US20020032860A1 - Account authority digital signature - Google Patents

Account authority digital signature Download PDF

Info

Publication number
US20020032860A1
US20020032860A1 US09/860,083 US86008301A US2002032860A1 US 20020032860 A1 US20020032860 A1 US 20020032860A1 US 86008301 A US86008301 A US 86008301A US 2002032860 A1 US2002032860 A1 US 2002032860A1
Authority
US
United States
Prior art keywords
sender
message
information
electronic message
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/860,083
Other versions
US20020112160A2 (en
US8620814B2 (en
Inventor
Anne Wheeler
Lynn Wheeler
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US09/860,083 priority Critical patent/US8620814B2/en
Publication of US20020032860A1 publication Critical patent/US20020032860A1/en
Publication of US20020112160A2 publication Critical patent/US20020112160A2/en
Application granted granted Critical
Publication of US8620814B2 publication Critical patent/US8620814B2/en
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • the field of the invention relates to digital signatures, and particularly, using digital signatures to reliably identify a sender and the accuracy of an electronic message without using certification authorities.
  • Institutions and persons desiring to utilize electronic commerce are faced with several issues regarding electronic transactions.
  • the first issue is whether the person requesting the transaction is who they say they are (“identification”).
  • the second issue is whether the requested transaction is actually the transaction intended to be requested (“accuracy”). In other words, whether the requested transaction has been compromised, either fraudulently or through transmission errors, during the course of transmitting and receiving the request.
  • Digital signatures are used with electronic messages and provide a way for the sender of the message to electronically “sign” the message as a way of providing proof of the identity of the sender and the accuracy of the message.
  • a sender digitally “signs” the message using a private key (encryption software used to create a digital signature).
  • the receiver validates the senders digital signature by using the sender's public key (software used to decrypt the digital signature) sent to the receiver by the sender.
  • certification authorities used in the CADS system come with the inherent risk, such a expired certification authority and compromised private keys which affect the entire public key infrastructure.
  • the increased reliability provided by certification authorities do not easily combine with the business process currently established.
  • the present invention meets the needs described above by providing a method of reliably identifying the sender of an electronic message and determining the accuracy of an electronic message while utilizing the current standard business processes.
  • the current financial infrastructure can extend existing business processes to support high integrity electronic commerce by implementing the present invention.
  • One embodiment of the present invention can be implemented as the Account Authority Digital Signature (AADS) system.
  • AADS Account Authority Digital Signature
  • the AADS system uses digital signatures along with validation procedures that can be implemented within current institutional business processes to identify a sender of an electronic message and determine the accuracy of the electronic message being sent.
  • the present invention simplifies its implementation by leveraging existing account infrastructures and by operating within existing business processes.
  • the present invention utilizes electronic signatures in the business process for increased reliability.
  • the present invention does not rely on third parties (i.e., certification authorities) for authorization, thereby avoiding any security risks or other systemic risks associated with the third parties.
  • no new databases need to be developed to implement the present invention.
  • the identity of a sender of an electronic message is validated by using sender validation information along with other sender identity information stored at an institution's or person's computer system and applying the sender validation information to the encoding information received by the computer system.
  • the sender validation information may be the sender's public key in a digital signature system.
  • the present invention utilizes the accuracy of electronic encoding, e.g., digital signatures, and provides a method to incorporate them into the current business processes.
  • An institution records an encoding key and associates it with account information from the sender. This initial recording may be performed using any of the validation procedures utilized today by a business institution, for example, when the sender is opening an account and must show proof of identity.
  • validating future electronic transactions occur by including encoding information that can be deciphered using the valid encoding key initially stored.
  • the sender sends the electronic transaction message, the encoding information and sender identity information to the person or institution from which the sender desires validation. Having received this information, the computer system automatically retrieves the encoding information stored in the computer system that is associated with the sender identity information. The computer system then validates the electronic transaction message by applying the retrieved encoding key to the encoding information and analyzes the electronic transaction message to validate the identity of the sender and the accuracy of the message.
  • This validation may be performed in a digital signature system by applying a hashing algorithm to the electronic message and comparing the results to the results of applying the public key to the digital signature received.
  • the encoding information may be entered into a terminal via of a smart card or via another computer system.
  • the encoding information, electronic message and sender identity information may be sent to the computer system performing the validation via a closed network or via an open network, such as the Internet.
  • FIG. 1 is a block diagram depicting an exemplary debit card system as it exists in the prior art.
  • FIG. 2 is a block diagram depicting the Certification Authority Digital Signature (CADS) system as it exists in the prior art.
  • CUA Certification Authority Digital Signature
  • FIG. 3 is a block diagram depicting the digital signature process.
  • FIG. 4 is a block diagram depicting the effect of a security breach in the existing debit card system.
  • FIG. 5 is a block diagram depicting the effect of a security breach in the existing CADS system.
  • FIG. 6 is a block diagram of an exemplary computing environment in an embodiment of the present invention.
  • FIG. 7 is a block diagram of the components of an embodiment of the present invention.
  • FIG. 8 is a block diagram depicting an embodiment of the present invention as it is implemented using a financial institution, a merchant and a customer.
  • FIG. 9 is a flowchart depicting the steps performed in implementing an embodiment of the present invention.
  • the present invention provides a method for reliably identifying the sender of an electronic method and determining the accuracy of an electronic message while utilizing current standard business processes.
  • the conventional debit card system is one example.
  • the debit card system attempts to identify the sender of the electronic message (e.g., the message of “Withdraw $200 from my account”) while working in the current business processes. In other words, it utilizes a PIN as merely another validation mechanism.
  • the debit card system does not verify the accuracy of the message.
  • the debit card system is not utilized on an open network, such as the Internet, thereby limiting it's access to electronic commerce.
  • the Certification Authority Digital Signature (CADS) system is another example of a system used to implement electronic commerce.
  • the CADS system provides message accuracy and may be used in open networks, such as the Internet.
  • CADS also has inherent systemic risks and requires reliance on third parties to “authorize” the digital signature of the sender of the electronic message.
  • the CADS system is difficult to implement using standard business processes utilized today.
  • FIG. 1 is a block diagram depicting a conventional debit card system as it exists in the prior art.
  • a customer enters account information and a personal identification number (PIN) into a terminal 100 .
  • the account information is generally stored on magnetic tape attached to a card that is given to the customer so that the customer may enter it into the terminal 100 .
  • the terminal Upon entering the account information and the PIN, the terminal then formats this data and sends it across a closed network 105 to the main computer 110 that validates the PIN with an associated account that has been entered by the customer.
  • the PIN was stored in a field along with other account information in the main computer previously.
  • the PIN is typically associated with the customer when the account is established but generally not through the network 105 .
  • Normal procedures provide for the customer to validate their identity when the account is opened or prior to associating a PIN to the customer's account. This would verify to the institution that the person establishing the account is who they claim to be and increases the reliability that the when the PIN is used, the customer assigned the PIN is the one using it.
  • the main computer 110 Upon validating the PIN with the associated account, the main computer 110 then accepts or rejects the PIN and sends the results back through the network 105 .
  • the terminal having received the acceptance or rejection, then either continues to process the customer's transaction or denies customer access to the account.
  • the PIN used in the debit card system is the same for all transactions. In other words, no matter what transaction the customer wishes to initiate with the main computer, i.e., regardless what message is sent to the main computer by way of the terminal, the PIN stays exactly the same.
  • the terminal 100 used in the debit card system is a basic terminal that is used to format the entered information to send to the main computer 110 .
  • the terminal 100 may perform some function such as dispensing cash or other functions specific to the account.
  • the terminal 100 is generally a dumb terminal only used to facilitate the customer's interaction with the main computer 110 (i.e., the terminal is not typically used for purposes other then to interact with financial institutions).
  • the terminal 100 communicates with the main computer 110 by network 105 .
  • the network 105 used in the debit card system is typically a closed network that is set up specifically for use between the terminal 10 and main computer 110 . While it is possible that others may break into the network, generally, the network 105 is not used for other traffic other than messages sent between the terminal 100 and main computer 110 .
  • the main computer 110 used in the debit card system is generally housed at the institution containing the account and contains all the records for the institution relative to the account and the PIN.
  • the account is initially set up, all information required to process this transaction as well as potentially other transactions within the institution is validated. For security reasons, the required information was validated in either face-to-face or in some other manner that can validate the customer's identity. Consequently, there is a direct validation of the account to the customer when the account is established.
  • the business processes set up in many financial institutions today follow this model. These processes include manuals, computer databases and records, held desks and personnel training.
  • FIG. 2 is a block diagram depicting the known Certification Authority Digital Signature (CADS) system as it exists in the prior art.
  • the CADS system relies on the digital signatures and traditional public key infrastructure regarding issuing certificates that are signed by a certification authority. (see FIG. 3 regarding a description of digital signatures and their usage).
  • a certification authority attests to the validity of the public key and sometimes, depending on the authority, checks the validity of the private key and the identity information of the entity that the certificate is issued to.
  • the sender then sends the certificate, which is a digital signature incorporating the sender's digital signature, issued by the certification authority, the message, and the sender's public key to the receiving party.
  • the intent is that the receiving party will trust the certification authority's verification and also will be able to validate the certification authority's digital signature and the sender's message using the contents of the information sent by the sender and a public key of the certification authority.
  • the sender 201 creates a digital signature using the sender's message 225 .
  • a certification authority Prior to sending the message to the receiver 242 , it is preferable to validate the sender's message and therefore the sender submits it to a certification authority. The intent of the certification authority is to confirm that the identified sender is sending the message.
  • the sender then has the digital signature “authorized” by a Certification Authority 1 (CAl) 205 .
  • the CA 1 has, in advance, identified the public key associated with the sender. Therefore, the CA 1 205 checks the current digital signature with the sender to ensure that it is the same as what was established previously.
  • An example of a certification authority includes certifying the identity of specific banks. However, as there are no rules or laws regarding who is a certification authority and who is not, in some instances, the receiver may not “trust” the certification authority. The receiver might be a large scale institution that does not trust a certification authority that deals with just a few customers or small institutions. Specifically, the receiver may not trust that the security is as high as it expects from the certification authority. Therefore, the receiver would require a higher level certification authority. In cases like this, the first certification authority also needs to be authorized. This is depicted in FIG. 2 by CA 1 sending its digital signature to certification authority 2 (CA 2 ) 210 .
  • CA 2 is, in essence, an authority that confirms the identity of other first “level” certification authorities. In the example provided, CA 2 may confirm the identity of a financial institution versus just a bank as in CA 1 .
  • This additional certification authority may still not rise to the level of security required by the receiver so yet another certification authority may be necessary.
  • CA 2 210 creating a digital signature using CA 1 's 205 digital signature and sending CA 2 's digital signature on to CA 3 215 .
  • CA 3 215 could be just another higher level certification authority that checks all institutions. And as is apparent, this hierarchy of certification authorities could continue ad infinitum. However, at some point, the sender and receiver are satisfied with the level of certification authorities and, in FIG. 2, ends with CA 3 215 .
  • CA 3 's digital signature is created and used by the sender.
  • the sender 201 then attaches CA 3 's digital signature 235 to the sender's message 225 along with the sender's public key 230 into a complete message block depicted by 220 .
  • the space required for the digital signature may be significant in relation to the message.
  • the classic electronic transaction message comprises 80 bytes and the sender's digital signature comprises 60 bytes. However, for each certification, it requires another 2,000 bytes.
  • the size of the message the sender is sending over the network 240 is increased substantially by using certification authorities.
  • the sender then having combined the message, the public key and CA 3 's digital signature, sends this complete packet over the network 240 to the receiver 242 .
  • the receiver now has to validate the sender's message to ensure that the authentic sender is sending the message and not a third party using the sender's identity. Having received the complete packet 220 , the receiver 242 then begins applying public keys to the digital signatures received in the packet. Typically, the receiver will already have the public key of the final certification authority used by the sender. In cases where it is not clear, the sender must also send the public key to the receiver of the final certification authority.
  • CA 3 was the final certification authority
  • the receiver then applies CA 3 's public key to CA 3 's digital signature 235 that was received in the packet 220 .
  • Applying CA 3 's public key to the CA 3 's digital signature creates CA 2 's digital signature in addition to providing CA 2 's public key (not shown).
  • CA 2 's digital signature 245 and CA 2 's public key the receiver applies CA 2 's public key to CA 2 's digital signature 250 to create CA 1 's digital signature 250 and CA 1 's public key (not shown).
  • the receiver then must apply CA 1 's public key to CA 1 's digital signature to create the initial sender's digital signature 255 .
  • the receiver then validates the message.
  • the receiver does this by using the sender's message 225 , the sender's public key 230 that had been sent in the initial packet 220 , as well as the sender's digital signature 255 that was created from this process of certification authority validation just described.
  • the receiver uses all these components to then validate the sender's digital signature 240 .
  • the receiver may send back the results of the validation, or if the validation was successful, act on the message sent.
  • FIG. 3 depicts how a message is validated using the digital signature process.
  • the sender creates a message 300 and applies a hashing algorithm to the message 300 to create a modified message 305 .
  • the modified message typically is a much smaller version of the actual message itself.
  • the modified message 305 that is created using the hashing algorithm and the sender's message 300 is not only smaller, but is also unique to the message. In other words, as the message changes, the modified message will also change after applying the hashing algorithm. The modified message is then encrypted with the sender's private key.
  • the process of using a digital signature generally requires a private and a public key. These keys are typically obtained from software houses and developers that create encryption programs.
  • the private key is used by the sender and only by the sender. To maintain the security, as the name implies, the private key is intended to be kept private to the sender and not for public dissemination. This is the only time in the process, i.e., applying the private key to the modified message 305 to create the digital signature 310 , where the private key is used.
  • the creation of the sender's digital signature described above in FIG. 3 can be performed at the sender's local computer, or in some cases, on a smart card.
  • the use of smart cards are well know to those skilled in the art.
  • the end result of the sender's process is that the sender has created a digital signature. And as stated, this digital signature is message specific, i.e., if any letter or any component of the message was changed, this digital signature would also change.
  • the digital signature is also specific to the individual sender, i.e., the private key encryption method is only for that sender.
  • the sender then sends the sender's message with a public key, if the receiver does not already have one, and the digital signature to a receiver (this “sending” process is not shown).
  • the receiver then takes the sender's message 300 and applies the same hashing algorithm described above for the sender to create the modified message 305 . Ideally, this should be the same modified message.
  • the only case where the sender's and receiver's modified message is different is if the message was corrupted either by the sender after having applied the digital signature to it, by transmission errors or someone fraudulently intercepting the message and attempting to change its contents.
  • the receiver then takes the sender's digital signature and applies the sender's public key to the digital signature.
  • the public key is available for public use by the sender without losing any security of the sender's private key.
  • the receiver then applies the public key to create the decrypted digital signature 315 .
  • the decrypted digital signature and the modified message 305 are then compared by the receiver. If they both match up and are identical, then the receiver knows that the message was encrypted with a sender's private key and was the same message that has been received. However, because it is not known for sure whether the sender's private key has been corrupted (e.g., stolen), the receiver is still not absolutely sure that the sender identified in the message actually is the one who sent it.
  • FIG. 4 is a block diagram depicting the effect of a security breach (e.g., someone stealing someone's PIN and account info.) in the existing debit card system.
  • a security breach e.g., someone stealing someone's PIN and account info.
  • the fraudulent customer enters account information and a PIN to a terminal 400 and requests a transaction.
  • the same PIN is used for all transactions and the PIN typically is a easily remembered non-complex set of numbers and/or letters that can be entered by the customer.
  • the PIN Once the PIN has been corrupted for a one message, that same PIN can be used for other messages that the fraudulent customer wishes to send.
  • the terminal 400 having received the account information and PIN from the fraudulent customer then, as expected, sends this fraudulent information on to the main computer 410 through the network 405 .
  • the main computer 410 is not checking the message against the PIN. It merely receives the PIN and checks it against the account that has been stored already in the main computer 410 . If the fraudulent customer has done his job and has stolen the correct PIN, then the transaction will be validated and the acceptance will be passed on and the fraudulent customer will have access to some else's account.
  • Another area of concern is when a third party steals the customer's PIN by tapping into the network 405 . Since no encoding or encrypting is performed on the PIN, and since the same PIN is used for all messages, once someone who has tapped into the network to obtain this information, they are not required to perform any decryption on the message and can receive the PIN from the network. Once they have access to this PIN, they can then get into the customer's account and send any messages such as checking the account balance and withdrawing funds from an account. Having one PIN for all messages facilitates this type of security breach.
  • FIG. 5 depicts the effect of a security breach, i.e., the stealing of a certification authority's private key by a third party, in the existing CADS system.
  • a security breach i.e., the stealing of a certification authority's private key by a third party
  • all messages certified by that authority is suspect because the third party, not the certification authority, may generate false messages which appear to authorized by the certification authority.
  • an authentic sender is not attempting to send a message 500 , and in this example, CA 1 has not applied any digital signature because there is no message. But what has occurred is that there has been a security breach in the CA 2 .
  • CA 2 's private key has been stolen.
  • the effect of having the CA 2 's private key stolen is that it can then mask as any of the CA 1 's or senders relying on CA 2 for certification even though they are not attempting to send a message.
  • a corrupted CA 2 private key allows the creation of fictitious CA 1 's or senders that do not exist, yet will appear valid because they are certified by CA 2 . So, if a certification authority can validate that a specific merchant is requesting a transaction when that merchant is indeed not requesting a transaction, this facilitates the fraudulent use of the electronic commerce system.
  • a fraudulent message 510 is created using a fraudulent public key and the fraudulent private key compromised from CA 2 .
  • a digital signature is created using this information and using CA 2 's compromised private key is sent to CA 3 for validation. Because the private key has been compromised, these messages and the digital signature is validated by CA 3 and, consequently, the digital signature and fraudulent information is sent on to the receiver 536 .
  • the receiver then receives the fraudulent message 510 , the fraudulent public key 515 , and the fraudulent digital signature 520 that was created by the compromised CA 2 .
  • the receiver then runs through the process as described in FIG. 2 to validate the certification authority.
  • the receiver applies CA 3 's public key, which is valid, and creates CA 2 's digital signature 540 . It then applies CA 2 's public key to CA 2 's digital signature and this creates a valid digital signature for CAl 545 , even though CA 1 has not digitally signed this message.
  • the receiver then applies CA 1 's public key to what appears to be a valid digital signature of CA 1 . This creates a valid digital signature of the sender 550 .
  • the present invention addresses the security needs identified above by providing a method of reliably identifying the sender of an electronic message and determining the accuracy of an electronic message while utilizing the current standard business processes. Below is a description of various embodiments of the present invention.
  • FIG. 6 and the following discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented. While the invention will be described in the general context of an application program that runs on an operating system in conjunction with a personal computer, those skilled in the art will recognize that the invention also may be implemented in combination with other program modules. Generally, program modules include routines, programs, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and the like. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
  • an exemplary system for implementing the invention includes a conventional personal computer 20 , including a processing unit 21 , a system memory 22 , and a system bus 23 that couples the system memory to the processing unit 21 .
  • the system memory 22 includes read only memory (ROM) 24 and random access memory (RAM) 25 .
  • ROM read only memory
  • RAM random access memory
  • the personal computer 20 further includes a hard disk drive 27 , a magnetic disk drive 28 , e.g., to read from or write to a removable disk 29 , and an optical disk drive 30 , e.g., for reading a CD-ROM disk 31 or to read from or write to other optical media.
  • the hard disk drive 27 , magnetic disk drive 28 , and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32 , a magnetic disk drive interface 33 , and an optical drive interface 34 , respectively.
  • the drives and their associated computer-readable media provide nonvolatile storage for the personal computer 20 .
  • computer-readable media refers to a hard disk, a removable magnetic disk and a CD-ROM disk
  • other types of media which are readable by a computer such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, and the like, may also be used in the exemplary operating environment.
  • a number of program modules may be stored in the drives and RAM 25 , including an operating system 35 , one or more application programs 36 , the Account Authority Digital Signature (AADS) module 37 , and program data 38 .
  • a user may enter commands and information into the personal computer 20 through a keyboard 40 and pointing device, such as a mouse 42 .
  • Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like.
  • These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a game port or a universal serial bus (USB).
  • a monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48 .
  • personal computers typically include other peripheral output devices (not shown), such as speakers or printers.
  • the personal computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49 .
  • the remote computer 49 may be a server, a router, a peer device or other common network node, and typically includes many or all of the elements described relative to the personal computer 20 , although only a memory storage device 50 has been illustrated in FIG. 6.
  • the logical connections depicted in FIG. 6 include a local area network (LAN) 51 and a wide area network (WAN) 52 .
  • LAN local area network
  • WAN wide area network
  • the personal computer 20 When used in a LAN networking environment, the personal computer 20 is connected to the LAN 51 through a network interface 53 .
  • the personal computer 20 When used in a WAN networking environment, the personal computer 20 typically includes a modem 54 or other means for establishing communications over the WAN 52 , such as the Internet.
  • the modem 54 which may be internal or external, is connected to the system bus 23 via the serial port interface 46 .
  • program modules depicted relative to the personal computer 20 may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communication's link between the computers may be used.
  • FIG. 7 is a block diagram of the components of the preferred embodiment of the present invention. This embodiment of the present invention utilizes the paradigm of the digital signatures as described with respect to FIG. 3 and merges it into business processes utilized today.
  • the sender Prior to sending a message to the receiver, the sender provides the sender's public key 730 to the receiver 720 .
  • the receiver then stores the sender's public key 725 , which will be used to validate electronic messages that will be sent to the receiver.
  • the sender provides the public key to the receiver when the sender initially establishes an account with the receiver. It is preferable that the receiver stores the sender's public key along with other sender account information such as name, address, PIN, mother's maiden name, or other security information that is associated with an account. It is also preferable to not send the sender's public key to the receiver in the same electronic message that the sender desires to have validated.
  • the sender 710 then creates a sender's message 700 and attaches the digital signature 705 .
  • the digital signature was created by the process described either in FIG. 3 or by another process as known to those skilled in the art. It will be recognized by those skilled in the art that the digital signature can be any security device used to associate a specific message with a sender.
  • the sender sends the sender's message 700 and the sender's digital signature 705 to the receiver 720 by way of the network 715 .
  • the network 715 can either be a closed network as is used in the debit card system, or it can be an open network such as the Internet. Because the digital signature is applied, if 715 is an open network such as the Internet, there is a low probability that someone monitoring for traffic and trying to “steal” messages and private information will be able decrypt the digital signature of the sender.
  • the sender is not sending the public key with the message, and the sender is also not using any certification authorities to authorize this message. Also note that because the standard business process supports validation criteria, adding another criteria, such as a public key, requires minimal modification to the business process.
  • the receiver 720 then receives the sender's message 700 and the sender's digital signature 705 .
  • the receiver 720 then automatically retrieves the prestored public key associated with the sender's other account information and validates the sender's digital signature using this prestored public key. Because a digital signature is being used, each message is encrypted and no one tapping into the network 715 will be able to modify the message as it proceeds to the receiver. If the message is modified or corrupted in any manner, the message will fail the validation process and the receiver will refuse the request.
  • FIG. 8 is a block diagram depicting an embodiment of the present invention as it is implemented using a financial institution 825 , a merchant 812 and a customer 810 .
  • the present invention applies in situations where security and the sender's identification is required.
  • One embodiment is a financial institution that uses standard business processes common in the industry today.
  • the customer 810 generates requests and provides account information 800 , as well as generates a digital signature 805 .
  • the customer sends this information through the network 815 to a merchant 812 .
  • This information can be used under several situations. For example, if a customer is purchasing groceries at a supermarket and has a smart card that contains his or her private key, or when the customer is using his home computer and is trying to purchase a book or other goods over the Internet from a merchant.
  • the merchant 812 then receives the customer's request and account information 800 and the customer's digital signature 805 .
  • the merchant then seeks to have the financial institution authorize the transaction. In other words, the merchant wants the financial institution to confirm the identity of the customer 810 and confirm that there are enough funds in the account to make this purchase.
  • the merchant sends this information to the network 820 to the financial institution 825 for validation.
  • the merchant has not received the private or public key from the customer.
  • the merchant has received a digital signature from the customer and that digital signature will only be valid for this specific request from the customer. If the request is modified in any way, the digital signature will become invalid. This is important because of the high incidence of merchant fraud perpetrated by merchants. So, if the merchant cannot modify the customer's request in any way without having the digital signature becoming invalid, this will provide a significant savings for the financial institutions and ultimately the customer as well.
  • the financial institution 825 having received the customer's request and account information 800 , and the customer's digital signature 805 , then automatically retrieves the public key 830 that has been previously stored and validates 835 the customer's digital signature using the prestored public key 830 .
  • the institution may then act on the customer's request, such as to authorize a transaction involving the customer's account.
  • the financial institution may employ a model using an authorization source and a transaction process.
  • the authorization source interacts with the merchant to receive the customer account information and the transaction request.
  • the transaction processor may be used to interact with the credit card issuing association to approve the transaction.
  • Methods of account approval are many and are considered within the scope of the present invention when the validation of an electronic message is required.
  • the financial institution 825 then validates the account with the digital signature and returns the results of the validation through the network 820 to the merchant 812 .
  • the merchant then accepts or rejects the request by the customer 810 , notifying the customer via the network 815 .
  • the networks 820 or 815 can be open networks such as the Internet, closed networks, or one could be an open network while the other is a closed network.
  • FIG. 9 is a flow chart depicting the steps performed in implementing an embodiment of the present invention.
  • Method 900 begins at the start step 905 and proceeds to step 910 where public key information is stored in a database along with sender identity information about a sender. This may be performed in a manner well known, for example, when someone opens up a checking account and provides identity information, such as mother's maiden name, social security number or other types of information required by institutions that require a high level of confidence of the sender's identity.
  • the sender identity information may be anything that the institution desires, such as account information, sender's name or any other information the institution wishes to use to associate the sender's public key to the sender.
  • the sender encrypts a message using the sender's private key. This may be performed using the digital signature methodology described with respect to FIG. 3, or may be used by other encryption methods known to those skilled in the art.
  • the sender proceeds to step 925 where it sends the encrypted message, the original message, and the sender identity information to the institution. This may be performed over an open network, such as the Internet, where the sender is accessing via a computer, or it may be over a closed network where the sender is sending the encrypted message by way of a smart card at a terminal.
  • step 930 the institution receives the encrypted message, the original message, and sender identity information and automatically searches the database, using the sender identity information, to find the sender's public key.
  • the public key that is associated with the sender identity information is then retrieved from the database.
  • the institution decrypts the encrypted message using the retrieved public key that was associated with the sender identity information provided in step 910 .
  • step 940 the institution then validates the decrypted message with the original message sent.
  • the validation is performed using the digital signature validation paradigm previously described.
  • method 900 proceeds to step 945 and stops.
  • This validation process provides two purposes: (1) it determines whether the sender is the originator of the message because it is based on validation information provided by the sender to the institution; and (2) it validates the accuracy of the received message by detecting any changes to the message that was sent.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Computer And Data Communications (AREA)

