US20140372321A1 - Secure authentication between multiple parties - Google Patents
Secure authentication between multiple parties Download PDFInfo
- Publication number
- US20140372321A1 US20140372321A1 US14/472,052 US201414472052A US2014372321A1 US 20140372321 A1 US20140372321 A1 US 20140372321A1 US 201414472052 A US201414472052 A US 201414472052A US 2014372321 A1 US2014372321 A1 US 2014372321A1
- Authority
- US
- United States
- Prior art keywords
- user
- payment
- merchant
- pin
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 29
- 238000004891 communication Methods 0.000 claims abstract description 12
- 238000012546 transfer Methods 0.000 claims description 46
- 230000005057 finger movement Effects 0.000 claims description 7
- 238000013475 authorization Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 4
- 230000004044 response Effects 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 238000012790 confirmation Methods 0.000 description 8
- 239000002131 composite material Substances 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
Definitions
- the present disclosure relates generally to online payment transactions.
- the present disclosure relates to methods and systems for authentication while maintaining confidentiality of information for online payment transactions involving multiple parties.
- Online payment transactions have greatly facilitated the purchase of goods, services, and the movement of money over the Internet.
- multiple parties are frequently involved.
- a user may use a portable device to access a merchant's website to make purchases and to request that payments for the purchases be transferred from the user's account with a payment provider such as PayPal to the merchant's account.
- a payment provider such as PayPal to the merchant's account.
- the user needs to authorize the payment transaction with the payment provider.
- Authorization of the payment transaction may require the user to enter identification information such as a PIN (Personal Identification Number) that is known only to the user and the payment provider so that the payment provider may authenticate the user.
- PIN Personal Identification Number
- a user may desire to make multiple purchases from a merchant at different times.
- Payment pre-approval enables the user to return multiple times to a merchant to make purchases without having to return to the payment provider to authorize a payment for each purchase.
- the payment provider may require identification information of the user from the merchant or other third party for the payment provider to authenticate the transaction.
- the identification information may be information that is disclosed by the user only to the merchant or other third party such that revealing the identification information to the payment provider may breach the confidentiality of the information. Therefore, it is desirable to enable authentication in transactions involving multiple parties while allowing the parties to maintain the confidentiality of information shared between the parties.
- a user may enter an access code to identify the user to a first party that will be generating the identification information to a second party in the transaction.
- the access code may be entered without requiring the entry of an alphanumeric PIN (Personal Identification Number).
- the first party may convert the access code to a second code representing the identification information for transmission to the second party so that the access code is not revealed to the second party.
- the second party may use the second code to authenticate the user, to authenticate a payment transaction, or to authenticate other types of communications from the user or the first party.
- parties in a multiple-party transaction may perform authentications while maintaining the confidentiality of the access code.
- a user using a mobile phone to access a merchant's website may identify him/her to the mobile phone using an access code such as a pattern of finger movement over the touch screen, a voice phrase, an image, the user's biometric information, or even the way a phone is moved.
- the mobile phone converts the access code to an alphanumeric code.
- the mobile phone transmits the alphanumeric code to the payment provider through the merchant's website such that the payment provider may use the alphanumeric code to authenticate the user for payment transactions. Therefore, the payment provider is able to authenticate the user without requiring the mobile phone to reveal the access code.
- a payment authentication apparatus includes a processor on a server, and a memory to store machine-readable instructions for execution by the processor to provide a payment authentication application.
- the payment authentication application receives a payment request PIN of a user from a merchant or a communication device, compares the payment request PIN against a stored PIN of the user to authenticate a payment request.
- the payment request PIN is derived from an access code received from a consumer and the access code is hidden from the payment authentication application.
- a method for authenticating a payment request by a payment provider includes receiving a payment request PIN of a user pre-approval key from a merchant or a communication device, where the payment request PIN is derived from an access code that is received from a consumer and the access code is hidden from the payment provider, verifying the payment request PIN against a stored PIN of the user, and approving the payment request.
- a computer program in a payment authentication device includes a computer readable medium having instruction code for execution by a processor to perform a method.
- the method includes receiving a payment request PIN of a user from a merchant or a communication device, where the payment request PIN is derived from an access code received from a consumer and the access code is hidden from the computer program product, verifying the payment request PIN of the user against a stored PIN of the user, and approving the payment request.
- FIG. 1 shows transactions between multiple parties to set up a pre-approved payment with a payment provider using a PIN derived from an access code according to one or more embodiments of the present disclosure
- FIG. 2 shows transactions between multiple parties when an user makes a payment using a pre-approved amount according to one or more embodiments of the present disclosure
- FIG. 3 shows transactions between multiple parties to set up pre-approved money transfer with a payment provider using a PIN derived from an access code according to one or more embodiments of the present disclosure
- FIG. 4 shows transactions between multiple parties when a sender makes a money transfer request on behalf of the payment account holder to a receiver using pre-approved money according to one or more embodiments of the present disclosure
- Systems and methods are disclosed herein to allow a party to a multiple-party transaction to perform authentications of users, transactions, or other types of communications using identification information received from another party while allowing the party generating the identification information to maintain confidentiality of information when generating the identification information.
- authentications may have to be performed by a party using information provided by other parties to the transaction.
- the information passed between multiple parties may contain identification information such as an alphanumerical PIN to enable the receiving party to configure a user account, to authenticate the user against the user account, or to verify the authenticity of a communication.
- Embodiments of the present disclosure allow the party generating the identification information to derive the identification information from a non-alphanumerical access code selected by the user.
- a multi-party transaction may involve a user using a portable device to access a merchant's website to make purchases.
- the user may request that the payment for the purchases be transferred from a pre-approved payment account with a payment provider such as PayPal to the merchant's account.
- PayPal may not require the user to log on to the user's account to authorize the payment request.
- PayPal may authenticate the payment request using identification information received from the merchant's website or the portable device. Therefore, the merchant's website or the portable device may request the user to enter an access code.
- the access code selected by the user may be a pattern of finger movement over the touch screen, a voice phrase, an image, biometric information such as fingerprints, or even the way the portable device is moved.
- the merchant's website or the portable device may convert the access code into an alphanumerical PIN code for transmission to PayPal.
- PayPal had also stored the alphanumerical PIN code for configuring the account.
- PayPal verifies the received alphanumerical PIN code against the stored alphanumerical PIN code to authenticate the payment request while allowing the merchant's website or the portable device to maintain the confidentiality of the access code.
- FIG. 1 shows transactions between multiple parties to set up pre-approved payments with a payment provider using a PIN derived from an access code according to one or more embodiments of the present disclosure.
- the multiple parties are a phone client 101 , an API caller 102 representing a merchant website or a phone client website acting as a facilitator for a merchant, and a payment provider such as the PayPal server 103 .
- a user using the phone client 101 accesses API caller 102 and makes purchases through API caller 102 using PayPal server 103 as the payment provider.
- the user is asked to log-in to the user's PayPal account to authorize a payment or, for a new user, asked to establish an account before the user may request payment authorization.
- the user may establish an account and/or log-in using a PIN that is known only to the user and PayPal server 103 and may interact directly with PayPal server 103 to authorize the payment.
- the user may desire to make multiple purchases through API caller 102 over a period of time.
- API caller 102 may interact with PayPal server 103 to authorize the payment using the pre-approved amount. Because the user does not interact directly with PayPal 103 to authorize payments using the pre-approved payment, API caller 102 may have to provide identification information of the user to PayPal server 103 to enable PayPal server 103 to authenticate the user and the transaction.
- the phone client 101 generates the identification information from a user-entered access code and transmits the identification information to PayPal server 103 through API caller 102 .
- the access code is confidential to the phone client 101 and generation and transmission of the identification information rather than the access code allows the phone client 101 to maintain the confidentiality of the access code while enabling PayPal sever 103 to authenticate the transaction.
- the phone client 101 also generates the identification information from the access code and transmits the identification information to PayPal server 103 when the user initially requests the pre-approved amount from PayPal server 103 .
