is therefore simply recalled that a typical approach would consist in inserting an identifier for the type of data (e.g.: Challenge Code, or Balance, or Seed, or To-Be-Signed Data, etc.), followed by the actual data, and ending with a verification code, such as for example any of the various types of Cyclic Redundancy Check (CRC) error detecting codes known to the skilled in the art. When the received data has passed the error detecting verification it is then said to be valid (e.g.: valid Challenge Code, or valid Balance, or valid Seed, or To-Be-Signed Data, etc.). Additional embodiments of the invention would adopt a plurality of photosensors, each disposed in such a way as to face dedicated portions of the screen, each of said portions displaying a time sequence of white rectangles suitably interleaved with black rectangles, with the aim to simultaneously encode more bits, and-or a clock signal, by any of the numerous encoding methods that the skilled in the art can easily imagine. Examples are shown in:

• FIG. 3A, whereby a second photosensor 2 is added for reading the time sequence encoded by image 8. The authentication device features an alignment mark 9, which the user shall align with the boundary between image 7 and image 8.

• FIG. 3B, whereby three photosensors 2 are added for reading the time sequences encoded by the three additional images. The authentication device now features two alignment mark 9, which the user shall align with the image boundaries as shown.

• FIG. 3C, whereby four photosensors 2 are added for reading the time sequences encoded by the four additional images (the dashed lines identify their boundaries, which are hidden by the card). The authentication device now features two alignment mark 9, which the user shall align with the image boundaries as shown.

All of the image patterns depicted in FIG. 2D, FIG. 3A, and FIG. 3B, feature the property that no rescaling is required when shown on computer screens of different sizes. When displayed on the smallest computer screen foreseen, it is sufficient that the dimensions of said patterns be such that the photosensors 2 will overlap the corresponding images (when the marks 9 are properly aligned with the corresponding image boundaries). Displaying then the same image patterns on larger computer screens will automatically ensure that said photosensors will still overlap the corresponding images, regardless of their now increased size. This useful property does not apply to the pattern depicted in FIG. 3C, but which is anyway designed to cover, without needing to rescale, most part of the range of commonly available sizes of computer screens. FIG. 4A depicts one more embodiment, whereby five more photosensitive input keys are added. In this way it is now possible, for the user, to manually enter a secret code before gaining access to the functionalities of the authentication token. Said input keys can also be used to enter a Challenge Code, and/or or To-Be-Signed Data, during so called Card Not Present transactions (e.g.: purchases over the phone) and when a screen capable of displaying the time sequence of black and white rectangles heretofore is not available. The five keys shown in FIG. 4A are used for entering the numbers from 0 to 9, according to the following procedure:

• for entering the first number displayed on a key (0, for example) it is sufficient to apply a single keystroke. When, at the end of said single keystroke, light is detected by the key's photosensor (i.e.: the users removes his finger), then the MPU will accept said first number.

• For entering the second number displayed on the key (1, for example) it is then necessary, within a predetermined length of time, to apply a second keystroke. When, at the end of said second keystroke, light is detected by the key's photosensor (i.e.: the users removes his finger), then the MPU will accept said second number instead of the first one.

Naturally, when said input key's photosensors are mounted on the back face of the authentication device they can also be used for reading optically encoded data from a computer screen, and exactly in the same way as explained above for the case of a single input key. FIG. 4B depicts an example of suitable image pattern, whereby each of the five rectangles is meant to represents a time sequence of white and black rectangle. A disadvantage of the image pattern of FIG. 4B is that it requires rescaling when shown on computer screens of differing sizes, so that the client application would need to provide means for the user to rescale said image pattern until the alignment marks on the authentication device are correctly aligned with the image pattern boundaries. The image pattern of FIG. 4C does not instead require rescaling, provided that the user takes care of properly aligning with the image boundaries the alignment marks 9.