Abstract

The reliability of electronic encoding, e.g., digital signatures, are incorporated into current business processes to identify the sender of an electronic message as well as the accuracy of the electronic message. An institution records an encoding key and associates it with account information from the sender. This initial recording may be performed using any of the validation procedures utilized today by a business institution. After the initial validation of the encoding key, validating future electronic transactions occurs by including encoding information that can be deciphered using the encoding key initially stored. To validate an electronic transaction, the sender sends the electronic transaction message, the encoding information and sender identity information to the person or institution where the sender desires validation. Having received this information, the computer system performing the validation applies the encoding key to the encoding information and analyzes the electronic transaction message to validate the identity of the sender and the reliability of the message.

Description

    FIELD OF THE INVENTION
  • The field of the invention relates to digital signatures, and particularly, using digital signatures to reliably identify a sender and the accuracy of an electronic message without using certification authorities. [0001]
  • BACKGROUND OF THE INVENTION
  • The increase in electronic commerce has increased the focus on security of the electronic transactions using this medium of commerce. In the world of computer transactions and electronic contracts, there is no face-to-face acknowledgement to identify the consumer or other person wishing to perform the transaction. As institutions become more reliant on computers, they have modified their business infrastructure (i.e., their “business process”) in an attempt to keep up with electronic commerce. The business process of an institution includes the methods used to interact with a customer (e.g., how transactions occur, what information is required from the customer, help desks to support the customer), the information contained in customer accounts, the databases used and how they are modified by the institution, and personnel training. [0002]
  • Institutions and persons desiring to utilize electronic commerce are faced with several issues regarding electronic transactions. The first issue is whether the person requesting the transaction is who they say they are (“identification”). And the second issue is whether the requested transaction is actually the transaction intended to be requested (“accuracy”). In other words, whether the requested transaction has been compromised, either fraudulently or through transmission errors, during the course of transmitting and receiving the request. [0003]
  • To address the identity of the person requesting the transaction, current financial business processes bind information in accounts to authenticate non-face-to-face transactions. For example, an account holder's mother's maiden name, a personal identification number (PIN), and a social security number have all been used and integrated into the current financial infrastructure to aid in reliably identifying someone requesting a non-face-to-face transaction. [0004]
  • To address the accuracy of the electronic message being sent and the identity of the person sending the electronic message, digital signatures are utilized. Digital signatures are used with electronic messages and provide a way for the sender of the message to electronically “sign” the message as a way of providing proof of the identity of the sender and the accuracy of the message. In a digital signature system, a sender digitally “signs” the message using a private key (encryption software used to create a digital signature). The receiver validates the senders digital signature by using the sender's public key (software used to decrypt the digital signature) sent to the receiver by the sender. [0005]
  • While, digital signatures provide some assurance accuracy to the message and the identity of the sender, they are also subject to security risks. These risks include compromised private and public keys or merchant fraud. To address the security risks and validate the digital signatures, computer technology has developed “certification authorities” to be used in a Certificate Authority Digital Signature system (CADS). In a CADS system, certification authorities are third parties that essentially “vouch” for the validity of a digital signature's public key and, hence, the validity of the digital signature. [0006]
  • However, certification authorities used in the CADS system come with the inherent risk, such a expired certification authority and compromised private keys which affect the entire public key infrastructure. In addition, the increased reliability provided by certification authorities do not easily combine with the business process currently established. [0007]
  • Therefore, there is a need in the art is a method to increase the reliability of electronic transactions while not imposing significant modifications on the business processes already in place. [0008]
  • SUMMARY OF THE INVENTION
  • The present invention meets the needs described above by providing a method of reliably identifying the sender of an electronic message and determining the accuracy of an electronic message while utilizing the current standard business processes. [0009]
  • The current financial infrastructure can extend existing business processes to support high integrity electronic commerce by implementing the present invention. One embodiment of the present invention can be implemented as the Account Authority Digital Signature (AADS) system. The AADS system uses digital signatures along with validation procedures that can be implemented within current institutional business processes to identify a sender of an electronic message and determine the accuracy of the electronic message being sent. [0010]
  • The present invention simplifies its implementation by leveraging existing account infrastructures and by operating within existing business processes. In addition, the present invention utilizes electronic signatures in the business process for increased reliability. Yet, however, the present invention does not rely on third parties (i.e., certification authorities) for authorization, thereby avoiding any security risks or other systemic risks associated with the third parties. And finally, no new databases need to be developed to implement the present invention. [0011]
  • Generally described, the identity of a sender of an electronic message is validated by using sender validation information along with other sender identity information stored at an institution's or person's computer system and applying the sender validation information to the encoding information received by the computer system. The sender validation information may be the sender's public key in a digital signature system. [0012]
  • The present invention utilizes the accuracy of electronic encoding, e.g., digital signatures, and provides a method to incorporate them into the current business processes. An institution records an encoding key and associates it with account information from the sender. This initial recording may be performed using any of the validation procedures utilized today by a business institution, for example, when the sender is opening an account and must show proof of identity. [0013]
  • After the initial validation of the encoding key, validating future electronic transactions occur by including encoding information that can be deciphered using the valid encoding key initially stored. To validate an electronic transaction, the sender sends the electronic transaction message, the encoding information and sender identity information to the person or institution from which the sender desires validation. Having received this information, the computer system automatically retrieves the encoding information stored in the computer system that is associated with the sender identity information. The computer system then validates the electronic transaction message by applying the retrieved encoding key to the encoding information and analyzes the electronic transaction message to validate the identity of the sender and the accuracy of the message. [0014]
  • This validation may be performed in a digital signature system by applying a hashing algorithm to the electronic message and comparing the results to the results of applying the public key to the digital signature received. [0015]
  • The encoding information may be entered into a terminal via of a smart card or via another computer system. The encoding information, electronic message and sender identity information may be sent to the computer system performing the validation via a closed network or via an open network, such as the Internet. [0016]
  • These and other advantages of the present invention may be more clearly understood and appreciated from a review of the following detailed description of the disclosed embodiments and by reference to the appended drawings and claims.[0017]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram depicting an exemplary debit card system as it exists in the prior art. [0018]
  • FIG. 2 is a block diagram depicting the Certification Authority Digital Signature (CADS) system as it exists in the prior art. [0019]
  • FIG. 3 is a block diagram depicting the digital signature process. [0020]
  • FIG. 4 is a block diagram depicting the effect of a security breach in the existing debit card system. [0021]
  • FIG. 5 is a block diagram depicting the effect of a security breach in the existing CADS system. [0022]
  • FIG. 6 is a block diagram of an exemplary computing environment in an embodiment of the present invention. [0023]
  • FIG. 7 is a block diagram of the components of an embodiment of the present invention. [0024]
  • FIG. 8 is a block diagram depicting an embodiment of the present invention as it is implemented using a financial institution, a merchant and a customer. [0025]
  • FIG. 9 is a flowchart depicting the steps performed in implementing an embodiment of the present invention.[0026]
  • DETAILED DESCRIPTION
  • The present invention provides a method for reliably identifying the sender of an electronic method and determining the accuracy of an electronic message while utilizing current standard business processes. [0027]
  • Electronic commerce is currently used and implemented in several existing systems. The conventional debit card system is one example. The debit card system attempts to identify the sender of the electronic message (e.g., the message of “Withdraw $200 from my account”) while working in the current business processes. In other words, it utilizes a PIN as merely another validation mechanism. However, the debit card system does not verify the accuracy of the message. In addition, because of the security risks, the debit card system is not utilized on an open network, such as the Internet, thereby limiting it's access to electronic commerce. [0028]
  • The Certification Authority Digital Signature (CADS) system is another example of a system used to implement electronic commerce. The CADS system provides message accuracy and may be used in open networks, such as the Internet. However, CADS also has inherent systemic risks and requires reliance on third parties to “authorize” the digital signature of the sender of the electronic message. In addition, the CADS system is difficult to implement using standard business processes utilized today. [0029]
  • Both the debit card system and the CADS system can have severe consequences in the event the security of either system is compromised. The debit card and CADS systems, as well as the security risks associated with each, are discussed further in FIGS. [0030] 1-2 and 3-4.
  • Turning now to the figures, FIG. 1 is a block diagram depicting a conventional debit card system as it exists in the prior art. Typically, a customer enters account information and a personal identification number (PIN) into a terminal [0031] 100. The account information is generally stored on magnetic tape attached to a card that is given to the customer so that the customer may enter it into the terminal 100. Upon entering the account information and the PIN, the terminal then formats this data and sends it across a closed network 105 to the main computer 110 that validates the PIN with an associated account that has been entered by the customer. The PIN was stored in a field along with other account information in the main computer previously. The PIN is typically associated with the customer when the account is established but generally not through the network 105. Normal procedures provide for the customer to validate their identity when the account is opened or prior to associating a PIN to the customer's account. This would verify to the institution that the person establishing the account is who they claim to be and increases the reliability that the when the PIN is used, the customer assigned the PIN is the one using it.
  • Upon validating the PIN with the associated account, the [0032] main computer 110 then accepts or rejects the PIN and sends the results back through the network 105. The terminal, having received the acceptance or rejection, then either continues to process the customer's transaction or denies customer access to the account.
  • The PIN used in the debit card system is the same for all transactions. In other words, no matter what transaction the customer wishes to initiate with the main computer, i.e., regardless what message is sent to the main computer by way of the terminal, the PIN stays exactly the same. [0033]
  • The terminal [0034] 100 used in the debit card system is a basic terminal that is used to format the entered information to send to the main computer 110. In addition, the terminal 100 may perform some function such as dispensing cash or other functions specific to the account. However, the terminal 100 is generally a dumb terminal only used to facilitate the customer's interaction with the main computer 110 (i.e., the terminal is not typically used for purposes other then to interact with financial institutions). The terminal 100 communicates with the main computer 110 by network 105.
  • The [0035] network 105 used in the debit card system is typically a closed network that is set up specifically for use between the terminal 10 and main computer 110. While it is possible that others may break into the network, generally, the network 105 is not used for other traffic other than messages sent between the terminal 100 and main computer 110.
  • The [0036] main computer 110 used in the debit card system is generally housed at the institution containing the account and contains all the records for the institution relative to the account and the PIN. When the account is initially set up, all information required to process this transaction as well as potentially other transactions within the institution is validated. For security reasons, the required information was validated in either face-to-face or in some other manner that can validate the customer's identity. Consequently, there is a direct validation of the account to the customer when the account is established. As stated earlier, the business processes set up in many financial institutions today follow this model. These processes include manuals, computer databases and records, held desks and personnel training.
  • FIG. 2 is a block diagram depicting the known Certification Authority Digital Signature (CADS) system as it exists in the prior art. The CADS system relies on the digital signatures and traditional public key infrastructure regarding issuing certificates that are signed by a certification authority. (see FIG. 3 regarding a description of digital signatures and their usage). A certification authority attests to the validity of the public key and sometimes, depending on the authority, checks the validity of the private key and the identity information of the entity that the certificate is issued to. The sender then sends the certificate, which is a digital signature incorporating the sender's digital signature, issued by the certification authority, the message, and the sender's public key to the receiving party. The intent is that the receiving party will trust the certification authority's verification and also will be able to validate the certification authority's digital signature and the sender's message using the contents of the information sent by the sender and a public key of the certification authority. [0037]
  • In FIG. 2, the [0038] sender 201 creates a digital signature using the sender's message 225. (Additional discussion on creation of a digital signature is provided below in relation to FIG. 3.) Prior to sending the message to the receiver 242, it is preferable to validate the sender's message and therefore the sender submits it to a certification authority. The intent of the certification authority is to confirm that the identified sender is sending the message. Continuing with FIG. 2, the sender then has the digital signature “authorized” by a Certification Authority 1 (CAl) 205. The CA1 has, in advance, identified the public key associated with the sender. Therefore, the CA1 205 checks the current digital signature with the sender to ensure that it is the same as what was established previously.
  • An example of a certification authority includes certifying the identity of specific banks. However, as there are no rules or laws regarding who is a certification authority and who is not, in some instances, the receiver may not “trust” the certification authority. The receiver might be a large scale institution that does not trust a certification authority that deals with just a few customers or small institutions. Specifically, the receiver may not trust that the security is as high as it expects from the certification authority. Therefore, the receiver would require a higher level certification authority. In cases like this, the first certification authority also needs to be authorized. This is depicted in FIG. 2 by CA[0039] 1 sending its digital signature to certification authority 2 (CA2) 210. CA2 is, in essence, an authority that confirms the identity of other first “level” certification authorities. In the example provided, CA2 may confirm the identity of a financial institution versus just a bank as in CA1.
  • This additional certification authority may still not rise to the level of security required by the receiver so yet another certification authority may be necessary. This is depicted by [0040] CA2 210 creating a digital signature using CA1's 205 digital signature and sending CA2's digital signature on to CA3 215. CA3 215 could be just another higher level certification authority that checks all institutions. And as is apparent, this hierarchy of certification authorities could continue ad infinitum. However, at some point, the sender and receiver are satisfied with the level of certification authorities and, in FIG. 2, ends with CA3 215. CA3's digital signature is created and used by the sender. The sender 201 then attaches CA3's digital signature 235 to the sender's message 225 along with the sender's public key 230 into a complete message block depicted by 220. The space required for the digital signature may be significant in relation to the message. Generally, the classic electronic transaction message comprises 80 bytes and the sender's digital signature comprises 60 bytes. However, for each certification, it requires another 2,000 bytes. The size of the message the sender is sending over the network 240 is increased substantially by using certification authorities. The sender then having combined the message, the public key and CA3's digital signature, sends this complete packet over the network 240 to the receiver 242.
  • The receiver now has to validate the sender's message to ensure that the authentic sender is sending the message and not a third party using the sender's identity. Having received the [0041] complete packet 220, the receiver 242 then begins applying public keys to the digital signatures received in the packet. Typically, the receiver will already have the public key of the final certification authority used by the sender. In cases where it is not clear, the sender must also send the public key to the receiver of the final certification authority.
  • In the instance shown in FIG. 2, because CA[0042] 3 was the final certification authority, the receiver then applies CA3's public key to CA3's digital signature 235 that was received in the packet 220. Applying CA3's public key to the CA3's digital signature creates CA2's digital signature in addition to providing CA2's public key (not shown). Now having CA2's digital signature 245 and CA2's public key, the receiver applies CA2's public key to CA2's digital signature 250 to create CA1's digital signature 250 and CA1's public key (not shown). The receiver then must apply CA1's public key to CA1's digital signature to create the initial sender's digital signature 255.
  • While it is shown that this process is performed three times because there have been three certification authorities, it will be recognized that this process would occur as many times as there are certification authorities used for the sender's message. It is clear that this process also adds significant overhead processing to the validation of the sender's identity. Particularly with the more certification authorities used, the processing and resources required purely for the task of validating the sender is increased dramatically. [0043]
  • Finally arriving at the sender's [0044] digital signature 255, the receiver then validates the message. The receiver does this by using the sender's message 225, the sender's public key 230 that had been sent in the initial packet 220, as well as the sender's digital signature 255 that was created from this process of certification authority validation just described. The receiver uses all these components to then validate the sender's digital signature 240. The receiver may send back the results of the validation, or if the validation was successful, act on the message sent.
  • While the conventional CADS system depicted in FIG. 2 provides some degree of reliability confirming the sender's identity, standard business processes are not equipped to deal with these kind of certification authority validation procedures. [0045]