- PayPal server 103 then stores the identification information to associate the user with the pre-approved amount so that PayPal server 103 may authenticate the user when the user makes future payment requests using the pre-approved amount.
- step 104 the user using the phone client 101 connects with API caller 102 to initiate the pre-approval request.
- the phone client 101 may be a Google G1 phone, an iPhone, other types of smart phones, a PDA, a laptop, or other types of communication devices.
- API caller 102 displays a screen on the phone client 101 for the user to sign up for the pre-approved payment through PayPal.
- the user may elect to sign up for the pre-approved payment and may be requested to fill out payment constraint information on API caller 102 .
- Payment constraint information allow the user to customize the pre-approval request by, for example, allowing the user to set limits on the total pre-approved amount, the maximum amount per transaction, or to specify an expiration date etc.
- API caller 102 makes a pre-approval API call to PayPal sever 103 to transmit the pre-approval request in step 105 .
- PayPal server 103 processes the pre-approval request and returns back a pre-approval key in step 106 to API caller 102 .
- the pre-approval key can be considered a token returned by the PayPal server 103 to uniquely identify the pre-approved payment associated with the pre-approval request for future purchases.
- This pre-approval key is to be submitted to PayPal server 103 when the user makes future payment requests to PayPal Server 103 to authorize purchase payments using the pre-approved payment.
- PayPal sever 103 may also return a pre-approval URL to API caller 102 .
- API caller 102 transmits the pre-approval key and the pre-approval URL back to the phone client in step 107 .
- the pre-approval URL directs the user to the PayPal server 103 and the user is prompted to enter credential information for the pre-approval agreement. If the user does not have an account with PayPal, the user will be asked to establish an account name and a password. Otherwise, the user will be asked to log-in to the user's PayPal account.
- the phone client 101 then makes an API authentication call to PayPal 103 to transmit the credential information in step 108 .
- PayPal server 103 processes the credential information and responds with confirmation status information and details of the pre-approval agreement in step 109 .
- Phone client 101 displays the confirmation status and details of the pre-approval agreement to the user for approval.
- the details of the pre-approval agreement may include the payment constraint information the user entered earlier in step 104 such as the total pre-approved amount, the expiration date, and the maximum amount per transaction.
- the pre-approval agreement may require the user to enter a PIN to allow PayPal server 103 to associate the user with the pre-approved payment so that PayPal server 103 may authenticate future purchases made by the user using the pre-approved payment.
- the PIN may be generated from an access code to maintain the confidentiality of the access code.
- step 110 user approves the pre-approval agreement and enters an access code.
- the access code may be a pattern of finger movement over the touch screen, a voice phrase, an image, biometric information such as fingerprints, or even the way the portable device is moved.
- Phone client 101 may convert the access code to a PIN and transmit the PIN along with the user's approval of the pre-approval agreement to API caller 102 .
- phone client 101 may transmit the access code to API caller 102 for API caller 102 to convert the access code to the PIN.
- API caller 102 makes another API call to PayPal server 103 to transmit the pre-approval key and the PIN to PayPal server 103 .
- PayPal server 103 processes the API call, stores the PIN, associates the pre-approval key with the PIN, and returns pre-approval status in step 112 to API caller 102 . Finally, API caller 102 displays a pre-approval confirmation page to phone client 101 in step 113 .
- FIG. 2 shows transactions between multiple parties when a user makes a payment request using the pre-approved payment according to one or more embodiments of the present disclosure.
- the user may proceed to make purchases from the merchant.
- the multiple parties are again a phone client 101 , an API caller 102 representing a merchant website or a phone client website acting as a facilitator for a merchant, and a payment provider such as the PayPal server 103 .
- API caller 102 may interact with PayPal server 103 to authorize payments using the pre-approved payment.
- API caller 102 has to provide a PIN to PayPal server 103 to enable PayPal server 103 to authenticate the user and the transaction.
- This PIN is the same PIN that was received by PayPal server 103 when the user initially signs up for the pre-approved payment.
- the PIN is also generated from the same access code entered when the user initially signs up for the pre-approved payment in order to maintain the confidentiality of the access code.
- step 201 the user using the phone client 101 connects with the API caller 102 to select items for purchase.
- the phone client 101 may display a screen to allow the user to pay using the pre-approved payment from PayPal.
- the phone client 101 prompts the user to enter the access code.
- the user enters the same access code that was entered when the user signed up for the pre-approval amount.
- the access code may be a pattern of finger movement over the touch screen, a voice phrase, an image, biometric information such as fingerprints, or even the way the portable device is moved.
- phone client 101 may convert the access code to a PIN and transmit the PIN to API caller 102 .
- phone client 101 may transmit the access code to API caller 102 for API caller 102 to convert the access code to the PIN.
- API caller 102 makes an API call with the payment request, the PIN, and the pre-approval key received during the pre-approval request process to PayPal server 103 .
- PayPal server 103 uses the PIN and the pre-approval key to authenticate the user and to process the payment request.
- PayPal server 103 transfers the payment to complete the payment request, and responds with payment status and a pay key in step 203 .
- API caller 102 transmits the payment status and a pay key to the phone client 101 .
- the pay key is considered a token returned by PayPal server 103 to uniquely identify the payment request.
- the phone client 101 displays a confirmation page to the user.
- FIG. 3 shows transactions between multiple parties to set up a pre-approved money transfer with a payment provider using a PIN derived from an access code according to one or more embodiments of the present disclosure.
- a pre-approved money transfer may be used in scenario where a payment account owner wants another party, called the sender, to have restricted access right to send money from the payment account owner's PayPal account on behalf of the payment account owner without requiring the sender to log-in to the payment account owner's PayPal account.
- a payment-approved money transfer may also be initiated by the payment account owner when it's inconvenient for the payment account owner to log-in to the owner's PayPal account.
- Pre-approved money transfer differs from the pre-approved payment of FIGS. 1 and 2 in that the sender transfers money from the payment account owner's PayPal account without calling explicitly for the exchange of goods or services.
- a merchant may not necessarily be a party to the transactions, although it can be.
- the multiple parties are a phone client 101 , a receiver 302 of FIG. 4 , and a payment provider such as the PayPal server 103 .
- the phone client 101 may be used initially by the PayPal account owner to request pre-approval of the money transfer and also by the sender to make money transfer requests on behalf of the PayPal account owner to the receiver 302 .
- the sender may have to provide identification information of the payment account holder to enable PayPal server 103 to authenticate the money transfer request.
- the phone client 101 generates the identification information from a sender-entered access code and transmits the identification information to PayPal server 103 . Similar to the pre-approved payment scenario, the access code is confidential to the phone client 101 and transmission of the identification information rather than the access code allows the phone client 101 to maintain the confidentiality of the access code while enabling PayPal sever 103 to authenticate the request.
- the phone client 101 also generates the identification information from the access code and transmits the identification information to PayPal server 103 when the PayPal account holder initially signs up for the pre-approved money transfer from PayPal server 103 .
- PayPal server 103 then stores the identification information to associate the PayPal account holder with the pre-approved money transfer amount so that PayPal server 103 may authenticate a sender with knowledge of the access code when the sender make future money transfer requests using the pre-approved money.
- step 303 the PayPal account holder using the phone client 101 connects with PayPal server 103 to initiate the pre-approval request.
- PayPal server 101 displays a screen on the phone client 101 for the user to sign up for the pre-approved money transfer through PayPal.
- the PayPal account holder may elect to sign up for the pre-approved money transfer and may be requested to fill out transfer constraint information on PayPal server 103 .
- the transfer constraint information allows the user to customize the pre-approval request by, for example, allowing the user to set limits on the total pre-approved amount, the maximum amount per transfer, or to specify an expiration date etc.
- Phone client 101 makes a pre-approval API call to PayPal sever 103 to transmit the pre-approval request with the transfer constraint information.
- PayPal server 103 processes the pre-approval request and returns back a pre-approval key in step 304 to phone client 101 .
- the pre-approval key can be considered a token returned by PayPal server 103 to uniquely identify the pre-approved amount associated with the pre-approval request for future money transfers.
