Kim Dotcom claims to have invented two-step authentication

Mega founder says he hasn’t sued over patent filed in 1998 yet, but may do in the future.

Kim Dotcom

Kim Dotcom, founder of Mega and Mega upload, has issued a claim stating that two-factor authentication was invented by him as a means of ensuring account security in the late 1990s.

The claim refers to a patent filed in the US in April 1998 under Dotcom's original name, Kim Schmitz.

I believe in sharing knowledge and ideas for the good of society

In the abstract of the patent, which was granted in 2000, states: "The invention relates to a method and to a device for the authorisation in data transmission systems employing a transaction authorisation number (TAN) or a comparable password."

It goes on to describe a system where a user inputs their identification, such as a username and password, into their computer. That data is then transmitted to a computer at the service providers' end, which uses it to automatically generate a TAN. The TAN is sent to a second device in the possession of the user "for example a pager", with the user then being able to enter it into the original computer in order to complete the log-in process.

This, Dotcom claims, is descriptive of the process used in two-factor authentication today, although a phone is generally used to receive the code now, rather than a pager.

The 39-year-old internet entrepreneur and former hacker, who is now resident in New Zealand, said on Twitter: "Google, Facebook, Twitter, Citibank, etc. Offer two-step authentication. Massive IP infringement by US companies. My innovation. My patent.

"I never sued them. I believe in sharing knowledge and ideas for the good of society. But I might sue them now cause of what the US did to me," the latter part of the statement referring to the closing of Megaupload by the FBI and the seizing of his assets, as well as a failed extradition attempt by the US from New Zealand in 2012.

Facebook and Twitter declined to comment on the issue. Citi and Google had not responded to reqeusts for comment at the time of publication.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
Hackers publish over 4,000 files stolen from SEPA in ransomware attack
Security

Hackers publish over 4,000 files stolen from SEPA in ransomware attack

22 Jan 2021
Weekly threat roundup: SAP, Windows 10, Chrome
vulnerability

Weekly threat roundup: SAP, Windows 10, Chrome

21 Jan 2021
Biden nominees highlight tough cyber security challenges
cyber security

Biden nominees highlight tough cyber security challenges

20 Jan 2021

Most Popular

SolarWinds hackers hit Malwarebytes through Microsoft exploit
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021