  • FIG. 3 depicts how a message is validated using the digital signature process. Initially, the sender creates a message [0046] 300 and applies a hashing algorithm to the message 300 to create a modified message 305. Because of the hashing algorithm, the modified message typically is a much smaller version of the actual message itself.
  • The modified message [0047] 305 that is created using the hashing algorithm and the sender's message 300 is not only smaller, but is also unique to the message. In other words, as the message changes, the modified message will also change after applying the hashing algorithm. The modified message is then encrypted with the sender's private key.
  • The process of using a digital signature generally requires a private and a public key. These keys are typically obtained from software houses and developers that create encryption programs. The private key is used by the sender and only by the sender. To maintain the security, as the name implies, the private key is intended to be kept private to the sender and not for public dissemination. This is the only time in the process, i.e., applying the private key to the modified message [0048] 305 to create the digital signature 310, where the private key is used.
  • The creation of the sender's digital signature described above in FIG. 3 can be performed at the sender's local computer, or in some cases, on a smart card. The use of smart cards are well know to those skilled in the art. The end result of the sender's process is that the sender has created a digital signature. And as stated, this digital signature is message specific, i.e., if any letter or any component of the message was changed, this digital signature would also change. The digital signature is also specific to the individual sender, i.e., the private key encryption method is only for that sender. [0049]
  • The sender then sends the sender's message with a public key, if the receiver does not already have one, and the digital signature to a receiver (this “sending” process is not shown). The receiver then takes the sender's message [0050] 300 and applies the same hashing algorithm described above for the sender to create the modified message 305. Ideally, this should be the same modified message. The only case where the sender's and receiver's modified message is different is if the message was corrupted either by the sender after having applied the digital signature to it, by transmission errors or someone fraudulently intercepting the message and attempting to change its contents.
  • Still referring to FIG. 3, next the receiver then takes the sender's digital signature and applies the sender's public key to the digital signature. As implied, the public key is available for public use by the sender without losing any security of the sender's private key. The receiver then applies the public key to create the decrypted digital signature [0051] 315. The decrypted digital signature and the modified message 305 are then compared by the receiver. If they both match up and are identical, then the receiver knows that the message was encrypted with a sender's private key and was the same message that has been received. However, because it is not known for sure whether the sender's private key has been corrupted (e.g., stolen), the receiver is still not absolutely sure that the sender identified in the message actually is the one who sent it.
  • FIG. 4 is a block diagram depicting the effect of a security breach (e.g., someone stealing someone's PIN and account info.) in the existing debit card system. In this case, the fraudulent customer enters account information and a PIN to a terminal [0052] 400 and requests a transaction. The same PIN is used for all transactions and the PIN typically is a easily remembered non-complex set of numbers and/or letters that can be entered by the customer. Once the PIN has been corrupted for a one message, that same PIN can be used for other messages that the fraudulent customer wishes to send.
  • The terminal [0053] 400 having received the account information and PIN from the fraudulent customer then, as expected, sends this fraudulent information on to the main computer 410 through the network 405. The main computer 410 is not checking the message against the PIN. It merely receives the PIN and checks it against the account that has been stored already in the main computer 410. If the fraudulent customer has done his job and has stolen the correct PIN, then the transaction will be validated and the acceptance will be passed on and the fraudulent customer will have access to some else's account.
  • Another area of concern, not depicted in FIG. 4, is when a third party steals the customer's PIN by tapping into the network [0054] 405. Since no encoding or encrypting is performed on the PIN, and since the same PIN is used for all messages, once someone who has tapped into the network to obtain this information, they are not required to perform any decryption on the message and can receive the PIN from the network. Once they have access to this PIN, they can then get into the customer's account and send any messages such as checking the account balance and withdrawing funds from an account. Having one PIN for all messages facilitates this type of security breach.
  • FIG. 5 depicts the effect of a security breach, i.e., the stealing of a certification authority's private key by a third party, in the existing CADS system. When a certification authority's private key is stolen by a third party, all messages certified by that authority is suspect because the third party, not the certification authority, may generate false messages which appear to authorized by the certification authority. [0055]
  • In this case, an authentic sender is not attempting to send a message [0056] 500, and in this example, CA1 has not applied any digital signature because there is no message. But what has occurred is that there has been a security breach in the CA2. For example, CA2's private key has been stolen. In general, the effect of having the CA2's private key stolen is that it can then mask as any of the CA1's or senders relying on CA2 for certification even though they are not attempting to send a message. In addition, a corrupted CA2 private key allows the creation of fictitious CA1's or senders that do not exist, yet will appear valid because they are certified by CA2. So, if a certification authority can validate that a specific merchant is requesting a transaction when that merchant is indeed not requesting a transaction, this facilitates the fraudulent use of the electronic commerce system.
  • Continuing with FIG. 5, a [0057] fraudulent message 510 is created using a fraudulent public key and the fraudulent private key compromised from CA2. A digital signature is created using this information and using CA2's compromised private key is sent to CA3 for validation. Because the private key has been compromised, these messages and the digital signature is validated by CA3 and, consequently, the digital signature and fraudulent information is sent on to the receiver 536.
  • The receiver then receives the [0058] fraudulent message 510, the fraudulent public key 515, and the fraudulent digital signature 520 that was created by the compromised CA2. The receiver then runs through the process as described in FIG. 2 to validate the certification authority. The receiver applies CA3's public key, which is valid, and creates CA2's digital signature 540. It then applies CA2's public key to CA2's digital signature and this creates a valid digital signature for CAl 545, even though CA1 has not digitally signed this message. The receiver then applies CA1's public key to what appears to be a valid digital signature of CA1. This creates a valid digital signature of the sender 550. This is the case even though the sender has not created a message, nor has CA1 validated it in any manner. The receiver, using the fraudulent message 510 and the fraudulent public key 515, then validates the sender's digital signature that was created using the fraudulent and compromised private key of CA2.
  • The present invention addresses the security needs identified above by providing a method of reliably identifying the sender of an electronic message and determining the accuracy of an electronic message while utilizing the current standard business processes. Below is a description of various embodiments of the present invention. [0059]
  • Exemplary Operating Environment [0060]
  • FIG. 6 and the following discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented. While the invention will be described in the general context of an application program that runs on an operating system in conjunction with a personal computer, those skilled in the art will recognize that the invention also may be implemented in combination with other program modules. Generally, program modules include routines, programs, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and the like. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices. [0061]
  • With reference to FIG. 6, an exemplary system for implementing the invention includes a conventional [0062] personal computer 20, including a processing unit 21, a system memory 22, and a system bus 23 that couples the system memory to the processing unit 21. The system memory 22 includes read only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output system 26 (BIOS), containing the basic routines that help to transfer information between elements within the personal computer 20, such as during start-up, is stored in ROM 24. The personal computer 20 further includes a hard disk drive 27, a magnetic disk drive 28, e.g., to read from or write to a removable disk 29, and an optical disk drive 30, e.g., for reading a CD-ROM disk 31 or to read from or write to other optical media. The hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical drive interface 34, respectively. The drives and their associated computer-readable media provide nonvolatile storage for the personal computer 20. Although the description of computer-readable media above refers to a hard disk, a removable magnetic disk and a CD-ROM disk, it should be appreciated by those skilled in the art that other types of media which are readable by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, and the like, may also be used in the exemplary operating environment.
  • A number of program modules may be stored in the drives and [0063] RAM 25, including an operating system 35, one or more application programs 36, the Account Authority Digital Signature (AADS) module 37, and program data 38. A user may enter commands and information into the personal computer 20 through a keyboard 40 and pointing device, such as a mouse 42. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a game port or a universal serial bus (USB). A monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48. In addition to the monitor, personal computers typically include other peripheral output devices (not shown), such as speakers or printers.
  • The [0064] personal computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49. The remote computer 49 may be a server, a router, a peer device or other common network node, and typically includes many or all of the elements described relative to the personal computer 20, although only a memory storage device 50 has been illustrated in FIG. 6. The logical connections depicted in FIG. 6 include a local area network (LAN) 51 and a wide area network (WAN) 52. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
  • When used in a LAN networking environment, the [0065] personal computer 20 is connected to the LAN 51 through a network interface 53. When used in a WAN networking environment, the personal computer 20 typically includes a modem 54 or other means for establishing communications over the WAN 52, such as the Internet. The modem 54, which may be internal or external, is connected to the system bus 23 via the serial port interface 46. In a networked environment, program modules depicted relative to the personal computer 20, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communication's link between the computers may be used.
  • FIG. 7 is a block diagram of the components of the preferred embodiment of the present invention. This embodiment of the present invention utilizes the paradigm of the digital signatures as described with respect to FIG. 3 and merges it into business processes utilized today. [0066]
  • Prior to sending a message to the receiver, the sender provides the sender's [0067] public key 730 to the receiver 720. The receiver then stores the sender's public key 725, which will be used to validate electronic messages that will be sent to the receiver. In one embodiment, the sender provides the public key to the receiver when the sender initially establishes an account with the receiver. It is preferable that the receiver stores the sender's public key along with other sender account information such as name, address, PIN, mother's maiden name, or other security information that is associated with an account. It is also preferable to not send the sender's public key to the receiver in the same electronic message that the sender desires to have validated.
  • The [0068] sender 710 then creates a sender's message 700 and attaches the digital signature 705. The digital signature was created by the process described either in FIG. 3 or by another process as known to those skilled in the art. It will be recognized by those skilled in the art that the digital signature can be any security device used to associate a specific message with a sender.
  • The sender sends the sender's [0069] message 700 and the sender's digital signature 705 to the receiver 720 by way of the network 715. The network 715 can either be a closed network as is used in the debit card system, or it can be an open network such as the Internet. Because the digital signature is applied, if 715 is an open network such as the Internet, there is a low probability that someone monitoring for traffic and trying to “steal” messages and private information will be able decrypt the digital signature of the sender.
  • Note that in this embodiment, the sender is not sending the public key with the message, and the sender is also not using any certification authorities to authorize this message. Also note that because the standard business process supports validation criteria, adding another criteria, such as a public key, requires minimal modification to the business process. [0070]
  • The [0071] receiver 720 then receives the sender's message 700 and the sender's digital signature 705. The receiver 720 then automatically retrieves the prestored public key associated with the sender's other account information and validates the sender's digital signature using this prestored public key. Because a digital signature is being used, each message is encrypted and no one tapping into the network 715 will be able to modify the message as it proceeds to the receiver. If the message is modified or corrupted in any manner, the message will fail the validation process and the receiver will refuse the request.
  • FIG. 8 is a block diagram depicting an embodiment of the present invention as it is implemented using a [0072] financial institution 825, a merchant 812 and a customer 810. The present invention applies in situations where security and the sender's identification is required. One embodiment is a financial institution that uses standard business processes common in the industry today. In this embodiment, the customer 810 generates requests and provides account information 800, as well as generates a digital signature 805. The customer sends this information through the network 815 to a merchant 812. This information can be used under several situations. For example, if a customer is purchasing groceries at a supermarket and has a smart card that contains his or her private key, or when the customer is using his home computer and is trying to purchase a book or other goods over the Internet from a merchant.
  • The [0073] merchant 812 then receives the customer's request and account information 800 and the customer's digital signature 805. The merchant then seeks to have the financial institution authorize the transaction. In other words, the merchant wants the financial institution to confirm the identity of the customer 810 and confirm that there are enough funds in the account to make this purchase. In order to have the transaction authorized, the merchant sends this information to the network 820 to the financial institution 825 for validation. It will be noted that the merchant has not received the private or public key from the customer. The merchant has received a digital signature from the customer and that digital signature will only be valid for this specific request from the customer. If the request is modified in any way, the digital signature will become invalid. This is important because of the high incidence of merchant fraud perpetrated by merchants. So, if the merchant cannot modify the customer's request in any way without having the digital signature becoming invalid, this will provide a significant savings for the financial institutions and ultimately the customer as well.
  • The [0074] financial institution 825, having received the customer's request and account information 800, and the customer's digital signature 805, then automatically retrieves the public key 830 that has been previously stored and validates 835 the customer's digital signature using the prestored public key 830. Depending on the purpose for which the present invention is implemented, the institution may then act on the customer's request, such as to authorize a transaction involving the customer's account.
  • When the financial institution is performing an account authorization, any of the methods known to those skilled in the art may be employed while using the present invention. For example, the financial institution may employ a model using an authorization source and a transaction process. Under this model, when used with a credit card transaction, the authorization source interacts with the merchant to receive the customer account information and the transaction request. The transaction processor may be used to interact with the credit card issuing association to approve the transaction. Methods of account approval are many and are considered within the scope of the present invention when the validation of an electronic message is required. [0075]
  • The [0076] financial institution 825 then validates the account with the digital signature and returns the results of the validation through the network 820 to the merchant 812. The merchant then accepts or rejects the request by the customer 810, notifying the customer via the network 815. The networks 820 or 815 can be open networks such as the Internet, closed networks, or one could be an open network while the other is a closed network.
  • It should be noted that because the digital signature is encrypted, the public key is not being sent (i.e., the public key has been prestored at the institution), and no certification authorities are being used, the concern of fraudulent tapping into the network to retrieve sensitive customer or sender information has been greatly reduced. Further note that the merchant has only been a pass through mechanism to confirm the identity of the customer to the bank and to verify account information. [0077]
  • FIG. 9 is a flow chart depicting the steps performed in implementing an embodiment of the present invention. [0078] Method 900 begins at the start step 905 and proceeds to step 910 where public key information is stored in a database along with sender identity information about a sender. This may be performed in a manner well known, for example, when someone opens up a checking account and provides identity information, such as mother's maiden name, social security number or other types of information required by institutions that require a high level of confidence of the sender's identity. The sender identity information may be anything that the institution desires, such as account information, sender's name or any other information the institution wishes to use to associate the sender's public key to the sender.
  • Proceeding to step [0079] 920, the sender encrypts a message using the sender's private key. This may be performed using the digital signature methodology described with respect to FIG. 3, or may be used by other encryption methods known to those skilled in the art. After encrypting the message, the sender proceeds to step 925 where it sends the encrypted message, the original message, and the sender identity information to the institution. This may be performed over an open network, such as the Internet, where the sender is accessing via a computer, or it may be over a closed network where the sender is sending the encrypted message by way of a smart card at a terminal.
  • Proceeding to step [0080] 930, the institution receives the encrypted message, the original message, and sender identity information and automatically searches the database, using the sender identity information, to find the sender's public key. The public key that is associated with the sender identity information is then retrieved from the database. At step 930, the institution decrypts the encrypted message using the retrieved public key that was associated with the sender identity information provided in step 910.
  • Proceeding to step [0081] 940, the institution then validates the decrypted message with the original message sent. In one embodiment, the validation is performed using the digital signature validation paradigm previously described. After performing the validation, method 900 proceeds to step 945 and stops.
  • This validation process provides two purposes: (1) it determines whether the sender is the originator of the message because it is based on validation information provided by the sender to the institution; and (2) it validates the accuracy of the received message by detecting any changes to the message that was sent. [0082]
  • The present invention has been described in relation to particular embodiments which are intended in all respects to be illustrative rather than restrictive. Alternative embodiments will become apparent to those skilled in the art to which the present invention pertains without departing from its spirit and scope. Accordingly, the scope of the present invention is defined by the appended claims rather than the foregoing description. [0083]