- This pre-approval key is to be submitted to PayPal server 103 when the sender makes future requests to PayPal Server 103 to authorize money transfer using the pre-approved payment.
- the PayPal account holder is prompted to login to the account holder's PayPal account.
- the phone client 101 then makes an API authentication call to transmit the login information to PayPal 103 in step 305 .
- PayPal server 103 processes the login information and responds with confirmation status information and details of the pre-approval agreement in step 306 .
- Phone client 101 displays the confirmation status and details of the pre-approval agreement to the PayPal account holder for
- the details of the pre-approval agreement may include the transfer constraint information the user entered earlier in step 303 such as the total pre-approved amount, the expiration date, and the maximum amount per transfer.
- the pre-approval agreement may require the user to enter a PIN to allow PayPal server 103 to associate the PayPal account holder with the pre-approved money transfer so that PayPal server 103 may authenticate future money transfer requests made by the PayPal account holder or the sender.
- the PIN may be generated from an access code to maintain the confidentiality of the access code.
- the PayPal account holder approves the pre-approval agreement and enters an access code.
- the access code may be a pattern of finger movement over the touch screen, a voice phrase, an image, biometric information such as fingerprints, or even the way the portable device is moved.
- Phone client 101 may convert the access code to a PIN and make an API call to transmit the PIN along with the pre-approval key to PayPal server 103 .
- PayPal server 103 processes the API call, stores the PIN, associates the pre-approval key with the PIN, and returns pre-approval status in step 308 to the phone client 101 for the phone client 101 to display a pre-approval confirmation to the PayPal account holder.
- FIG. 4 shows transactions between multiple parties when a sender makes a money transfer request on behalf of the payment account holder to a receiver using pre-approved money according to one or more embodiments of the present disclosure.
- the sender may have restricted access right to transfer money from the payment account holder's account on behalf of the payment account holder.
- the multiple parties are a phone client 101 , a receiver 302 , and a payment provider such as the PayPal server 103 . Because the sender does not log into a PayPal account holder's account to authorize money transfer, the sender has to provide a PIN to PayPal server 103 to enable PayPal server 103 to authenticate the sender and the money transfer.
- This PIN is the same PIN that was received by PayPal server 103 when the PayPal account holder initially signs up for the pre-approved money transfer.
- the PIN is also generated from the same access code entered by the PayPal account holder when the PayPal account holder initially signs up for the pre-approved money transfer in order to maintain the confidentiality of the access code.
- the sender using the phone client 101 connects with the PayPal server 102 to request money transfer on behalf of the PayPal account holder.
- the phone client 101 may display a screen to allow the sender to request money transfer using the pre-approved transfer money from PayPal.
- the phone client 101 prompts the sender to enter the access code.
- the sender enters the same access code that was entered when the PayPal account holder initially signed up for the pre-approval money.
- the access code may be a pattern of finger movement over the touch screen, a voice phrase, an image, biometric information such as fingerprints, or even the way the portable device is moved.
- Phone client 101 may convert the access code to a PIN and make an API call with the money transfer request, the PIN, and the pre-approval key received during the pre-approval request process to PayPal server 103 .
- PayPal server 103 uses the PIN and the pre-approval key to authenticate the user and to process the money transfer request.
- PayPal server 103 transfers money from the PayPal account holder's account to the receiver 302 in step 402 to complete the transfer request, and responds with payment status and a pay key in step 403 .
- the pay key is considered a token returned by PayPal server 103 to uniquely identify the money transfer request.
- the phone client 101 Upon receiving the payment status and the pay key, the phone client 101 display a confirmation page to the sender.
- various embodiments provided by the present disclosure may be implemented using hardware, software, or combinations of hardware and software. Also where applicable, the various hardware components and/or software components set forth herein may be combined into composite components comprising software, hardware, and/or both without departing from the spirit of the present disclosure. Where applicable, the various hardware components and/or software components set forth herein may be separated into sub-components comprising software, hardware, or both without departing from the spirit of the present disclosure. In addition, where applicable, it is contemplated that software components may be implemented as hardware components, and vice-versa.
- Application software in accordance with the present disclosure such as program code and/or data for processing the payment or money transfer request, may be stored on one or more computer readable mediums. It is also contemplated that the application software identified herein may be implemented using one or more general purpose or specific purpose computers and/or computer systems, networked and/or otherwise. Where applicable, the ordering of various steps described herein may be changed, combined into composite steps, and/or separated into sub-steps to provide features described herein.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This patent application is a continuation of U.S. patent application Ser. No. 12/494,652 filed on Jun. 30, 2009, which is incorporated by reference in its entirety.
- The present disclosure relates generally to online payment transactions. In particular, the present disclosure relates to methods and systems for authentication while maintaining confidentiality of information for online payment transactions involving multiple parties.
- Online payment transactions have greatly facilitated the purchase of goods, services, and the movement of money over the Internet. In online payment transactions, multiple parties are frequently involved. For example, a user may use a portable device to access a merchant's website to make purchases and to request that payments for the purchases be transferred from the user's account with a payment provider such as PayPal to the merchant's account. To complete the purchase, the user needs to authorize the payment transaction with the payment provider. Authorization of the payment transaction may require the user to enter identification information such as a PIN (Personal Identification Number) that is known only to the user and the payment provider so that the payment provider may authenticate the user. However, there are times when the payment provider may receive the identification information from a third party. For example, a user may desire to make multiple purchases from a merchant at different times. To facilitate online payment transactions for multiple purchases from the same merchant or for scenarios where the user may be unavailable to authorize each payment transaction, it is desirable to allow a user to pre-approve future payment or payments to an online merchant prior to the purchase. Payment pre-approval enables the user to return multiple times to a merchant to make purchases without having to return to the payment provider to authorize a payment for each purchase. To prevent fraudulent purchases by unauthorized users using the pre-approved payment, the payment provider may require identification information of the user from the merchant or other third party for the payment provider to authenticate the transaction. The identification information may be information that is disclosed by the user only to the merchant or other third party such that revealing the identification information to the payment provider may breach the confidentiality of the information. Therefore, it is desirable to enable authentication in transactions involving multiple parties while allowing the parties to maintain the confidentiality of information shared between the parties.
- Systems and methods are disclosed herein to allow a party to a multiple-party transaction to perform authentications using identification information received from another party while allowing the party generating the identification information to maintain confidentiality of information not to be shared. A user may enter an access code to identify the user to a first party that will be generating the identification information to a second party in the transaction. The access code may be entered without requiring the entry of an alphanumeric PIN (Personal Identification Number). The first party may convert the access code to a second code representing the identification information for transmission to the second party so that the access code is not revealed to the second party. The second party may use the second code to authenticate the user, to authenticate a payment transaction, or to authenticate other types of communications from the user or the first party. Thus, parties in a multiple-party transaction may perform authentications while maintaining the confidentiality of the access code. For example, a user using a mobile phone to access a merchant's website may identify him/her to the mobile phone using an access code such as a pattern of finger movement over the touch screen, a voice phrase, an image, the user's biometric information, or even the way a phone is moved. The mobile phone converts the access code to an alphanumeric code. The mobile phone transmits the alphanumeric code to the payment provider through the merchant's website such that the payment provider may use the alphanumeric code to authenticate the user for payment transactions. Therefore, the payment provider is able to authenticate the user without requiring the mobile phone to reveal the access code.
- In accordance with one or more embodiments of the present disclosure, a payment authentication apparatus includes a processor on a server, and a memory to store machine-readable instructions for execution by the processor to provide a payment authentication application. The payment authentication application receives a payment request PIN of a user from a merchant or a communication device, compares the payment request PIN against a stored PIN of the user to authenticate a payment request. The payment request PIN is derived from an access code received from a consumer and the access code is hidden from the payment authentication application.
- In accordance with one or more embodiments of the present disclosure, a method for authenticating a payment request by a payment provider includes receiving a payment request PIN of a user pre-approval key from a merchant or a communication device, where the payment request PIN is derived from an access code that is received from a consumer and the access code is hidden from the payment provider, verifying the payment request PIN against a stored PIN of the user, and approving the payment request.
- In accordance with one or more embodiments of the present disclosure, a computer program in a payment authentication device includes a computer readable medium having instruction code for execution by a processor to perform a method. The method includes receiving a payment request PIN of a user from a merchant or a communication device, where the payment request PIN is derived from an access code received from a consumer and the access code is hidden from the computer program product, verifying the payment request PIN of the user against a stored PIN of the user, and approving the payment request.
- These and other embodiments of the present disclosure will be more fully understood by reference to the following detailed description of the embodiments when considered in conjunction with the accompanying drawings.
-
FIG. 1 shows transactions between multiple parties to set up a pre-approved payment with a payment provider using a PIN derived from an access code according to one or more embodiments of the present disclosure; -
FIG. 2 shows transactions between multiple parties when an user makes a payment using a pre-approved amount according to one or more embodiments of the present disclosure; -
FIG. 3 shows transactions between multiple parties to set up pre-approved money transfer with a payment provider using a PIN derived from an access code according to one or more embodiments of the present disclosure; -
FIG. 4 shows transactions between multiple parties when a sender makes a money transfer request on behalf of the payment account holder to a receiver using pre-approved money according to one or more embodiments of the present disclosure; - Embodiments of the present disclosure and their advantages are best understood by referring to the detailed description that follows. It should be appreciated that like reference numerals are used to identify like elements illustrated in one or more of the figures.
- Systems and methods are disclosed herein to allow a party to a multiple-party transaction to perform authentications of users, transactions, or other types of communications using identification information received from another party while allowing the party generating the identification information to maintain confidentiality of information when generating the identification information. In multi-party transactions, authentications may have to be performed by a party using information provided by other parties to the transaction. The information passed between multiple parties may contain identification information such as an alphanumerical PIN to enable the receiving party to configure a user account, to authenticate the user against the user account, or to verify the authenticity of a communication. Embodiments of the present disclosure allow the party generating the identification information to derive the identification information from a non-alphanumerical access code selected by the user.
- Transmission of the derived identification information instead of the access code allows the generating party to maintain the confidentiality of the access code. For example, a multi-party transaction may involve a user using a portable device to access a merchant's website to make purchases. The user may request that the payment for the purchases be transferred from a pre-approved payment account with a payment provider such as PayPal to the merchant's account. To facilitate payment transactions using the pre-approved payment account, PayPal may not require the user to log on to the user's account to authorize the payment request. Instead, PayPal may authenticate the payment request using identification information received from the merchant's website or the portable device. Therefore, the merchant's website or the portable device may request the user to enter an access code.
- The access code selected by the user may be a pattern of finger movement over the touch screen, a voice phrase, an image, biometric information such as fingerprints, or even the way the portable device is moved. The merchant's website or the portable device may convert the access code into an alphanumerical PIN code for transmission to PayPal. When the user initially signed up for the pre-approved payment account, PayPal had also stored the alphanumerical PIN code for configuring the account. Thus, PayPal verifies the received alphanumerical PIN code against the stored alphanumerical PIN code to authenticate the payment request while allowing the merchant's website or the portable device to maintain the confidentiality of the access code.
-
FIG. 1 shows transactions between multiple parties to set up pre-approved payments with a payment provider using a PIN derived from an access code according to one or more embodiments of the present disclosure. The multiple parties are aphone client 101, anAPI caller 102 representing a merchant website or a phone client website acting as a facilitator for a merchant, and a payment provider such as the PayPalserver 103. A user using thephone client 101accesses API caller 102 and makes purchases throughAPI caller 102 using PayPalserver 103 as the payment provider. In the conventional case of a single transaction with no pre-approved payments, the user is asked to log-in to the user's PayPal account to authorize a payment or, for a new user, asked to establish an account before the user may request payment authorization. The user may establish an account and/or log-in using a PIN that is known only to the user and PayPalserver 103 and may interact directly with PayPalserver 103 to authorize the payment. Alternatively, the user may desire to make multiple purchases throughAPI caller 102 over a period of time. - To facilitate multiple purchases through
API caller 102 without requiring the user to log-in toPayPal server 103 to authorize each purchase payment, it may be convenient for the user to request a pre-approval amount to be applied for future purchases. Thereafter, when the user makes a purchase throughAPI caller 102,API caller 102 may interact withPayPal server 103 to authorize the payment using the pre-approved amount. Because the user does not interact directly withPayPal 103 to authorize payments using the pre-approved payment,API caller 102 may have to provide identification information of the user toPayPal server 103 to enablePayPal server 103 to authenticate the user and the transaction. - In one or more embodiments of the present invention, the
phone client 101 generates the identification information from a user-entered access code and transmits the identification information toPayPal server 103 throughAPI caller 102. The access code is confidential to thephone client 101 and generation and transmission of the identification information rather than the access code allows thephone client 101 to maintain the confidentiality of the access code while enabling PayPal sever 103 to authenticate the transaction. Thephone client 101 also generates the identification information from the access code and transmits the identification information toPayPal server 103 when the user initially requests the pre-approved amount fromPayPal server 103.PayPal server 103 then stores the identification information to associate the user with the pre-approved amount so thatPayPal server 103 may authenticate the user when the user makes future payment requests using the pre-approved amount. - In
step 104, the user using thephone client 101 connects withAPI caller 102 to initiate the pre-approval request. Thephone client 101 may be a Google G1 phone, an iPhone, other types of smart phones, a PDA, a laptop, or other types of communication devices.API caller 102 displays a screen on thephone client 101 for the user to sign up for the pre-approved payment through PayPal. The user may elect to sign up for the pre-approved payment and may be requested to fill out payment constraint information onAPI caller 102. Payment constraint information allow the user to customize the pre-approval request by, for example, allowing the user to set limits on the total pre-approved amount, the maximum amount per transaction, or to specify an expiration date etc.API caller 102 makes a pre-approval API call to PayPal sever 103 to transmit the pre-approval request instep 105. -
PayPal server 103 processes the pre-approval request and returns back a pre-approval key instep 106 toAPI caller 102. The pre-approval key can be considered a token returned by thePayPal server 103 to uniquely identify the pre-approved payment associated with the pre-approval request for future purchases. This pre-approval key is to be submitted toPayPal server 103 when the user makes future payment requests toPayPal Server 103 to authorize purchase payments using the pre-approved payment. PayPal sever 103 may also return a pre-approval URL toAPI caller 102.API caller 102 transmits the pre-approval key and the pre-approval URL back to the phone client instep 107. The pre-approval URL directs the user to thePayPal server 103 and the user is prompted to enter credential information for the pre-approval agreement. If the user does not have an account with PayPal, the user will be asked to establish an account name and a password. Otherwise, the user will be asked to log-in to the user's PayPal account. Thephone client 101 then makes an API authentication call toPayPal 103 to transmit the credential information instep 108. -
PayPal server 103 processes the credential information and responds with confirmation status information and details of the pre-approval agreement instep 109.Phone client 101 then displays the confirmation status and details of the pre-approval agreement to the user for approval. The details of the pre-approval agreement may include the payment constraint information the user entered earlier instep 104 such as the total pre-approved amount, the expiration date, and the maximum amount per transaction. The pre-approval agreement may require the user to enter a PIN to allowPayPal server 103 to associate the user with the pre-approved payment so thatPayPal server 103 may authenticate future purchases made by the user using the pre-approved payment. As mentioned, the PIN may be generated from an access code to maintain the confidentiality of the access code. - In
step 110, user approves the pre-approval agreement and enters an access code. The access code may be a pattern of finger movement over the touch screen, a voice phrase, an image, biometric information such as fingerprints, or even the way the portable device is moved.Phone client 101 may convert the access code to a PIN and transmit the PIN along with the user's approval of the pre-approval agreement toAPI caller 102. Alternatively,phone client 101 may transmit the access code toAPI caller 102 forAPI caller 102 to convert the access code to the PIN. Instep 111API caller 102 makes another API call toPayPal server 103 to transmit the pre-approval key and the PIN toPayPal server 103.PayPal server 103 processes the API call, stores the PIN, associates the pre-approval key with the PIN, and returns pre-approval status instep 112 toAPI caller 102. Finally,API caller 102 displays a pre-approval confirmation page tophone client 101 instep 113. -