Claims (31)

What is claimed is:
1. A method of validating the identity of a sender of an electronic message comprising the steps of:
associating sender validation information with sender identity information in a computer system;
receiving into a terminal, the electronic message, encoding information derived from the electronic message and sender identity information;
sending the electronic message, the encoding information and the sender identity information to the computer system;
in the computer system, retrieving the validating information associated with the received sender identity information; and
validating the identity of the sender using the retrieved validating information and the electronic message.
2. The method of claim 1, wherein the encoding information is received into the terminal by way of a smart card.
3. The method of claim 1, wherein the electronic message, the encoding information and the sender identity information is sent by way of the Internet.
4. The method of claim 1, wherein the encoding information is a digital signature, the validating information is a public key from the sender and the step of validating the identity of the sender comprises the steps of:
applying a hashing algorithm to the electronic message;
applying the associated sender public key to the digital
signature; and
validating the identity of the sender by determining whether the results of applying the hashing algorithm to the electronic message match the results of applying the public key to the digital signature.
5. The method of claim 4, wherein the terminal receives the digital signature by way of a smart card.
6. A computer readable medium having computer-executable instructions for performing the steps recited in claim 1.
7. A method of validating the identity of a sender of an electronic message comprising the steps of:
associating a sender public key with sender account information in a computer system;
receiving into a terminal, the electronic message, a digital signature derived from the electronic message and the sender account information;
sending the electronic message, the digital signature and the sender account information to the computer system;
in the computer system, retrieving the sender public key associated with the received sender account information; and
validating the identity of the sender using the sender public key, the digital signature and the electronic message.
8. The method of claim 7, wherein the digital signature is received into the terminal by way of a smart card.
9. The method of claim 7, wherein the electronic message, the digital signature and the sender account information is sent by way of the Internet.
10. The method of claim 7 wherein the step of validating the identity of the sender comprises the steps of:
applying a hashing algorithm to the electronic message;
applying the associated sender public key to the
digital signature; and
validating the identity of the sender by determining whether the results of applying the hashing algorithm to the electronic message match the results of applying the associated sender public key to the digital signature.
11. A computer readable medium having computer-executable instructions for performing the steps recited in claim 7.
12. A method of validating the identity of a sender of an electronic message comprising the steps of:
receiving an encoding key, an electronic message and sender identity information into a terminal;
applying the encoding key to the electronic message to create an encoded message;
sending the encoded message, the electronic message and sender identity information to a computer system for validation; and
receiving from the computer system whether the message was validated.
13. The method of claim 12, wherein the encoded message is a digital signature of the sender.
14. The method of claim 13, wherein the encoding key is the sender's private key.
15. The method of claim 12, wherein the encoded message, the electronic message and the sender identity information is sent via the Internet.
16. A computer readable medium having computer-executable instructions for performing the steps recited in claim 12.
17. A method of validating the identity of a sender of an electronic message comprising the steps of:
receiving an encoded message, an electronic message and sender identity information into a terminal;
sending the encoded message, the electronic message and sender identity information to a computer system for validation;
receiving from the computer system whether the message was validated; and
performing an action based on the electronic message and received validation results.
18. The method of claim 17, wherein the encoded message is a digital signature of the sender.
19. The method of claim 17, wherein the encoded message, the electronic message and the sender identity information is sent via the Internet.
20. A computer readable medium having computer-executable instructions for performing the steps recited in claim 17.
21. A method of validating the identity of a sender of an electronic message comprising the steps of:
associating validation information from the sender with sender identity information;
receiving the electronic message, an encoded message and the sender identity information electronically;
retrieving the validation information associated with the received sender identity information;
applying validation information to the encoded message; and
validating the identity of the sender by comparing the results of applying the validation information to the encoded message to the electronic message.
22. The method of claim 21, wherein the step of validating the identity of the sender comprises:
applying a hashing algorithm to the electronic message; and
comparing the results of the hashing algorithm to the results of applying the validation information to the encoded message.
23. The method of claim 21, wherein the encoded message is a digital signature and the validation information is a public key from the sender.
24. The method of claim 21, wherein the results of the validation is sent to a terminal.
25. The method of claim 21, wherein the electronic message, the encoded message and the sender identity information is received from the Internet.
26. A computer readable medium having computer-executable instructions for performing the steps recited in claim 21.
27. A method of validating the identity of a sender of an electronic message comprising the steps of:
associating a public key from the sender with sender account information;
receiving the electronic message, a digital signature and the sender account information electronically;
retrieving the public key associated with the received sender account information;
applying the public key to the received digital signature; and
validating identity of the sender by comparing the results of applying the public key to the digital signature to the electronic message.
28. The method of claim 27, wherein the step of validating the identity of the sender comprising the steps of:
applying a hashing algorithm to the electronic message; and
comparing the results of the hashing algorithm to the results of applying the validation information to the encoded message.
29. The method of claim 27, wherein the results of the validation is sent to a terminal.
30. The method of claim 27, wherein the electronic message, the digital signature and the sender account information is received from the Internet.
31. A computer readable medium having computer-executable instructions for performing the steps recited in claim 27.
US09/860,083 1998-11-09 2001-05-17 Three party account authority digital signature (AADS) system Expired - Fee Related US8620814B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/860,083 US8620814B2 (en) 1998-11-09 2001-05-17 Three party account authority digital signature (AADS) system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US18915998A 1998-11-09 1998-11-09
US09/860,083 US8620814B2 (en) 1998-11-09 2001-05-17 Three party account authority digital signature (AADS) system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US18915998A Continuation 1998-11-09 1998-11-09

Publications (3)

Publication Number Publication Date
US20020032860A1 true US20020032860A1 (en) 2002-03-14
US20020112160A2 US20020112160A2 (en) 2002-08-15
US8620814B2 US8620814B2 (en) 2013-12-31

Family

ID=22696181

Family Applications (9)

Application Number Title Priority Date Filing Date
US09/189,159 Expired - Lifetime US6820202B1 (en) 1998-11-09 1998-11-09 Account authority digital signature (AADS) system
US09/860,083 Expired - Fee Related US8620814B2 (en) 1998-11-09 2001-05-17 Three party account authority digital signature (AADS) system
US10/011,496 Expired - Lifetime US6981154B2 (en) 1998-11-09 2001-12-05 Account authority digital signature (AADS) accounts
US10/090,091 Expired - Lifetime US6820199B2 (en) 1998-11-09 2002-03-04 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
US10/710,972 Expired - Lifetime US7257228B2 (en) 1998-11-09 2004-08-16 Account authority digital signature (AADS) system using encoded information
US10/711,127 Expired - Lifetime US7032112B2 (en) 1998-11-09 2004-08-25 Account authority digital signature (AADS) system using transactional account information
US10/711,132 Expired - Lifetime US7089421B2 (en) 1998-11-09 2004-08-26 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
US10/711,149 Expired - Fee Related US7549050B2 (en) 1998-11-09 2004-08-27 Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system
US10/711,147 Expired - Fee Related US7519821B2 (en) 1998-11-09 2004-08-27 Account authority digital signature (AADS) system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/189,159 Expired - Lifetime US6820202B1 (en) 1998-11-09 1998-11-09 Account authority digital signature (AADS) system

Family Applications After (7)

Application Number Title Priority Date Filing Date
US10/011,496 Expired - Lifetime US6981154B2 (en) 1998-11-09 2001-12-05 Account authority digital signature (AADS) accounts
US10/090,091 Expired - Lifetime US6820199B2 (en) 1998-11-09 2002-03-04 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
US10/710,972 Expired - Lifetime US7257228B2 (en) 1998-11-09 2004-08-16 Account authority digital signature (AADS) system using encoded information
US10/711,127 Expired - Lifetime US7032112B2 (en) 1998-11-09 2004-08-25 Account authority digital signature (AADS) system using transactional account information
US10/711,132 Expired - Lifetime US7089421B2 (en) 1998-11-09 2004-08-26 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
US10/711,149 Expired - Fee Related US7549050B2 (en) 1998-11-09 2004-08-27 Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system
US10/711,147 Expired - Fee Related US7519821B2 (en) 1998-11-09 2004-08-27 Account authority digital signature (AADS) system

Country Status (1)

Country Link
US (9) US6820202B1 (en)

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002088891A2 (en) * 2001-05-01 2002-11-07 United Parcel Service Of America, Inc. Account opening facilitation system, method and computer program product
US20040078328A1 (en) * 2002-02-07 2004-04-22 Talbert Vincent W. Method and system for completing a transaction between a customer and a merchant
US20050102235A1 (en) * 2001-01-10 2005-05-12 Michael Waidner Method and system for processing of documents with electronic signatures
US20050262829A1 (en) * 1998-06-23 2005-12-01 Kazuhiro Itoh Exhaust gas purification device of internal combustion engine
US6973093B1 (en) 2000-12-29 2005-12-06 Cisco Technology, Inc. Switching fabric for interfacing a host processor and a plurality of network modules
US20060229996A1 (en) * 2005-04-11 2006-10-12 I4 Licensing Llc Consumer processing system and method
US20060229974A1 (en) * 2005-04-11 2006-10-12 I4 Licensing Llc Method of extending credit to at least one consumer and method of processing a transaction between a consumer and a merchant
US20060226216A1 (en) * 2005-04-11 2006-10-12 I4 Licensing Llc Method and system for risk management in a transaction
US20060259440A1 (en) * 2005-05-13 2006-11-16 Keycorp Method and system for electronically signing a document
US20070179903A1 (en) * 2006-01-30 2007-08-02 Microsoft Corporation Identity theft mitigation
US20070288375A1 (en) * 2004-02-23 2007-12-13 I4 Licensing Llc Computer-Implemented Method, System and Apparatus for the Dynamic Verification of a Consumer Engaged in a Transaction with a Merchant and Authorization of the Transaction
US20070288390A1 (en) * 2001-07-06 2007-12-13 Nokia Corporation Relating to Consumption of Content
US20080084875A1 (en) * 2006-10-06 2008-04-10 Nokia Corporation System, method, apparatus, and computer program product for providing a social network diagram in a p2p network device
US20080167956A1 (en) * 2007-01-09 2008-07-10 I4 Commerce Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of sale
US20080185429A1 (en) * 2007-02-05 2008-08-07 First Data Corporation Authentication Of PIN-Less Transactions
US20080189209A1 (en) * 2007-02-05 2008-08-07 First Data Corporation Real-Time Funds Transfer
US20080203153A1 (en) * 2007-02-26 2008-08-28 I4 Commerce Inc. Method and system for engaging in a transaction between a consumer and a merchant
US20080222049A1 (en) * 2007-02-05 2008-09-11 First Data Corporation Digital Signature Authentication
US20090144897A1 (en) * 1998-05-19 2009-06-11 Brian Edward Le Gette Frame member and attached membranes
US8001040B2 (en) 2005-01-25 2011-08-16 Ebay Inc. Computer-implemented method and system for dynamic consumer rating in a transaction
CN102467585A (en) * 2010-11-05 2012-05-23 江西金格网络科技有限责任公司 Electronic signature, verification and revocation method of DWG document
US8204945B2 (en) 2000-06-19 2012-06-19 Stragent, Llc Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US8719164B2 (en) 2008-06-19 2014-05-06 Bill Me Later, Inc. Method and system for engaging in a transaction between a business entity and a merchant
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US9117069B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Real-time vulnerability monitoring
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US20170353316A1 (en) * 2015-06-09 2017-12-07 Dresser, Inc. Securing network communications on industrial automation systems
CN109525392A (en) * 2017-09-20 2019-03-26 上海方付通商务服务有限公司 EID pasting card, mobile terminal device and eID Verification System
US10580070B2 (en) 2007-05-02 2020-03-03 Paypal, Inc. Distributed system for commerce
US11032254B2 (en) * 2016-09-06 2021-06-08 Red Hat, Inc. Binding data to a network in the presence of an entity
US11245653B2 (en) * 2014-01-07 2022-02-08 Elementum, LLC Methods and systems for creating and using massless currency
US11308465B2 (en) * 2015-06-12 2022-04-19 Em Microelectronic-Marin S.A. Method for programming banking data in an integrated circuit of a watch

Families Citing this family (123)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AUPO504597A0 (en) 1997-02-10 1997-03-06 Resmed Limited A mask and a vent assembly therefor
US7083087B1 (en) 2000-09-18 2006-08-01 E-Micro Corporation Method and apparatus for associating identification and personal data for multiple magnetic stripe cards or other sources
US7357312B2 (en) * 1998-05-29 2008-04-15 Gangi Frank J System for associating identification and personal data for multiple magnetic stripe cards or other sources to facilitate a transaction and related methods
US6131811A (en) 1998-05-29 2000-10-17 E-Micro Corporation Wallet consolidator
US6820202B1 (en) * 1998-11-09 2004-11-16 First Data Corporation Account authority digital signature (AADS) system
US7058817B1 (en) 1999-07-02 2006-06-06 The Chase Manhattan Bank System and method for single sign on process for websites with multiple applications and services
US7729986B1 (en) 1999-07-30 2010-06-01 Visa International Service Association Smart card transactions using wireless telecommunications network
JP2001125846A (en) * 1999-10-26 2001-05-11 Fujitsu Ltd Electronic device and storage medium
WO2001033477A2 (en) 1999-11-04 2001-05-10 Jpmorgan Chase Bank System and method for automated financial project management
US8571975B1 (en) 1999-11-24 2013-10-29 Jpmorgan Chase Bank, N.A. System and method for sending money via E-mail over the internet
US10275780B1 (en) 1999-11-24 2019-04-30 Jpmorgan Chase Bank, N.A. Method and apparatus for sending a rebate via electronic mail over the internet
AU777912B2 (en) * 2000-02-29 2004-11-04 International Business Machines Corporation System and method of associating devices to secure commercial transactions performed over the internet
SE517460C2 (en) * 2000-03-24 2002-06-11 Imp Internat Ab Method and system for encryption and authentication
US6990581B1 (en) * 2000-04-07 2006-01-24 At&T Corp. Broadband certified mail
WO2001082246A2 (en) 2000-04-24 2001-11-01 Visa International Service Association Online payer authentication service
US7032023B1 (en) 2000-05-16 2006-04-18 America Online, Inc. Throttling electronic communications from one or more senders
US7043456B2 (en) * 2000-06-05 2006-05-09 Telefonaktiebolaget Lm Ericsson (Publ) Mobile electronic transaction personal proxy
US7426530B1 (en) 2000-06-12 2008-09-16 Jpmorgan Chase Bank, N.A. System and method for providing customers with seamless entry to a remote server
US10185936B2 (en) 2000-06-22 2019-01-22 Jpmorgan Chase Bank, N.A. Method and system for processing internet payments
US7747866B1 (en) * 2000-08-24 2010-06-29 Jpmorgan Chase Bank, N.A. System and method providing improved error detection related to transmission of data over a communication link
US8335855B2 (en) 2001-09-19 2012-12-18 Jpmorgan Chase Bank, N.A. System and method for portal infrastructure tracking
US20110131136A1 (en) * 2001-03-20 2011-06-02 David Lawrence Risk Management Customer Registry
US7062555B1 (en) 2001-04-06 2006-06-13 Networks Associates Technology, Inc. System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment
US6983326B1 (en) * 2001-04-06 2006-01-03 Networks Associates Technology, Inc. System and method for distributed function discovery in a peer-to-peer network environment
US7136840B2 (en) * 2001-04-20 2006-11-14 Intertrust Technologies Corp. Systems and methods for conducting transactions and communications using a trusted third party
US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
US7676430B2 (en) * 2001-05-09 2010-03-09 Lenovo (Singapore) Ptd. Ltd. System and method for installing a remote credit card authorization on a system with a TCPA complaint chipset
US7380126B2 (en) * 2001-06-01 2008-05-27 Logan James D Methods and apparatus for controlling the transmission and receipt of email messages
WO2002099598A2 (en) 2001-06-07 2002-12-12 First Usa Bank, N.A. System and method for rapid updating of credit information
EP1436682B1 (en) * 2001-06-15 2015-09-02 Link Us All, Llc System and method for specifying security, privacy, and access control to information used by others
FR2826811B1 (en) * 2001-06-27 2003-11-07 France Telecom CRYPTOGRAPHIC AUTHENTICATION PROCESS
US7266839B2 (en) 2001-07-12 2007-09-04 J P Morgan Chase Bank System and method for providing discriminated content to network users
US7269622B2 (en) * 2001-07-26 2007-09-11 International Business Machines Corporation Watermarking messaging sessions
US20030023850A1 (en) * 2001-07-26 2003-01-30 International Business Machines Corporation Verifying messaging sessions by digital signatures of participants
US7257617B2 (en) * 2001-07-26 2007-08-14 International Business Machines Corporation Notifying users when messaging sessions are recorded
US7103576B2 (en) 2001-09-21 2006-09-05 First Usa Bank, Na System for providing cardless payment
WO2003028283A1 (en) * 2001-09-21 2003-04-03 Telefonaktiebolaget Lm Ericsson (Publ) Arrangement and method for execution of code
EP1444568A4 (en) 2001-11-01 2005-11-09 Bank One Delaware Nat Ass System and method for establishing or modifying an account with user selectable terms
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
JP2003249919A (en) * 2001-12-17 2003-09-05 Fujitsu Ltd Two-way communication method
US7941533B2 (en) 2002-02-19 2011-05-10 Jpmorgan Chase Bank, N.A. System and method for single sign-on session management without central server
US7707120B2 (en) * 2002-04-17 2010-04-27 Visa International Service Association Mobile account authentication service
US7194537B2 (en) * 2002-05-13 2007-03-20 Ricoh Co. Ltd. Method for scrambling information about network devices that is placed in email message
JP4619119B2 (en) 2002-08-06 2011-01-26 プリヴァリス・インコーポレーテッド Method for secure registration and backup of personal identification to an electronic device
SG145524A1 (en) * 2002-08-07 2008-09-29 Mobilastic Technologies Pte Lt Secure transfer of digital tokens
US7877607B2 (en) * 2002-08-30 2011-01-25 Hewlett-Packard Development Company, L.P. Tamper-evident data management
WO2004025413A2 (en) * 2002-09-10 2004-03-25 Visa International Service Association Data authentication and provisioning method and system
US7058660B2 (en) 2002-10-02 2006-06-06 Bank One Corporation System and method for network-based project management
US8301493B2 (en) 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
JP4256670B2 (en) * 2002-12-10 2009-04-22 富士通株式会社 Capacitor element, semiconductor device and manufacturing method thereof
US7461260B2 (en) * 2002-12-31 2008-12-02 Intel Corporation Methods and apparatus for finding a shared secret without compromising non-shared secrets
KR100493885B1 (en) * 2003-01-20 2005-06-10 삼성전자주식회사 Electronic Registration and Verification System of Smart Card Certificate For Users in A Different Domain in a Public Key Infrastructure and Method Thereof
KR101037838B1 (en) 2003-04-25 2011-05-31 애플 인크. Methods and system for secure network-based distribution of content
JP4036333B2 (en) * 2003-05-23 2008-01-23 日本アイ・ビー・エム株式会社 Sender mail server, receiver mail server, e-mail system, signature data management method, and program
US8190893B2 (en) 2003-10-27 2012-05-29 Jp Morgan Chase Bank Portable security transaction protocol
KR100537514B1 (en) * 2003-11-01 2005-12-19 삼성전자주식회사 Electronic signature method based on identity information of group members and method for acquiring identity information of signed-group member and electronic signature system for performing electronic signature based on identity information of group members
WO2005050934A1 (en) * 2003-11-17 2005-06-02 Fotta Keith A Method and apparatus for regulating unsolicited electronic mail
US20050129066A1 (en) * 2003-12-15 2005-06-16 Steven Tischer Systems, methods, and storage medium for transmitting data over a computer network
US7730137B1 (en) * 2003-12-22 2010-06-01 Aol Inc. Restricting the volume of outbound electronic messages originated by a single entity
US8452880B2 (en) * 2003-12-22 2013-05-28 Oracle International Corporation System and method for verifying intended contents of an electronic message
US20050177504A1 (en) * 2004-02-10 2005-08-11 Bottomline Technologies (De) Inc. System and method for remotely authorizing a payment transaction file over an open network
US7236957B2 (en) * 2004-02-10 2007-06-26 Bottomline Technologies (De) Inc. Method for remotely authorizing a payment transaction file over an open network
US8762283B2 (en) * 2004-05-03 2014-06-24 Visa International Service Association Multiple party benefit from an online authentication service
WO2005125092A1 (en) 2004-06-09 2005-12-29 John Michael Taylor Identity verification system
US20060010322A1 (en) * 2004-07-12 2006-01-12 Sbc Knowledge Ventures, L.P. Record management of secured email
US7014107B2 (en) * 2004-07-20 2006-03-21 Irek Singer Wireless payment processing system
US20060155770A1 (en) * 2004-11-11 2006-07-13 Ipdev Co. System and method for time-based allocation of unique transaction identifiers in a multi-server system
US10248951B2 (en) 2004-12-01 2019-04-02 Metavante Corporation E-coupon settlement and clearing process
US20060131390A1 (en) * 2004-12-16 2006-06-22 Kim Mike I Method and system for providing transaction notification and mobile reply authorization
US20060131385A1 (en) * 2004-12-16 2006-06-22 Kim Mike I Conditional transaction notification and implied approval system
US7568104B2 (en) * 2005-01-19 2009-07-28 International Business Machines Corporation Method and apparatus for adding signature information to electronic documents
US8185877B1 (en) 2005-06-22 2012-05-22 Jpmorgan Chase Bank, N.A. System and method for testing applications
US7756932B2 (en) 2005-07-29 2010-07-13 Research In Motion Limited System and method for processing messages being composed by a user
ATE374478T1 (en) * 2005-08-05 2007-10-15 Sap Ag SYSTEM AND METHOD FOR RENEWING KEYS USED IN PUBLIC-KEY CRYPTOGRAPHY
US8583926B1 (en) 2005-09-19 2013-11-12 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US8452966B1 (en) * 2005-10-26 2013-05-28 Adobe Systems Incorporated Methods and apparatus for verifying a purported user identity
WO2007056499A2 (en) * 2005-11-08 2007-05-18 Ipdev Co. Ordering system and method goods and services using a stateless communication protocol
CN1835434B (en) * 2006-04-10 2012-07-18 北京易恒信认证科技有限公司 Electronic mail system and method based on CPK safety authentication
US8793490B1 (en) 2006-07-14 2014-07-29 Jpmorgan Chase Bank, N.A. Systems and methods for multifactor authentication
US8712396B2 (en) 2007-01-17 2014-04-29 Eagency, Inc. Mobile communication device monitoring systems and methods
US8126456B2 (en) * 2007-01-17 2012-02-28 Eagency, Inc. Mobile communication device monitoring systems and methods
US9324074B2 (en) 2007-01-17 2016-04-26 Eagency, Inc. Mobile communication device monitoring systems and methods
US10045327B2 (en) 2007-01-17 2018-08-07 Eagency, Inc. Mobile communication device monitoring systems and methods
US20080208697A1 (en) * 2007-02-23 2008-08-28 Kargman James B Secure system and method for payment card and data storage and processing via information splitting
US8473735B1 (en) 2007-05-17 2013-06-25 Jpmorgan Chase Systems and methods for managing digital certificates
WO2009039600A1 (en) * 2007-09-24 2009-04-02 International Business Machines Coporation System and method for secure verification of electronic transactions
US8321682B1 (en) 2008-01-24 2012-11-27 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
US20100322427A1 (en) * 2008-03-31 2010-12-23 Robert Bosch Gmch Method for managing encryption keys in a communication network
US20090276347A1 (en) * 2008-05-01 2009-11-05 Kargman James B Method and apparatus for use of a temporary financial transaction number or code
US20090307759A1 (en) * 2008-06-06 2009-12-10 Microsoft Corporation Temporary Domain Membership for Content Sharing
US8285985B2 (en) * 2008-12-15 2012-10-09 Sap Ag Systems and methods for detecting exposure of private keys
US8589372B2 (en) 2008-12-16 2013-11-19 Clinton A. Krislov Method and system for automated document registration with cloud computing
US8341141B2 (en) * 2008-12-16 2012-12-25 Krislov Clinton A Method and system for automated document registration
US8914351B2 (en) 2008-12-16 2014-12-16 Clinton A. Krislov Method and system for secure automated document registration from social media networks
US8332329B1 (en) 2009-04-22 2012-12-11 United Services Automobile Association (Usaa) Virtual check
US9608826B2 (en) 2009-06-29 2017-03-28 Jpmorgan Chase Bank, N.A. System and method for partner key management
CA2717222A1 (en) 2009-10-08 2011-04-08 Compriva Communications Privacy Solutions Inc System, device and method for securely transferring data across a network
US8301895B2 (en) * 2009-12-02 2012-10-30 Microsoft Corporation Identity based network policy enablement
EP2437194A1 (en) * 2010-10-01 2012-04-04 Nagravision S.A. System and method to prevent manipulation of video data transmitted on an HDMI link.
CN101951317B (en) * 2010-08-11 2012-05-23 上海燕托计算机有限公司 Digital signature method for linear electronic transaction
DE102010038094A1 (en) * 2010-10-11 2012-04-12 Francotyp-Postalia Gmbh Procedure and arrangement for legally binding sending and receiving of confidential electronic messages
US8775794B2 (en) 2010-11-15 2014-07-08 Jpmorgan Chase Bank, N.A. System and method for end to end encryption
US9160725B2 (en) * 2011-09-23 2015-10-13 Rpost Communications Limited Computer implemented system and method for authenticating a sender of electronic data to a recipient
US9419957B1 (en) 2013-03-15 2016-08-16 Jpmorgan Chase Bank, N.A. Confidence-based authentication
US8959595B2 (en) 2013-03-15 2015-02-17 Bullaproof, Inc. Methods and systems for providing secure transactions
US10148726B1 (en) 2014-01-24 2018-12-04 Jpmorgan Chase Bank, N.A. Initiating operating system commands based on browser cookies
US9374689B1 (en) * 2014-06-13 2016-06-21 Anonyome Labs, Inc. Apparatus and method for supporting telephonic synthetic identities
US9794392B2 (en) 2014-07-10 2017-10-17 Hand Held Products, Inc. Mobile-phone adapter for electronic transactions
US9667790B1 (en) 2015-04-08 2017-05-30 Jpmorgan Chase Bank, N.A. Method and system for conveying context data in a multi-channel and omni-channel environment
US9628488B1 (en) 2015-04-08 2017-04-18 Jpmorgan Chase Bank, N.A. Method and system for sensitive data abstraction
US11140171B1 (en) 2015-06-05 2021-10-05 Apple Inc. Establishing and verifying identity using action sequences while protecting user privacy
US10868672B1 (en) 2015-06-05 2020-12-15 Apple Inc. Establishing and verifying identity using biometrics while protecting user privacy
US10402792B2 (en) 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
US20170063841A1 (en) * 2015-08-27 2017-03-02 Sony Corporation Trusting intermediate certificate authorities
US9992028B2 (en) 2015-11-26 2018-06-05 International Business Machines Corporation System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
CN109313753A (en) * 2016-04-01 2019-02-05 摩根大通国家银行 System and method for providing data privacy in private distributed ledgers
CN108337213A (en) * 2017-01-20 2018-07-27 深圳市优朋普乐传媒发展有限公司 A kind of method and device of account management
CN107784580B (en) * 2017-09-15 2020-10-27 数据通信科学技术研究所 Public and private key pair-based derived centerless digital currency transaction method
US11526859B1 (en) 2019-11-12 2022-12-13 Bottomline Technologies, Sarl Cash flow forecasting using a bottoms-up machine learning approach
US11532040B2 (en) 2019-11-12 2022-12-20 Bottomline Technologies Sarl International cash management software using machine learning
US11704671B2 (en) 2020-04-02 2023-07-18 Bottomline Technologies Limited Financial messaging transformation-as-a-service
US11328274B2 (en) 2020-07-28 2022-05-10 Bank Of America Corporation Data processing system and method for managing electronic split transactions using user profiles