FIG. 2 shows transactions between multiple parties when a user makes a payment request using the pre-approved payment according to one or more embodiments of the present disclosure. After the user has signed up with a payment provider for a pre-approved payment to be used with a merchant, the user may proceed to make purchases from the merchant. The multiple parties are again aphone client 101, anAPI caller 102 representing a merchant website or a phone client website acting as a facilitator for a merchant, and a payment provider such as thePayPal server 103. To facilitate the transaction,API caller 102 may interact withPayPal server 103 to authorize payments using the pre-approved payment. Because the user does not interact directly withPayPal 103 to authorize payments,API caller 102 has to provide a PIN toPayPal server 103 to enablePayPal server 103 to authenticate the user and the transaction. This PIN is the same PIN that was received byPayPal server 103 when the user initially signs up for the pre-approved payment. The PIN is also generated from the same access code entered when the user initially signs up for the pre-approved payment in order to maintain the confidentiality of the access code. - In
step 201, the user using thephone client 101 connects with theAPI caller 102 to select items for purchase. When the user is ready to make the purchase, thephone client 101 may display a screen to allow the user to pay using the pre-approved payment from PayPal. When the user makes a payment request to use the pre-approved payment, thephone client 101 prompts the user to enter the access code. The user enters the same access code that was entered when the user signed up for the pre-approval amount. As before, the access code may be a pattern of finger movement over the touch screen, a voice phrase, an image, biometric information such as fingerprints, or even the way the portable device is moved. As before,phone client 101 may convert the access code to a PIN and transmit the PIN toAPI caller 102. Alternatively,phone client 101 may transmit the access code toAPI caller 102 forAPI caller 102 to convert the access code to the PIN. - In
step 202,API caller 102 makes an API call with the payment request, the PIN, and the pre-approval key received during the pre-approval request process toPayPal server 103.PayPal server 103 uses the PIN and the pre-approval key to authenticate the user and to process the payment request. Upon approval,PayPal server 103 transfers the payment to complete the payment request, and responds with payment status and a pay key instep 203. Instep 204,API caller 102 transmits the payment status and a pay key to thephone client 101. The pay key is considered a token returned byPayPal server 103 to uniquely identify the payment request. Upon receiving the payment status and the pay key, thephone client 101 displays a confirmation page to the user. -
FIG. 3 shows transactions between multiple parties to set up a pre-approved money transfer with a payment provider using a PIN derived from an access code according to one or more embodiments of the present disclosure. A pre-approved money transfer may be used in scenario where a payment account owner wants another party, called the sender, to have restricted access right to send money from the payment account owner's PayPal account on behalf of the payment account owner without requiring the sender to log-in to the payment account owner's PayPal account. Of course, a payment-approved money transfer may also be initiated by the payment account owner when it's inconvenient for the payment account owner to log-in to the owner's PayPal account. Pre-approved money transfer differs from the pre-approved payment ofFIGS. 1 and 2 in that the sender transfers money from the payment account owner's PayPal account without calling explicitly for the exchange of goods or services. Thus, a merchant may not necessarily be a party to the transactions, although it can be. - The multiple parties are a
phone client 101, areceiver 302 ofFIG. 4 , and a payment provider such as thePayPal server 103, Thephone client 101 may be used initially by the PayPal account owner to request pre-approval of the money transfer and also by the sender to make money transfer requests on behalf of the PayPal account owner to thereceiver 302. Because the sender interacts withPayPal server 103 to authorize money transfer using the pre-approved money without logging into the PayPal account holder's account, the sender may have to provide identification information of the payment account holder to enablePayPal server 103 to authenticate the money transfer request. - In one or more embodiments of the present invention, the
phone client 101 generates the identification information from a sender-entered access code and transmits the identification information toPayPal server 103. Similar to the pre-approved payment scenario, the access code is confidential to thephone client 101 and transmission of the identification information rather than the access code allows thephone client 101 to maintain the confidentiality of the access code while enabling PayPal sever 103 to authenticate the request. Thephone client 101 also generates the identification information from the access code and transmits the identification information toPayPal server 103 when the PayPal account holder initially signs up for the pre-approved money transfer fromPayPal server 103.PayPal server 103 then stores the identification information to associate the PayPal account holder with the pre-approved money transfer amount so thatPayPal server 103 may authenticate a sender with knowledge of the access code when the sender make future money transfer requests using the pre-approved money. - In
step 303, the PayPal account holder using thephone client 101 connects withPayPal server 103 to initiate the pre-approval request.PayPal server 101 displays a screen on thephone client 101 for the user to sign up for the pre-approved money transfer through PayPal. The PayPal account holder may elect to sign up for the pre-approved money transfer and may be requested to fill out transfer constraint information onPayPal server 103. The transfer constraint information allows the user to customize the pre-approval request by, for example, allowing the user to set limits on the total pre-approved amount, the maximum amount per transfer, or to specify an expiration date etc. -
Phone client 101 makes a pre-approval API call to PayPal sever 103 to transmit the pre-approval request with the transfer constraint information.PayPal server 103 processes the pre-approval request and returns back a pre-approval key instep 304 tophone client 101. The pre-approval key can be considered a token returned byPayPal server 103 to uniquely identify the pre-approved amount associated with the pre-approval request for future money transfers. This pre-approval key is to be submitted toPayPal server 103 when the sender makes future requests toPayPal Server 103 to authorize money transfer using the pre-approved payment. The PayPal account holder is prompted to login to the account holder's PayPal account. Thephone client 101 then makes an API authentication call to transmit the login information toPayPal 103 instep 305.PayPal server 103 processes the login information and responds with confirmation status information and details of the pre-approval agreement instep 306.Phone client 101 then displays the confirmation status and details of the pre-approval agreement to the PayPal account holder for approval. - The details of the pre-approval agreement may include the transfer constraint information the user entered earlier in
step 303 such as the total pre-approved amount, the expiration date, and the maximum amount per transfer. The pre-approval agreement may require the user to enter a PIN to allowPayPal server 103 to associate the PayPal account holder with the pre-approved money transfer so thatPayPal server 103 may authenticate future money transfer requests made by the PayPal account holder or the sender. As before, the PIN may be generated from an access code to maintain the confidentiality of the access code. Instep 307, the PayPal account holder approves the pre-approval agreement and enters an access code. As before, the access code may be a pattern of finger movement over the touch screen, a voice phrase, an image, biometric information such as fingerprints, or even the way the portable device is moved.Phone client 101 may convert the access code to a PIN and make an API call to transmit the PIN along with the pre-approval key toPayPal server 103.PayPal server 103 processes the API call, stores the PIN, associates the pre-approval key with the PIN, and returns pre-approval status instep 308 to thephone client 101 for thephone client 101 to display a pre-approval confirmation to the PayPal account holder. -
FIG. 4 shows transactions between multiple parties when a sender makes a money transfer request on behalf of the payment account holder to a receiver using pre-approved money according to one or more embodiments of the present disclosure. After the payment account holder has signed up with a payment provider for pre-approved transfer money, the sender may have restricted access right to transfer money from the payment account holder's account on behalf of the payment account holder. The multiple parties are aphone client 101, areceiver 302, and a payment provider such as thePayPal server 103. Because the sender does not log into a PayPal account holder's account to authorize money transfer, the sender has to provide a PIN toPayPal server 103 to enablePayPal server 103 to authenticate the sender and the money transfer. This PIN is the same PIN that was received byPayPal server 103 when the PayPal account holder initially signs up for the pre-approved money transfer. The PIN is also generated from the same access code entered by the PayPal account holder when the PayPal account holder initially signs up for the pre-approved money transfer in order to maintain the confidentiality of the access code. - In
step 401, the sender using thephone client 101 connects with thePayPal server 102 to request money transfer on behalf of the PayPal account holder. Thephone client 101 may display a screen to allow the sender to request money transfer using the pre-approved transfer money from PayPal. When the sender makes a money transfer request to use the pre-approved money, thephone client 101 prompts the sender to enter the access code. The sender enters the same access code that was entered when the PayPal account holder initially signed up for the pre-approval money. As before, the access code may be a pattern of finger movement over the touch screen, a voice phrase, an image, biometric information such as fingerprints, or even the way the portable device is moved. -
Phone client 101 may convert the access code to a PIN and make an API call with the money transfer request, the PIN, and the pre-approval key received during the pre-approval request process toPayPal server 103.PayPal server 103 uses the PIN and the pre-approval key to authenticate the user and to process the money transfer request. Upon approval,PayPal server 103 transfers money from the PayPal account holder's account to thereceiver 302 instep 402 to complete the transfer request, and responds with payment status and a pay key instep 403. The pay key is considered a token returned byPayPal server 103 to uniquely identify the money transfer request. Upon receiving the payment status and the pay key, thephone client 101 display a confirmation page to the sender. - Where applicable, various embodiments provided by the present disclosure may be implemented using hardware, software, or combinations of hardware and software. Also where applicable, the various hardware components and/or software components set forth herein may be combined into composite components comprising software, hardware, and/or both without departing from the spirit of the present disclosure. Where applicable, the various hardware components and/or software components set forth herein may be separated into sub-components comprising software, hardware, or both without departing from the spirit of the present disclosure. In addition, where applicable, it is contemplated that software components may be implemented as hardware components, and vice-versa.
- Application software in accordance with the present disclosure, such as program code and/or data for processing the payment or money transfer request, may be stored on one or more computer readable mediums. It is also contemplated that the application software identified herein may be implemented using one or more general purpose or specific purpose computers and/or computer systems, networked and/or otherwise. Where applicable, the ordering of various steps described herein may be changed, combined into composite steps, and/or separated into sub-steps to provide features described herein.
- Although embodiments of the present disclosure have been described, these embodiments illustrate but do not limit the disclosure. For example, use of a non-alphanumeric access code with a phone client is described; however other types of access code may also be suitable for use on other types of hardware platform. In addition, although PayPal is used as the payment service provider in the embodiments, any suitable on-line payment provider or financial services provider may be used to process pre-approval, payment, or money transfer requests from the hardware platform. It should also be understood that embodiments of the present disclosure should not be limited to these embodiments but that numerous modifications and variations may be made by one of ordinary skill in the art in accordance with the principles of the present disclosure and be included within the spirit and scope of the present disclosure as hereinafter claimed.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/472,052 US20140372321A1 (en) | 2009-06-30 | 2014-08-28 | Secure authentication between multiple parties |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/494,652 US8825548B2 (en) | 2009-06-30 | 2009-06-30 | Secure authentication between multiple parties |
US14/472,052 US20140372321A1 (en) | 2009-06-30 | 2014-08-28 | Secure authentication between multiple parties |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/494,652 Continuation US8825548B2 (en) | 2009-06-30 | 2009-06-30 | Secure authentication between multiple parties |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140372321A1 true US20140372321A1 (en) | 2014-12-18 |
Family
ID=43381797
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/494,652 Active 2031-09-23 US8825548B2 (en) | 2009-06-30 | 2009-06-30 | Secure authentication between multiple parties |
US14/472,052 Abandoned US20140372321A1 (en) | 2009-06-30 | 2014-08-28 | Secure authentication between multiple parties |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/494,652 Active 2031-09-23 US8825548B2 (en) | 2009-06-30 | 2009-06-30 | Secure authentication between multiple parties |
Country Status (1)
Country | Link |
---|---|
US (2) | US8825548B2 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170337089A1 (en) * | 2016-05-12 | 2017-11-23 | Skidata Ag | Method for registering devices, in particular conditional access devices or payment or vending machines, on a server of a system which comprises a number of such devices |
US20180082297A1 (en) * | 2008-02-20 | 2018-03-22 | Collective Dynamics LLC | Method and System for Multi-Modal Transaction Authentication |
US10108959B2 (en) * | 2011-03-15 | 2018-10-23 | Capital One Services, Llc | Systems and methods for performing ATM fund transfer using active authentication |
WO2019199422A1 (en) * | 2018-04-13 | 2019-10-17 | Mastercard International Incorporated | Method and system for facilitating designated payment transaction |
US10453062B2 (en) | 2011-03-15 | 2019-10-22 | Capital One Services, Llc | Systems and methods for performing person-to-person transactions using active authentication |
US10769262B1 (en) | 2014-01-17 | 2020-09-08 | Microstrategy Incorporated | Enabling use of credentials |
US11632367B2 (en) | 2020-05-28 | 2023-04-18 | Capital One Services, Llc | System and method for agnostic authentication of a client device |
US11816665B2 (en) | 2008-02-20 | 2023-11-14 | Stripe, Inc. | Method and system for multi-modal transaction authentication |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120089509A1 (en) * | 2010-10-06 | 2012-04-12 | Ebay Inc. | Systems and methods for facilitating payment reconciliation over a network |
US10360561B2 (en) * | 2010-12-14 | 2019-07-23 | Lime Light RM, Inc. | System and method for secured communications between a mobile device and a server |
US20120215658A1 (en) * | 2011-02-23 | 2012-08-23 | dBay Inc. | Pin-based payment confirmation |
US8869245B2 (en) | 2011-03-09 | 2014-10-21 | Ebay Inc. | Device reputation |
ITTO20110861A1 (en) * | 2011-09-28 | 2013-03-29 | Movincom Servizi S P A | PROCEDURE FOR MANAGING PAYMENTS BETWEEN A PLURALITY OF EXHIBITORS AND A PLURALITY OF USERS, ITS RELATED SYSTEM FOR MANAGING PAYMENTS AND IT PRODUCTS |
GB2498326B (en) * | 2011-10-12 | 2016-04-20 | Technology Business Man Ltd | ID Authentication |
US10515359B2 (en) * | 2012-04-02 | 2019-12-24 | Mastercard International Incorporated | Systems and methods for processing mobile payments by provisioning credentials to mobile devices without secure elements |
US8849303B2 (en) * | 2012-04-23 | 2014-09-30 | Apple Inc. | Apparatus and method for determining a wireless device's location after shutdown |
US10607236B2 (en) | 2012-07-11 | 2020-03-31 | Viewpost, Llc | Universal system for enabling dynamically discounted buyer-vendor payments |
US8762271B2 (en) | 2012-07-11 | 2014-06-24 | Viewpost, Llc | Universal payment module and system |
US11468410B2 (en) | 2012-07-11 | 2022-10-11 | Viewpost, Llc. | Universal payment module and system |
US10650385B1 (en) | 2012-10-08 | 2020-05-12 | Viewpost, Llc | System and method for remote check assurance |
GB2512070A (en) * | 2013-03-19 | 2014-09-24 | Barclays Bank Plc | Online payment transaction system |
US20150371221A1 (en) * | 2014-06-20 | 2015-12-24 | Ebay Inc. | Two factor authentication for invoicing payments |
US10565569B2 (en) | 2015-07-30 | 2020-02-18 | NXT-ID, Inc. | Methods and systems related to multi-factor, multidimensional, mathematical, hidden and motion security pins |
WO2017131247A1 (en) * | 2016-01-26 | 2017-08-03 | 김금철 | Internet portal system and method of use therefor |
CN105894280B (en) * | 2016-03-29 | 2019-11-15 | 努比亚技术有限公司 | A kind of mobile terminal and method of hiding payment code |
GB201721028D0 (en) * | 2017-12-15 | 2018-01-31 | Semafone Ltd | Authentication and authorisation |
US10796016B2 (en) * | 2018-03-28 | 2020-10-06 | Visa International Service Association | Untethered resource distribution and management |
EP3627363A1 (en) * | 2018-09-19 | 2020-03-25 | Vocalink Limited | Information processing system, devices and methods |
Citations (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4962530A (en) * | 1987-09-10 | 1990-10-09 | Computer Security Corporation | System for cryptographing and identification |
US6324526B1 (en) * | 1999-01-15 | 2001-11-27 | D'agostino John | System and method for performing secure credit card purchases |
US20020111919A1 (en) * | 2000-04-24 | 2002-08-15 | Visa International Service Association | Online payer authentication service |
US20030212894A1 (en) * | 2002-05-10 | 2003-11-13 | Peter Buck | Authentication token |
US20030218062A1 (en) * | 2002-05-23 | 2003-11-27 | Eduardo Noriega | Prepaid card payment system and method for electronic commerce |
US20030233327A1 (en) * | 2002-06-12 | 2003-12-18 | Cardinal Commerce Corporation | Universal merchant platform for payment authentication |