Citations (98)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3962539A (en) * 1975-02-24 1976-06-08 International Business Machines Corporation Product block cipher system for data security
US4128582A (en) * 1973-06-04 1978-12-05 Ethyl Corporation Chemical process
US4200770A (en) * 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4408203A (en) * 1978-01-09 1983-10-04 Mastercard International, Inc. Security system for electronic funds transfer system
US4424414A (en) * 1978-05-01 1984-01-03 Board Of Trustees Of The Leland Stanford Junior University Exponentiation cryptographic apparatus and method
US4734564A (en) * 1985-05-02 1988-03-29 Visa International Service Association Transaction system with off-line risk assessment
US4748668A (en) * 1986-07-09 1988-05-31 Yeda Research And Development Company Limited Method, apparatus and article for identification and signature
US4797920A (en) * 1987-05-01 1989-01-10 Mastercard International, Inc. Electronic funds transfer system with means for verifying a personal identification number without pre-established secret keys
US4823388A (en) * 1984-06-25 1989-04-18 Kabushiki Kaisha Toshiba Communications network using an enciphering and deciphering device
US4825050A (en) * 1983-09-13 1989-04-25 Transaction Security Corporation Security transaction system for financial data
US4850017A (en) * 1987-05-29 1989-07-18 International Business Machines Corp. Controlled use of cryptographic keys via generating station established control values
US4868877A (en) * 1988-02-12 1989-09-19 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US4885788A (en) * 1986-02-17 1989-12-05 Hitachi, Ltd. IC card
US5018196A (en) * 1985-09-04 1991-05-21 Hitachi, Ltd. Method for electronic transaction with digital signature
US5097504A (en) * 1986-03-19 1992-03-17 Infoscript Method and device for qualitative saving of digitized data
US5140634A (en) * 1987-09-07 1992-08-18 U.S Philips Corporation Method and apparatus for authenticating accreditations and for authenticating and signing messages
US5209208A (en) * 1989-08-08 1993-05-11 Robert Bosch Gmbh Fuel injection pump for diesel internal combustion engines
US5214703A (en) * 1990-05-18 1993-05-25 Ascom Tech Ag Device for the conversion of a digital block and use of same
US5225978A (en) * 1989-01-25 1993-07-06 Usisys Corp. Document processing system having integrated expert module
US5231668A (en) * 1991-07-26 1993-07-27 The United States Of America, As Represented By The Secretary Of Commerce Digital signature algorithm
US5453601A (en) * 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5455865A (en) * 1989-05-09 1995-10-03 Digital Equipment Corporation Robust packet routing over a distributed network containing malicious failures
US5502766A (en) * 1992-04-17 1996-03-26 Secure Computing Corporation Data enclave and trusted path system
US5509071A (en) * 1994-04-01 1996-04-16 Microelectronics And Computer Technology Corporation Electronic proof of receipt
US5534855A (en) * 1992-07-20 1996-07-09 Digital Equipment Corporation Method and system for certificate based alias detection
US5539828A (en) * 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
US5563946A (en) * 1994-04-25 1996-10-08 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
US5571120A (en) * 1992-08-17 1996-11-05 Yoon; Inbae Ligating instrument and methods of ligating tissue in endoscopic operative procedures
US5586036A (en) * 1994-07-05 1996-12-17 Pitney Bowes Inc. Postage payment system with security for sensitive mailer data and enhanced carrier data functionality
US5590197A (en) * 1995-04-04 1996-12-31 V-One Corporation Electronic payment system and method
US5604801A (en) * 1995-02-03 1997-02-18 International Business Machines Corporation Public key data communications system under control of a portable security device
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5615266A (en) * 1995-07-13 1997-03-25 Motorola, Inc Secure communication setup method
US5619574A (en) * 1995-02-13 1997-04-08 Eta Technologies Corporation Personal access management system
US5623637A (en) * 1993-12-06 1997-04-22 Telequip Corporation Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
US5625690A (en) * 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5636280A (en) * 1994-10-31 1997-06-03 Kelly; Tadhg Dual key reflexive encryption security system
US5659616A (en) * 1994-07-19 1997-08-19 Certco, Llc Method for securely using digital signatures in a commercial cryptographic system
US5671285A (en) * 1995-12-13 1997-09-23 Newman; Bruce D. Secure communication system
US5671279A (en) * 1995-11-13 1997-09-23 Netscape Communications Corporation Electronic commerce using a secure courier system
US5677955A (en) * 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
US5677953A (en) * 1993-09-14 1997-10-14 Spyrus, Inc. System and method for access control for portable data storage media
US5694471A (en) * 1994-08-03 1997-12-02 V-One Corporation Counterfeit-proof identification card
US5708780A (en) * 1995-06-07 1998-01-13 Open Market, Inc. Internet server access control and monitoring systems
US5715314A (en) * 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
US5721779A (en) * 1995-08-28 1998-02-24 Funk Software, Inc. Apparatus and methods for verifying the identity of a party
US5724424A (en) * 1993-12-16 1998-03-03 Open Market, Inc. Digital active advertising
US5745886A (en) * 1995-06-07 1998-04-28 Citibank, N.A. Trusted agents for open distribution of electronic money
US5751813A (en) * 1996-04-29 1998-05-12 Motorola, Inc. Use of an encryption server for encrypting messages
US5778072A (en) * 1995-07-07 1998-07-07 Sun Microsystems, Inc. System and method to transparently integrate private key operations from a smart card with host-based encryption services
US5781723A (en) * 1996-06-03 1998-07-14 Microsoft Corporation System and method for self-identifying a portable information device to a computing unit
US5790677A (en) * 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
US5809144A (en) * 1995-08-24 1998-09-15 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network
US5812666A (en) * 1995-03-31 1998-09-22 Pitney Bowes Inc. Cryptographic key management and validation system
US5848161A (en) * 1996-05-16 1998-12-08 Luneau; Greg Method for providing secured commerical transactions via a networked communications system
US5862327A (en) * 1996-06-10 1999-01-19 Tactica Corporation Activity based long-lived transaction system
US5878142A (en) * 1994-07-12 1999-03-02 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
US5878172A (en) * 1994-10-28 1999-03-02 Oki Electric Industry Co., Ltd. Image encoding and decoding method and apparatus using edge synthesis and inverse wavelet transform
US5887131A (en) * 1996-12-31 1999-03-23 Compaq Computer Corporation Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password
US5903882A (en) * 1996-12-13 1999-05-11 Certco, Llc Reliance server for electronic transaction system
US5910989A (en) * 1995-04-20 1999-06-08 Gemplus Method for the generation of electronic signatures, in particular for smart cards
US5910988A (en) * 1997-08-27 1999-06-08 Csp Holdings, Inc. Remote image capture with centralized processing and storage
US5928298A (en) * 1996-02-23 1999-07-27 Koyo Seiko Co., Ltd. Electric power steering apparatus
US5943423A (en) * 1995-12-15 1999-08-24 Entegrity Solutions Corporation Smart token system for secure electronic transactions and identification
US5949881A (en) * 1995-12-04 1999-09-07 Intel Corporation Apparatus and method for cryptographic companion imprinting
US5956404A (en) * 1996-09-30 1999-09-21 Schneier; Bruce Digital signature with auditing bits
US5963648A (en) * 1994-04-28 1999-10-05 Citibank, N.A. Electronic-monetary system
US5970147A (en) * 1997-09-30 1999-10-19 Intel Corporation System and method for configuring and registering a cryptographic device
US6000832A (en) * 1997-09-24 1999-12-14 Microsoft Corporation Electronic online commerce card with customer generated transaction proxy number for online transactions
US6000522A (en) * 1995-06-12 1999-12-14 Alice A Johnson Multi-compartment and acceptors computerized vending machine
US6009177A (en) * 1994-01-13 1999-12-28 Certco Llc Enhanced cryptographic system and method with key escrow feature
US6021202A (en) * 1996-12-20 2000-02-01 Financial Services Technology Consortium Method and system for processing electronic documents
US6023509A (en) * 1996-09-30 2000-02-08 Intel Corporation Digital signature purpose encoding
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US6044154A (en) * 1994-10-31 2000-03-28 Communications Devices, Inc. Remote generated, device identifier key for use with a dual-key reflexive encryption security system
US6047051A (en) * 1996-11-11 2000-04-04 Nokia Telecommunications Oy Implementation of charging in a telecommunications system
US6061794A (en) * 1997-09-30 2000-05-09 Compaq Computer Corp. System and method for performing secure device communications in a peer-to-peer bus architecture
US6061799A (en) * 1997-10-31 2000-05-09 International Business Machines Corp. Removable media for password based authentication in a distributed system
US6070154A (en) * 1998-11-27 2000-05-30 Activepoint Ltd. Internet credit card security
US6084969A (en) * 1997-12-31 2000-07-04 V-One Corporation Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network
US6092202A (en) * 1998-05-22 2000-07-18 N*Able Technologies, Inc. Method and system for secure transactions in a computer system
US6102287A (en) * 1998-05-15 2000-08-15 International Business Machines Corporation Method and apparatus for providing product survey information in an electronic payment system
US6105012A (en) * 1997-04-22 2000-08-15 Sun Microsystems, Inc. Security system and method for financial institution server and client web browser
US6108644A (en) * 1998-02-19 2000-08-22 At&T Corp. System and method for electronic transactions
US6111956A (en) * 1997-10-23 2000-08-29 Signals, Inc. Method for secure key distribution over a nonsecure communications network
US6128738A (en) * 1998-04-22 2000-10-03 International Business Machines Corporation Certificate based security in SNA data flows
US6134325A (en) * 1994-05-24 2000-10-17 Certicom Corp. Key transmission system
US6144949A (en) * 1998-02-12 2000-11-07 Motorola, Inc. Radio frequency communication system with subscribers arranged to authenticate a received message
US6154543A (en) * 1998-11-25 2000-11-28 Hush Communications Anguilla, Inc. Public key cryptosystem with roaming user capability
US6161181A (en) * 1998-03-06 2000-12-12 Deloitte & Touche Usa Llp Secure electronic transactions using a trusted intermediary
US6161180A (en) * 1997-08-29 2000-12-12 International Business Machines Corporation Authentication for secure devices with limited cryptography
US6167518A (en) * 1998-07-28 2000-12-26 Commercial Electronics, Llc Digital signature providing non-repudiation based on biological indicia
US6189096B1 (en) * 1998-05-06 2001-02-13 Kyberpass Corporation User authentification using a virtual private key
US6192130B1 (en) * 1998-06-19 2001-02-20 Entrust Technologies Limited Information security subscriber trust authority transfer system with private key history transfer
US6223577B1 (en) * 1999-11-04 2001-05-01 Panelmaster International, Inc. Automated profile control—roll forming
US6233577B1 (en) * 1998-02-17 2001-05-15 Phone.Com, Inc. Centralized certificate management system for two-way interactive communication devices in data networks
US6324525B1 (en) * 1996-06-17 2001-11-27 Hewlett-Packard Company Settlement of aggregated electronic transactions over a network

Family Cites Families (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218582A (en) 1977-10-06 1980-08-19 The Board Of Trustees Of The Leland Stanford Junior University Public key cryptographic apparatus and method
JPS6136844U (en) 1984-08-07 1986-03-07 株式会社 ニツクス X-ray film code sheet
US4748667A (en) * 1986-11-04 1988-05-31 Scientific Atlanta Jamming signal scrambling and descrambling systems for CATV
CA1271624A (en) 1987-06-19 1990-07-17 Donald W. Dunbar Sheath cutting tool
CA2011396C (en) 1989-03-03 1995-01-03 Kazue Tanaka Cipher-key distribution system
US5557518A (en) * 1994-04-28 1996-09-17 Citibank, N.A. Trusted agents for open electronic commerce
JP3388275B2 (en) 1993-02-01 2003-03-17 ミネベア株式会社 Driving method of multi-phase hybrid type stepping motor
CA2121852A1 (en) 1993-04-29 1994-10-30 Larry T. Jost Disk meshing and flexible storage mapping with enhanced flexible caching
US5422953A (en) * 1993-05-05 1995-06-06 Fischer; Addison M. Personal date/time notary device
US5787172A (en) 1994-02-24 1998-07-28 The Merdan Group, Inc. Apparatus and method for establishing a cryptographic link between elements of a system
HU214824B (en) 1994-03-23 1998-06-29 HYD Kutató-Fejlesztő Kft. Cosmetic, body hygiene and beauty treatment compositions which are applicable for treatment and prevention of dermatitis and process for producing them
US5862324A (en) 1994-08-23 1999-01-19 Collins; Francis R. Broadband communications network services access platform
US6950810B2 (en) 1994-11-28 2005-09-27 Indivos Corporation Tokenless biometric electronic financial transactions via a third party identicator
US6157721A (en) * 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US5577120A (en) 1995-05-01 1996-11-19 Lucent Technologies Inc. Method and apparatus for restrospectively identifying an individual who had engaged in a commercial or retail transaction or the like
DE19526254C2 (en) 1995-07-19 1998-01-29 Mannesmann Vdo Ag Passive magnetic position sensor
US6279112B1 (en) 1996-10-29 2001-08-21 Open Market, Inc. Controlled transfer of information in computer networks
US5870475A (en) * 1996-01-19 1999-02-09 Northern Telecom Limited Facilitating secure communications in a distribution network
US5677120A (en) * 1996-05-23 1997-10-14 Eastman Kodak Company Tellurium complexes as chemical sensitizers for silver halides
US6253027B1 (en) 1996-06-17 2001-06-26 Hewlett-Packard Company System, method and article of manufacture for exchanging software and configuration data over a multichannel, extensible, flexible architecture
US6373950B1 (en) 1996-06-17 2002-04-16 Hewlett-Packard Company System, method and article of manufacture for transmitting messages within messages utilizing an extensible, flexible architecture
US5825884A (en) * 1996-07-01 1998-10-20 Thomson Consumer Electronics Method and apparatus for operating a transactional server in a proprietary database environment
US6285991B1 (en) 1996-12-13 2001-09-04 Visa International Service Association Secure interactive electronic account statement delivery system
US6035402A (en) * 1996-12-20 2000-03-07 Gte Cybertrust Solutions Incorporated Virtual certificate authority
WO1998030297A1 (en) * 1997-01-10 1998-07-16 Silicon Gaming, Inc. Method and apparatus for providing authenticated, secure on-line communication between remote locations
US6282522B1 (en) 1997-04-30 2001-08-28 Visa International Service Association Internet payment system using smart card
US6310966B1 (en) * 1997-05-09 2001-10-30 Gte Service Corporation Biometric certificates
US6202151B1 (en) 1997-05-09 2001-03-13 Gte Service Corporation System and method for authenticating electronic transactions using biometric certificates
US6085976A (en) 1998-05-22 2000-07-11 Sehr; Richard P. Travel system and methods utilizing multi-application passenger cards
FI104667B (en) 1997-07-14 2000-04-14 Nokia Networks Oy Implementation of access service
US6029125A (en) 1997-09-02 2000-02-22 Telefonaktiebolaget L M Ericsson, (Publ) Reducing sparseness in coded speech signals
US6213391B1 (en) 1997-09-10 2001-04-10 William H. Lewis Portable system for personal identification based upon distinctive characteristics of the user
US5883810A (en) * 1997-09-24 1999-03-16 Microsoft Corporation Electronic online commerce card with transactionproxy number for online transactions
US6314519B1 (en) * 1997-12-22 2001-11-06 Motorola, Inc. Secure messaging system overlay for a selective call signaling system
JP2002509313A (en) 1998-01-16 2002-03-26 メディアドナ、インコーポレイテッド System and method for authenticating a peer component
US6192405B1 (en) 1998-01-23 2001-02-20 Novell, Inc. Method and apparatus for acquiring authorized access to resources in a distributed system
US6233565B1 (en) 1998-02-13 2001-05-15 Saranac Software, Inc. Methods and apparatus for internet based financial transactions with evidence of payment
US6230269B1 (en) 1998-03-04 2001-05-08 Microsoft Corporation Distributed authentication system and method
US6199052B1 (en) 1998-03-06 2001-03-06 Deloitte & Touche Usa Llp Secure electronic transactions using a trusted intermediary with archive and verification request services
US6532451B1 (en) 1998-03-23 2003-03-11 Novell, Inc. Nested strong loader apparatus and method
AU4091199A (en) 1998-05-21 1999-12-06 Equifax, Inc. System and method for authentication of network users
US6826685B1 (en) * 1998-06-10 2004-11-30 International Business Machines Corporation Method and system for the digital certificate generation and distribution
US6226618B1 (en) 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
KR100358426B1 (en) 1998-08-18 2003-01-29 한국전자통신연구원 Electronic Cash Transaction Method
KR100304959B1 (en) 1998-10-21 2001-09-24 김영환 Chip stacked semiconductor package and manufacturing method thereof
US6820202B1 (en) * 1998-11-09 2004-11-16 First Data Corporation Account authority digital signature (AADS) system
US6571339B1 (en) 1998-12-30 2003-05-27 Intel Corporation Use of a processor identification for authentication
US6418472B1 (en) 1999-01-19 2002-07-09 Intel Corporation System and method for using internet based caller ID for controlling access to an object stored in a computer
CA2271178A1 (en) 1999-05-06 1999-07-06 Connotech Experts-Conseils Inc. Server-side public key cryptography apparatus with private key protection and isolation from public networks
US6289460B1 (en) * 1999-09-13 2001-09-11 Astus Corporation Document management system
US6789189B2 (en) * 2000-08-04 2004-09-07 First Data Corporation Managing account database in ABDS system
CA2354372A1 (en) 2001-02-23 2002-08-23 Efunds Corporation Electronic payment and authentication system with debit and identification data verification and electronic check capabilities
JP4220209B2 (en) 2002-09-27 2009-02-04 株式会社アドバンテスト Electron beam exposure apparatus, deflection apparatus, and electron beam exposure method

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4128582A (en) * 1973-06-04 1978-12-05 Ethyl Corporation Chemical process
US3962539A (en) * 1975-02-24 1976-06-08 International Business Machines Corporation Product block cipher system for data security
US4200770A (en) * 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4408203A (en) * 1978-01-09 1983-10-04 Mastercard International, Inc. Security system for electronic funds transfer system
US4424414A (en) * 1978-05-01 1984-01-03 Board Of Trustees Of The Leland Stanford Junior University Exponentiation cryptographic apparatus and method
US4825050A (en) * 1983-09-13 1989-04-25 Transaction Security Corporation Security transaction system for financial data
US4823388A (en) * 1984-06-25 1989-04-18 Kabushiki Kaisha Toshiba Communications network using an enciphering and deciphering device
US4734564A (en) * 1985-05-02 1988-03-29 Visa International Service Association Transaction system with off-line risk assessment
US5018196A (en) * 1985-09-04 1991-05-21 Hitachi, Ltd. Method for electronic transaction with digital signature
US4885788A (en) * 1986-02-17 1989-12-05 Hitachi, Ltd. IC card
US5097504A (en) * 1986-03-19 1992-03-17 Infoscript Method and device for qualitative saving of digitized data
US4748668A (en) * 1986-07-09 1988-05-31 Yeda Research And Development Company Limited Method, apparatus and article for identification and signature
US4797920A (en) * 1987-05-01 1989-01-10 Mastercard International, Inc. Electronic funds transfer system with means for verifying a personal identification number without pre-established secret keys
US4850017A (en) * 1987-05-29 1989-07-18 International Business Machines Corp. Controlled use of cryptographic keys via generating station established control values
US5140634A (en) * 1987-09-07 1992-08-18 U.S Philips Corporation Method and apparatus for authenticating accreditations and for authenticating and signing messages
US4868877A (en) * 1988-02-12 1989-09-19 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5225978A (en) * 1989-01-25 1993-07-06 Usisys Corp. Document processing system having integrated expert module
US5455865A (en) * 1989-05-09 1995-10-03 Digital Equipment Corporation Robust packet routing over a distributed network containing malicious failures
US5209208A (en) * 1989-08-08 1993-05-11 Robert Bosch Gmbh Fuel injection pump for diesel internal combustion engines
US5214703A (en) * 1990-05-18 1993-05-25 Ascom Tech Ag Device for the conversion of a digital block and use of same
US5231668A (en) * 1991-07-26 1993-07-27 The United States Of America, As Represented By The Secretary Of Commerce Digital signature algorithm
US5453601A (en) * 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5502766A (en) * 1992-04-17 1996-03-26 Secure Computing Corporation Data enclave and trusted path system
US5534855A (en) * 1992-07-20 1996-07-09 Digital Equipment Corporation Method and system for certificate based alias detection
US5571120A (en) * 1992-08-17 1996-11-05 Yoon; Inbae Ligating instrument and methods of ligating tissue in endoscopic operative procedures
US5677953A (en) * 1993-09-14 1997-10-14 Spyrus, Inc. System and method for access control for portable data storage media
US5625690A (en) * 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5623637A (en) * 1993-12-06 1997-04-22 Telequip Corporation Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
US5724424A (en) * 1993-12-16 1998-03-03 Open Market, Inc. Digital active advertising
US6009177A (en) * 1994-01-13 1999-12-28 Certco Llc Enhanced cryptographic system and method with key escrow feature
US5509071A (en) * 1994-04-01 1996-04-16 Microelectronics And Computer Technology Corporation Electronic proof of receipt
US5563946A (en) * 1994-04-25 1996-10-08 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
US5963648A (en) * 1994-04-28 1999-10-05 Citibank, N.A. Electronic-monetary system
US6134325A (en) * 1994-05-24 2000-10-17 Certicom Corp. Key transmission system
US5539828A (en) * 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
US5796840A (en) * 1994-05-31 1998-08-18 Intel Corporation Apparatus and method for providing secured communications
US5586036A (en) * 1994-07-05 1996-12-17 Pitney Bowes Inc. Postage payment system with security for sensitive mailer data and enhanced carrier data functionality
US5878142A (en) * 1994-07-12 1999-03-02 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
US5659616A (en) * 1994-07-19 1997-08-19 Certco, Llc Method for securely using digital signatures in a commercial cryptographic system
US5694471A (en) * 1994-08-03 1997-12-02 V-One Corporation Counterfeit-proof identification card
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5715314A (en) * 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
US5878172A (en) * 1994-10-28 1999-03-02 Oki Electric Industry Co., Ltd. Image encoding and decoding method and apparatus using edge synthesis and inverse wavelet transform
US5636280A (en) * 1994-10-31 1997-06-03 Kelly; Tadhg Dual key reflexive encryption security system
US6044154A (en) * 1994-10-31 2000-03-28 Communications Devices, Inc. Remote generated, device identifier key for use with a dual-key reflexive encryption security system
US5604801A (en) * 1995-02-03 1997-02-18 International Business Machines Corporation Public key data communications system under control of a portable security device
US5619574A (en) * 1995-02-13 1997-04-08 Eta Technologies Corporation Personal access management system
US5812666A (en) * 1995-03-31 1998-09-22 Pitney Bowes Inc. Cryptographic key management and validation system
US5590197A (en) * 1995-04-04 1996-12-31 V-One Corporation Electronic payment system and method
US5677955A (en) * 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
US5910989A (en) * 1995-04-20 1999-06-08 Gemplus Method for the generation of electronic signatures, in particular for smart cards
US5745886A (en) * 1995-06-07 1998-04-28 Citibank, N.A. Trusted agents for open distribution of electronic money
US5708780A (en) * 1995-06-07 1998-01-13 Open Market, Inc. Internet server access control and monitoring systems
US6000522A (en) * 1995-06-12 1999-12-14 Alice A Johnson Multi-compartment and acceptors computerized vending machine
US5790677A (en) * 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
US5778072A (en) * 1995-07-07 1998-07-07 Sun Microsystems, Inc. System and method to transparently integrate private key operations from a smart card with host-based encryption services
US5615266A (en) * 1995-07-13 1997-03-25 Motorola, Inc Secure communication setup method
US5809144A (en) * 1995-08-24 1998-09-15 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network
US5721779A (en) * 1995-08-28 1998-02-24 Funk Software, Inc. Apparatus and methods for verifying the identity of a party
US5671279A (en) * 1995-11-13 1997-09-23 Netscape Communications Corporation Electronic commerce using a secure courier system
US5949881A (en) * 1995-12-04 1999-09-07 Intel Corporation Apparatus and method for cryptographic companion imprinting
US5671285A (en) * 1995-12-13 1997-09-23 Newman; Bruce D. Secure communication system
US5943423A (en) * 1995-12-15 1999-08-24 Entegrity Solutions Corporation Smart token system for secure electronic transactions and identification
US5928298A (en) * 1996-02-23 1999-07-27 Koyo Seiko Co., Ltd. Electric power steering apparatus
US5751813A (en) * 1996-04-29 1998-05-12 Motorola, Inc. Use of an encryption server for encrypting messages
US5848161A (en) * 1996-05-16 1998-12-08 Luneau; Greg Method for providing secured commerical transactions via a networked communications system
US5781723A (en) * 1996-06-03 1998-07-14 Microsoft Corporation System and method for self-identifying a portable information device to a computing unit
US5862327A (en) * 1996-06-10 1999-01-19 Tactica Corporation Activity based long-lived transaction system
US6324525B1 (en) * 1996-06-17 2001-11-27 Hewlett-Packard Company Settlement of aggregated electronic transactions over a network
US5956404A (en) * 1996-09-30 1999-09-21 Schneier; Bruce Digital signature with auditing bits
US6023509A (en) * 1996-09-30 2000-02-08 Intel Corporation Digital signature purpose encoding
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US6047051A (en) * 1996-11-11 2000-04-04 Nokia Telecommunications Oy Implementation of charging in a telecommunications system
US5903882A (en) * 1996-12-13 1999-05-11 Certco, Llc Reliance server for electronic transaction system
US6021202A (en) * 1996-12-20 2000-02-01 Financial Services Technology Consortium Method and system for processing electronic documents
US5887131A (en) * 1996-12-31 1999-03-23 Compaq Computer Corporation Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password
US6105012A (en) * 1997-04-22 2000-08-15 Sun Microsystems, Inc. Security system and method for financial institution server and client web browser
US5910988A (en) * 1997-08-27 1999-06-08 Csp Holdings, Inc. Remote image capture with centralized processing and storage
US6161180A (en) * 1997-08-29 2000-12-12 International Business Machines Corporation Authentication for secure devices with limited cryptography
US6000832A (en) * 1997-09-24 1999-12-14 Microsoft Corporation Electronic online commerce card with customer generated transaction proxy number for online transactions
US5970147A (en) * 1997-09-30 1999-10-19 Intel Corporation System and method for configuring and registering a cryptographic device
US6061794A (en) * 1997-09-30 2000-05-09 Compaq Computer Corp. System and method for performing secure device communications in a peer-to-peer bus architecture
US6111956A (en) * 1997-10-23 2000-08-29 Signals, Inc. Method for secure key distribution over a nonsecure communications network
US6061799A (en) * 1997-10-31 2000-05-09 International Business Machines Corp. Removable media for password based authentication in a distributed system
US6084969A (en) * 1997-12-31 2000-07-04 V-One Corporation Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network
US6144949A (en) * 1998-02-12 2000-11-07 Motorola, Inc. Radio frequency communication system with subscribers arranged to authenticate a received message
US6233577B1 (en) * 1998-02-17 2001-05-15 Phone.Com, Inc. Centralized certificate management system for two-way interactive communication devices in data networks
US6108644A (en) * 1998-02-19 2000-08-22 At&T Corp. System and method for electronic transactions
US6161181A (en) * 1998-03-06 2000-12-12 Deloitte & Touche Usa Llp Secure electronic transactions using a trusted intermediary
US6128738A (en) * 1998-04-22 2000-10-03 International Business Machines Corporation Certificate based security in SNA data flows
US6189096B1 (en) * 1998-05-06 2001-02-13 Kyberpass Corporation User authentification using a virtual private key
US6102287A (en) * 1998-05-15 2000-08-15 International Business Machines Corporation Method and apparatus for providing product survey information in an electronic payment system
US6092202A (en) * 1998-05-22 2000-07-18 N*Able Technologies, Inc. Method and system for secure transactions in a computer system
US6192130B1 (en) * 1998-06-19 2001-02-20 Entrust Technologies Limited Information security subscriber trust authority transfer system with private key history transfer
US6167518A (en) * 1998-07-28 2000-12-26 Commercial Electronics, Llc Digital signature providing non-repudiation based on biological indicia
US6154543A (en) * 1998-11-25 2000-11-28 Hush Communications Anguilla, Inc. Public key cryptosystem with roaming user capability
US6070154A (en) * 1998-11-27 2000-05-30 Activepoint Ltd. Internet credit card security
US6223577B1 (en) * 1999-11-04 2001-05-01 Panelmaster International, Inc. Automated profile control—roll forming