US20040034598A1 (en) * | 2000-01-20 | 2004-02-19 | Timothy Robinson | System and method for biological authorization for financial transactions |
US20040104266A1 (en) * | 2002-12-03 | 2004-06-03 | International Business Machines Corporation | System and method for multi-party validation, authentication and/or authorization via biometrics |
US6782120B2 (en) * | 2000-05-09 | 2004-08-24 | Giesecke & Devrient Gmbh | Method and system for generating a key record |
EP1465128A1 (en) * | 2003-04-01 | 2004-10-06 | Coöperatieve Centrale Raiffeisen-Boerenleenbank B.A. | Transaction apparatus for processing transactions by means of a communication network, and system comprising such a transaction apparatus |
US20040199469A1 (en) * | 2003-03-21 | 2004-10-07 | Barillova Katrina A. | Biometric transaction system and method |
US20050102211A1 (en) * | 1999-10-27 | 2005-05-12 | Freeny Charles C.Jr. | Proximity service provider system |
US6941282B1 (en) * | 1999-03-18 | 2005-09-06 | Oracle International Corporation | Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts |
US20050228675A1 (en) * | 2004-03-18 | 2005-10-13 | Marian Trinkel | Method and system for person/speaker verification via communications systems |
US20050228750A1 (en) * | 2004-04-13 | 2005-10-13 | Hugo Olliphant | Method and system for facilitating merchant-initiated online payments |
US20060219776A1 (en) * | 2003-11-17 | 2006-10-05 | Dpd Patent Trust | Rfid reader with multiple interfaces |
US20060282382A1 (en) * | 2002-06-12 | 2006-12-14 | Cardinalcommerce Corporation | Universal merchant platform for payment authentication |
US7319987B1 (en) * | 1996-08-29 | 2008-01-15 | Indivos Corporation | Tokenless financial access system |
US20080103972A1 (en) * | 2006-10-25 | 2008-05-01 | Payfont Limited | Secure authentication and payment system |
US20080288404A1 (en) * | 2007-05-18 | 2008-11-20 | Kiushan Pirzadeh | Method and system for payment authorization and card presentation using pre-issued identities |
US7499888B1 (en) * | 2001-03-16 | 2009-03-03 | Fusionone, Inc. | Transaction authentication system and method |
US20090099961A1 (en) * | 2004-06-25 | 2009-04-16 | Ian Charles Ogilvy | Transaction Processing Method, Apparatus and System |
US20090254440A1 (en) * | 2008-04-02 | 2009-10-08 | Pharris Dennis J | Ghosting payment account data in a mobile telephone payment transaction system |
US20100114740A1 (en) * | 2008-10-31 | 2010-05-06 | Ben Dominguez | User enhanced authentication system for online purchases |
US20100312703A1 (en) * | 2009-06-03 | 2010-12-09 | Ashish Kulpati | System and method for providing authentication for card not present transactions using mobile device |
US20110167002A1 (en) * | 2002-06-12 | 2011-07-07 | Cardinalcommerce Corporation | Universal merchant platform for payment authentication |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5319710A (en) * | 1986-08-22 | 1994-06-07 | Tandem Computers Incorporated | Method and means for combining and managing personal verification and message authentication encrytions for network transmission |
EP1023794A4 (en) * | 1995-06-07 | 2002-01-09 | Comm Inc E | System for detecting unauthorized account access |
US7792745B2 (en) * | 2000-02-25 | 2010-09-07 | Ipass Inc. | Method and system to facilitate financial settlement of service access transactions between multiple parties |
US20010047326A1 (en) * | 2000-03-14 | 2001-11-29 | Broadbent David F. | Interface system for a mortgage loan originator compliance engine |
US7418429B1 (en) * | 2000-10-20 | 2008-08-26 | Accenture Pte. Ltd. | Method and system for facilitating a trusted on-line transaction between insurance businesses and networked consumers |
US6915437B2 (en) * | 2000-12-20 | 2005-07-05 | Microsoft Corporation | System and method for improved network security |
US20020109580A1 (en) * | 2001-02-15 | 2002-08-15 | Shreve Gregory A. | Wireless universal personal access system |
US7228439B2 (en) * | 2002-04-19 | 2007-06-05 | Nagravision S.A. | Management method of rights of a content encrypted and stored in a personal digital recorder |
US20040054812A1 (en) * | 2002-09-13 | 2004-03-18 | Jiasen Liang | System and method for interfacing with a legacy computer system |
DK200300384A (en) * | 2003-03-13 | 2004-09-14 | Quard Technology I S | Self-Approving Biometric Device with Dynamic PIN Code Creation |
KR100439437B1 (en) * | 2003-12-18 | 2004-07-09 | 주식회사 교원나라 | Bank transaction system for linked accounts via common account |
EA009978B1 (en) * | 2004-01-06 | 2008-04-28 | Епасспорте, Н.В. | Method of managing prepaid accounts |
US20070186099A1 (en) * | 2004-03-04 | 2007-08-09 | Sweet Spot Solutions, Inc. | Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method |
US20060036539A1 (en) * | 2004-08-14 | 2006-02-16 | Tombroff James D | System and method for anonymous gifting |
AU2005277198A1 (en) * | 2004-08-18 | 2006-03-02 | Mastercard International Incorporated | Method and system for authorizing a transaction using a dynamic authorization code |
US7958030B2 (en) * | 2004-09-01 | 2011-06-07 | Visa U.S.A. Inc. | System and method for issuer originated payments for on-line banking bill payments |
JP2007018050A (en) * | 2005-07-05 | 2007-01-25 | Sony Ericsson Mobilecommunications Japan Inc | Portable terminal device, personal identification number certification program, and personal identification number certification method |
RU2290695C1 (en) * | 2005-07-15 | 2006-12-27 | Федеральный центр информатизации при Центральной избирательной комиссии Российской Федерации | Method and system for preparing and performing electronic voting |
NO324315B1 (en) * | 2005-10-03 | 2007-09-24 | Encap As | Method and system for secure user authentication at personal data terminal |
US7552467B2 (en) * | 2006-04-24 | 2009-06-23 | Jeffrey Dean Lindsay | Security systems for protecting an asset |
US8565723B2 (en) * | 2007-10-17 | 2013-10-22 | First Data Corporation | Onetime passwords for mobile wallets |
US8200736B2 (en) * | 2007-12-24 | 2012-06-12 | Qualcomm Incorporated | Virtual SIM card for mobile handsets |
US8521631B2 (en) * | 2008-05-29 | 2013-08-27 | Sas Institute Inc. | Computer-implemented systems and methods for loan evaluation using a credit assessment framework |
US20100095117A1 (en) * | 2008-10-15 | 2010-04-15 | Shebanow Michael C | Secure and positive authentication across a network |
-
2009
- 2009-06-30 US US12/494,652 patent/US8825548B2/en active Active
-
2014
- 2014-08-28 US US14/472,052 patent/US20140372321A1/en not_active Abandoned
Patent Citations (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4962530A (en) * | 1987-09-10 | 1990-10-09 | Computer Security Corporation | System for cryptographing and identification |
US7319987B1 (en) * | 1996-08-29 | 2008-01-15 | Indivos Corporation | Tokenless financial access system |
US6324526B1 (en) * | 1999-01-15 | 2001-11-27 | D'agostino John | System and method for performing secure credit card purchases |
US6941282B1 (en) * | 1999-03-18 | 2005-09-06 | Oracle International Corporation | Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts |
US20050102211A1 (en) * | 1999-10-27 | 2005-05-12 | Freeny Charles C.Jr. | Proximity service provider system |
US6970850B1 (en) * | 1999-10-27 | 2005-11-29 | Automated Business Companies | Proximity service provider system |
US20040034598A1 (en) * | 2000-01-20 | 2004-02-19 | Timothy Robinson | System and method for biological authorization for financial transactions |