Cited By (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090144897A1 (en) * 1998-05-19 2009-06-11 Brian Edward Le Gette Frame member and attached membranes
US20050262829A1 (en) * 1998-06-23 2005-12-01 Kazuhiro Itoh Exhaust gas purification device of internal combustion engine
US8272060B2 (en) 2000-06-19 2012-09-18 Stragent, Llc Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
US8204945B2 (en) 2000-06-19 2012-06-19 Stragent, Llc Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US6973093B1 (en) 2000-12-29 2005-12-06 Cisco Technology, Inc. Switching fabric for interfacing a host processor and a plurality of network modules
US20050102235A1 (en) * 2001-01-10 2005-05-12 Michael Waidner Method and system for processing of documents with electronic signatures
WO2002088891A3 (en) * 2001-05-01 2003-12-18 United Parcel Service Inc Account opening facilitation system, method and computer program product
WO2002088891A2 (en) * 2001-05-01 2002-11-07 United Parcel Service Of America, Inc. Account opening facilitation system, method and computer program product
US7577598B2 (en) 2001-05-01 2009-08-18 United Parcel Service Of America, Inc. Account opening facilitation system, method and computer program product
US20070288390A1 (en) * 2001-07-06 2007-12-13 Nokia Corporation Relating to Consumption of Content
US20040078328A1 (en) * 2002-02-07 2004-04-22 Talbert Vincent W. Method and system for completing a transaction between a customer and a merchant
US7890393B2 (en) 2002-02-07 2011-02-15 Ebay, Inc. Method and system for completing a transaction between a customer and a merchant
US10104110B2 (en) 2003-07-01 2018-10-16 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US9117069B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Real-time vulnerability monitoring
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US10154055B2 (en) 2003-07-01 2018-12-11 Securityprofiling, Llc Real-time vulnerability monitoring
US9225686B2 (en) 2003-07-01 2015-12-29 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US10021124B2 (en) 2003-07-01 2018-07-10 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US10050988B2 (en) 2003-07-01 2018-08-14 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US8095445B2 (en) 2003-07-23 2012-01-10 Ebay, Inc. Method and system for completing a transaction between a customer and a merchant
US8571972B2 (en) 2004-02-23 2013-10-29 Bill Me Later, Inc. Computer-implemented method, system and apparatus for the dynamic verification of a consumer engaged in a transaction with a merchant and authorization of the transaction
US20070288375A1 (en) * 2004-02-23 2007-12-13 I4 Licensing Llc Computer-Implemented Method, System and Apparatus for the Dynamic Verification of a Consumer Engaged in a Transaction with a Merchant and Authorization of the Transaction
US8001040B2 (en) 2005-01-25 2011-08-16 Ebay Inc. Computer-implemented method and system for dynamic consumer rating in a transaction
US8756099B2 (en) 2005-04-11 2014-06-17 Bill Me Later, Inc. Consumer processing system and method
US20060229996A1 (en) * 2005-04-11 2006-10-12 I4 Licensing Llc Consumer processing system and method
US20060229974A1 (en) * 2005-04-11 2006-10-12 I4 Licensing Llc Method of extending credit to at least one consumer and method of processing a transaction between a consumer and a merchant
US20060226216A1 (en) * 2005-04-11 2006-10-12 I4 Licensing Llc Method and system for risk management in a transaction
US7527195B2 (en) 2005-04-11 2009-05-05 Bill Me Later, Inc. Method and system for risk management in a transaction
US20060259440A1 (en) * 2005-05-13 2006-11-16 Keycorp Method and system for electronically signing a document
US20070179903A1 (en) * 2006-01-30 2007-08-02 Microsoft Corporation Identity theft mitigation
US20080084875A1 (en) * 2006-10-06 2008-04-10 Nokia Corporation System, method, apparatus, and computer program product for providing a social network diagram in a p2p network device
US9537943B2 (en) * 2006-10-06 2017-01-03 Core Wireless Licensing S.A.R.L. System, method, apparatus, and computer program product for providing a social network diagram in a P2P network device
US9684931B2 (en) 2007-01-09 2017-06-20 Paypal, Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of-sale
US8554669B2 (en) 2007-01-09 2013-10-08 Bill Me Later, Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of sale
US11922494B2 (en) 2007-01-09 2024-03-05 Paypal, Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of-sale
US10068289B2 (en) 2007-01-09 2018-09-04 Paypal, Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of-sale
US9412132B2 (en) 2007-01-09 2016-08-09 Paypal, Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of-sale
US11847692B2 (en) 2007-01-09 2023-12-19 Paypal, Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of-sale
US10949920B2 (en) 2007-01-09 2021-03-16 Paypal, Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of-sale
US20080167956A1 (en) * 2007-01-09 2008-07-10 I4 Commerce Inc. Method and system for offering a credit product by a credit issuer to a consumer at a point-of sale
US20080222049A1 (en) * 2007-02-05 2008-09-11 First Data Corporation Digital Signature Authentication
US9418501B2 (en) 2007-02-05 2016-08-16 First Data Corporation Method for digital signature authentication of pin-less debit card account transactions
US20080189209A1 (en) * 2007-02-05 2008-08-07 First Data Corporation Real-Time Funds Transfer
US20080185429A1 (en) * 2007-02-05 2008-08-07 First Data Corporation Authentication Of PIN-Less Transactions
US20080203153A1 (en) * 2007-02-26 2008-08-28 I4 Commerce Inc. Method and system for engaging in a transaction between a consumer and a merchant
US8433648B2 (en) 2007-02-26 2013-04-30 Bill Me Later, Inc. Method and system for engaging in a transaction between a consumer and a merchant
US10580070B2 (en) 2007-05-02 2020-03-03 Paypal, Inc. Distributed system for commerce
US10424008B2 (en) 2008-06-19 2019-09-24 Paypal, Inc. Method and system for engaging in a transaction between a business entity and a merchant
US8719164B2 (en) 2008-06-19 2014-05-06 Bill Me Later, Inc. Method and system for engaging in a transaction between a business entity and a merchant
CN102467585A (en) * 2010-11-05 2012-05-23 江西金格网络科技有限责任公司 Electronic signature, verification and revocation method of DWG document
US11245653B2 (en) * 2014-01-07 2022-02-08 Elementum, LLC Methods and systems for creating and using massless currency
US10700871B2 (en) * 2015-06-09 2020-06-30 Dresser, Llc Securing network communications on industrial automation systems
US20170353316A1 (en) * 2015-06-09 2017-12-07 Dresser, Inc. Securing network communications on industrial automation systems
US11308465B2 (en) * 2015-06-12 2022-04-19 Em Microelectronic-Marin S.A. Method for programming banking data in an integrated circuit of a watch
US11032254B2 (en) * 2016-09-06 2021-06-08 Red Hat, Inc. Binding data to a network in the presence of an entity
US20210281550A1 (en) * 2016-09-06 2021-09-09 Red Hat, Inc. Binding data to a network in the presence of an entity
US12058112B2 (en) * 2016-09-06 2024-08-06 Red Hat, Inc. Binding data to a network in the presence of an entity
CN109525392A (en) * 2017-09-20 2019-03-26 上海方付通商务服务有限公司 EID pasting card, mobile terminal device and eID Verification System

Also Published As

Publication number Publication date
US7032112B2 (en) 2006-04-18
US7257228B2 (en) 2007-08-14
US7549050B2 (en) 2009-06-16
US20020042877A1 (en) 2002-04-11
US20020112160A2 (en) 2002-08-15
US7089421B2 (en) 2006-08-08
US6820202B1 (en) 2004-11-16
US6981154B2 (en) 2005-12-27
US8620814B2 (en) 2013-12-31
US6820199B2 (en) 2004-11-16
US20050044373A1 (en) 2005-02-24
US7519821B2 (en) 2009-04-14
US20050005123A1 (en) 2005-01-06
US20020116608A1 (en) 2002-08-22
US20050005118A1 (en) 2005-01-06
US20050005124A1 (en) 2005-01-06
US20050005117A1 (en) 2005-01-06

Similar Documents

Publication Publication Date Title
US6820202B1 (en) Account authority digital signature (AADS) system
US7003480B2 (en) GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions
US6931382B2 (en) Payment instrument authorization technique
US5903878A (en) Method and apparatus for electronic commerce
US7127606B2 (en) Account-based digital signature (ABDS) system
US5850442A (en) Secure world wide electronic commerce over an open network
US20020083008A1 (en) Method and system for identity verification for e-transactions
CA2305249A1 (en) Virtual safe
JPH11512841A (en) Document authentication system and method
AU2001248198A1 (en) A method and system for a virtual safe
WO1996031965A1 (en) Electronic funds transfer instruments
US6742125B1 (en) Distributed protocol for secure communication of commercial transactions and decentralized network employing the protocol
WO2022075995A1 (en) Token failsafe system and method
CN112970234A (en) Account assertions
Havinga et al. Survey of electronic payment methods and systems
NL1014328C2 (en) Method and device for securing data to be sent over an open network.
WO2002001517A1 (en) A method for carrying out electronic commerce transactions
Javani et al. A New Credit Card Payment System Based on 3D-Secureᵀᴹ Using One-time-use Transaction Numbers

Legal Events

Date Code Title Description
AS Assignment

Owner name: FIRST DATA CORPORATION, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WHEELER, LYNN HENRY;WHEELER, ANNE M.;REEL/FRAME:012068/0254

Effective date: 19990203

AS Assignment

Owner name: CREDIT SUISSE, CAYMAN ISLANDS BRANCH, AS COLLATERA

Free format text: SECURITY AGREEMENT;ASSIGNORS:FIRST DATA CORPORATION;CARDSERVICE INTERNATIONAL, INC.;FUNDSXPRESS, INC.;AND OTHERS;REEL/FRAME:020045/0165

Effective date: 20071019

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT, UNITED STATES

Free format text: SECURITY INTEREST;ASSIGNOR:FIRST DATA CORPORATION;REEL/FRAME:036656/0224

Effective date: 20150811

Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE

Free format text: SECURITY INTEREST;ASSIGNOR:FIRST DATA CORPORATION;REEL/FRAME:036656/0224

Effective date: 20150811

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: DW HOLDINGS INC., COLORADO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

Owner name: FUNDSXPRESS, INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

Owner name: TELECHECK SERVICES, INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

Owner name: CARDSERVICE INTERNATIONAL, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

Owner name: SIZE TECHNOLOGIES, INC., COLORADO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

Owner name: LINKPOINT INTERNATIONAL, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

Owner name: FIRST DATA RESOURCES, LLC, COLORADO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

Owner name: INTELLIGENT RESULTS, INC., COLORADO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

Owner name: TELECHECK INTERNATIONAL, INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

Owner name: TASQ TECHNOLOGY, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

Owner name: FIRST DATA CORPORATION, COLORADO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919

Effective date: 20190729

AS Assignment

Owner name: FIRST DATA CORPORATION, NEW YORK

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050094/0455

Effective date: 20190729

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20211231