US20020111919A1 (en) * | 2000-04-24 | 2002-08-15 | Visa International Service Association | Online payer authentication service |
US6782120B2 (en) * | 2000-05-09 | 2004-08-24 | Giesecke & Devrient Gmbh | Method and system for generating a key record |
US7499888B1 (en) * | 2001-03-16 | 2009-03-03 | Fusionone, Inc. | Transaction authentication system and method |
US20030212894A1 (en) * | 2002-05-10 | 2003-11-13 | Peter Buck | Authentication token |
US20030218062A1 (en) * | 2002-05-23 | 2003-11-27 | Eduardo Noriega | Prepaid card payment system and method for electronic commerce |
US20060282382A1 (en) * | 2002-06-12 | 2006-12-14 | Cardinalcommerce Corporation | Universal merchant platform for payment authentication |
US20030233327A1 (en) * | 2002-06-12 | 2003-12-18 | Cardinal Commerce Corporation | Universal merchant platform for payment authentication |
US20110167002A1 (en) * | 2002-06-12 | 2011-07-07 | Cardinalcommerce Corporation | Universal merchant platform for payment authentication |
US20040104266A1 (en) * | 2002-12-03 | 2004-06-03 | International Business Machines Corporation | System and method for multi-party validation, authentication and/or authorization via biometrics |
US20040199469A1 (en) * | 2003-03-21 | 2004-10-07 | Barillova Katrina A. | Biometric transaction system and method |
EP1465128A1 (en) * | 2003-04-01 | 2004-10-06 | Coöperatieve Centrale Raiffeisen-Boerenleenbank B.A. | Transaction apparatus for processing transactions by means of a communication network, and system comprising such a transaction apparatus |
US20060219776A1 (en) * | 2003-11-17 | 2006-10-05 | Dpd Patent Trust | Rfid reader with multiple interfaces |
US20050228675A1 (en) * | 2004-03-18 | 2005-10-13 | Marian Trinkel | Method and system for person/speaker verification via communications systems |
US20050228750A1 (en) * | 2004-04-13 | 2005-10-13 | Hugo Olliphant | Method and system for facilitating merchant-initiated online payments |
US20090099961A1 (en) * | 2004-06-25 | 2009-04-16 | Ian Charles Ogilvy | Transaction Processing Method, Apparatus and System |
US20080103972A1 (en) * | 2006-10-25 | 2008-05-01 | Payfont Limited | Secure authentication and payment system |
US20080288404A1 (en) * | 2007-05-18 | 2008-11-20 | Kiushan Pirzadeh | Method and system for payment authorization and card presentation using pre-issued identities |
US20090254440A1 (en) * | 2008-04-02 | 2009-10-08 | Pharris Dennis J | Ghosting payment account data in a mobile telephone payment transaction system |
US20100114740A1 (en) * | 2008-10-31 | 2010-05-06 | Ben Dominguez | User enhanced authentication system for online purchases |
US20100312703A1 (en) * | 2009-06-03 | 2010-12-09 | Ashish Kulpati | System and method for providing authentication for card not present transactions using mobile device |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11068890B2 (en) * | 2008-02-20 | 2021-07-20 | Collective Dynamics LLC | Method and system for multi-modal transaction authentication |
US20180082297A1 (en) * | 2008-02-20 | 2018-03-22 | Collective Dynamics LLC | Method and System for Multi-Modal Transaction Authentication |
US11816665B2 (en) | 2008-02-20 | 2023-11-14 | Stripe, Inc. | Method and system for multi-modal transaction authentication |
US11501298B2 (en) | 2008-02-20 | 2022-11-15 | Stripe, Inc. | Method and system for multi-modal transaction authentication |
US10108959B2 (en) * | 2011-03-15 | 2018-10-23 | Capital One Services, Llc | Systems and methods for performing ATM fund transfer using active authentication |
US11836724B2 (en) | 2011-03-15 | 2023-12-05 | Capital One Services, Llc | Systems and methods for performing ATM fund transfer using active authentication |
US10453062B2 (en) | 2011-03-15 | 2019-10-22 | Capital One Services, Llc | Systems and methods for performing person-to-person transactions using active authentication |
US11042877B2 (en) | 2011-03-15 | 2021-06-22 | Capital One Services, Llc | Systems and methods for performing ATM fund transfer using active authentication |
US10769262B1 (en) | 2014-01-17 | 2020-09-08 | Microstrategy Incorporated | Enabling use of credentials |
US20170337089A1 (en) * | 2016-05-12 | 2017-11-23 | Skidata Ag | Method for registering devices, in particular conditional access devices or payment or vending machines, on a server of a system which comprises a number of such devices |
US10635495B2 (en) * | 2016-05-12 | 2020-04-28 | Skidata Ag | Method for registering devices, in particular conditional access devices or payment or vending machines, on a server of a system which comprises a number of such devices |
WO2019199422A1 (en) * | 2018-04-13 | 2019-10-17 | Mastercard International Incorporated | Method and system for facilitating designated payment transaction |
US11632367B2 (en) | 2020-05-28 | 2023-04-18 | Capital One Services, Llc | System and method for agnostic authentication of a client device |
Also Published As
Publication number | Publication date |
---|---|
US8825548B2 (en) | 2014-09-02 |
US20100332391A1 (en) | 2010-12-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8825548B2 (en) | Secure authentication between multiple parties | |
US11405380B2 (en) | Systems and methods for using imaging to authenticate online users | |
US10853468B2 (en) | Applications login using a mechanism relating sub-tokens to the quality of a master token | |
US10911456B2 (en) | Systems and methods for device push provisioning | |
US11108558B2 (en) | Authentication and fraud prevention architecture | |
US8938793B2 (en) | System and method for secure management of transactions | |
US7849501B2 (en) | Methods and systems for using data processing systems in order to authenticate parties | |
US8763105B1 (en) | Keyfob for use with multiple authentication entities | |
US9390413B2 (en) | System and method for making electronic payments from a wireless mobile device | |
US10467604B1 (en) | ATM transaction with a mobile device | |
US8079082B2 (en) | Verification of software application authenticity | |
US20160189136A1 (en) | Authentication of mobile device for secure transaction | |
US20140058951A1 (en) | Mobile electronic device and use thereof for electronic transactions | |
US20110093397A1 (en) | Anti-phishing system and method including list with user data | |
TW202117621A (en) | Method and device for realizing dual offline payment | |
US20090157549A1 (en) | Using a mobile phone as a remote pin entry terminal for cnp credit card transactions | |
US12008574B2 (en) | Authentication and authorization with physical cards | |
CA3054287A1 (en) | Contacts for misdirected payments and user authentication | |
CN111832005A (en) | Application authorization method, application authorization device and electronic equipment | |
US20220027901A1 (en) | Secure process to avoid storing payment credentials | |
US20230237172A1 (en) | Data broker | |
TW202117631A (en) | Method for verifying financial service access privilege using different computer sequences and system thereof | |
KR20070021867A (en) | Wireless authentication system interworking with wireless terminal and method | |
TW201803312A (en) | System and method for providing one time passwork through telephoen network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EBAY INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KHAN, KHURRAM;REEL/FRAME:033721/0052 Effective date: 20140808 |
|
AS | Assignment |
Owner name: PAYPAL, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EBAY INC.;REEL/FRAME:036171/0221 Effective date: 20150717 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |