US20170149566A9 - Centralized Identification and Authentication System and Method - Google Patents

Centralized Identification and Authentication System and Method Download PDF

Info

Publication number
US20170149566A9
US20170149566A9 US13/606,538 US201213606538A US2017149566A9 US 20170149566 A9 US20170149566 A9 US 20170149566A9 US 201213606538 A US201213606538 A US 201213606538A US 2017149566 A9 US2017149566 A9 US 2017149566A9
Authority
US
United States
Prior art keywords
entity
user
dynamic code
central
external
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/606,538
Other versions
US20130036053A1 (en
US9727864B2 (en
Inventor
Nader Asghari-Kamrani
Kamran Asghari-Kamrani
Original Assignee
Nader Asghari-Kamrani
Kamran Asghari-Kamrani
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
Priority to US09/940,635 priority Critical patent/US7356837B2/en
Priority to US61560304P priority
Priority to US65013705P priority
Priority to US11/239,046 priority patent/US7444676B1/en
Priority to US11/333,400 priority patent/US8281129B1/en
Priority to US12/210,926 priority patent/US8266432B2/en
Priority to US13/606,538 priority patent/US9727864B2/en
Application filed by Nader Asghari-Kamrani, Kamran Asghari-Kamrani filed Critical Nader Asghari-Kamrani
Priority claimed from US13/633,680 external-priority patent/US9703938B2/en
Publication of US20130036053A1 publication Critical patent/US20130036053A1/en
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=39874438&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20170149566(A9) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Publication of US20170149566A9 publication Critical patent/US20170149566A9/en
Application granted granted Critical
Publication of US9727864B2 publication Critical patent/US9727864B2/en
Application status is Active legal-status Critical
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Use of an alias or a single-use code
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0207Discounts or incentives, e.g. coupons, rebates, offers or upsales
    • G06Q30/0225Avoiding frauds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Abstract

A Central-Entity centralizes users' personal and financial information in a secure environment in order to prevent the distribution of user's information in e-commerce. This information is then used to create digital identity for the users. The digital identity of each user is dynamic, non-predictable and time dependent, because it is a combination of a user name and a dynamic, non-predictable and time dependent secure code that will be provided to the user for his identification. The user provides his digital identity to an External-Entity such as merchant or service provider. The External-Entity is dependent on Central-Entity to identify the user based on the digital identity given by the user. The External-Entity forwards the user's digital identity to the Central-Entity for identification and authentication of the user and the transaction.

Description

    RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 12/210,926 filed Sep. 15, 2008 by the same inventors and bearing the same title—now U.S. Pat. No. 8,266,432 issued on Sep. 11, 2012. U.S. patent application Ser. No. 12/210,926 is a continuation of U.S. patent application Ser. No. 11/239,046 filed Sep. 30, 2005 by the same inventors and bearing the same title—now U.S. Pat. No. 7,446,676 issued on Oct. 28, 2008. U.S. patent application Ser. No. 11/239,046 is a continuation of U.S. patent application Ser. No. 09/940,635 filed Aug. 29, 2001 by the same inventors and bearing the same title—now U.S. Pat. No. 7,356,837 issued on Apr. 8, 2008. U.S. patent application Ser. No. 11/239,046 claims priority to U.S. Provisional Patent Application No. 60/615,043 filed Oct. 5, 2004 by the same inventors and bearing the same title.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to a centralized identification and authentication system and method for identifying an individual over a communication network such as Internet, to increase security in e-commerce. More particularly a method and system for generation of a dynamic, non-predictable and time dependent SecureCode for the purpose of positively identifying an individual.
  • 2. Description of the Related Art
  • The increasing use of the Internet and the increase of businesses utilizing e-commerce have lead to a dramatic increase in customers releasing confidential personal and financial information, in the form of social security numbers, names, addresses, credit card numbers and bank account numbers, to identify themselves. This will allow them to get access to the restricted web sites or electronically purchase desired goods or services. Unfortunately this type of identification is not only unsafe but also it is not fool proof that the user is really the person he says he is. The effect of these increases is reflected in the related art.
  • U.S. Pat. No. 5,732,137 issued to Aziz outlines a system and method for providing remote user authentication in a public computer network such as the Internet. More specifically, the system and method provides for remote authentication using a one-time password scheme having a secure out-of-band channel for initial password delivery.
  • U.S. Pat. No. 5,815,665 issued to Teper et al. outlines the use of a system and method for enabling consumers to anonymously, securely and conveniently purchase on-line services from multiple service providers over a distributed network, such as the Internet. Specifically, a trusted third-party broker provides billing and security services for registered service providers via an online brokering service, eliminating the need for the service providers to provide these services.
  • U.S. Pat. No. 5,991,408 issued to Pearson, et al. outlines a system and method for using a biometric element to create a secure identification and verification system, and more specifically to an apparatus and a method for creating a hard problem which has a representation of a biometric element as its solution.
  • Although each of the previous patents outline a valuable system and method, what is really needed is a system and method that offers digital identity to the users and allows them to participate in e-commerce without worrying about the privacy and security. In addition to offering security and privacy to the users, the new system has to be simple for businesses to adopt and also doesn't require the financial institutions to change their existing systems. Such a secure, flexible and scalable system and method would be of great value to the businesses that would like to participate in today's electronic commerce.
  • None of the above inventions and patents, taken either singularly or in combination, is seen to describe the instant invention as claimed. Thus a centralized identification and authentication system and method solving the aforementioned problems is desired.
  • For convenience, the term “user” is used throughout to represent both a typical person consuming goods and services as well as a business consuming goods and services.
  • As used herein, a “Central-Entity” is any party that has user's personal and/or financial information, UserName, Password and generates dynamic, non-predictable and time dependent SecureCode for the user. Examples of Central-Entity are: banks, credit card issuing companies or any intermediary service companies.
  • As also used herein, an “External-Entity” is any party offering goods or services that users utilize by directly providing their UserName and SecureCode as digital identity. Such entity could be a merchant, service provider or an online site. An “External-Entity” could also be an entity that receives the user's digital identity indirectly from the user through another External-Entity, in order to authenticate the user, such entity could be a bank or a credit card issuing company.
  • The term “UserName” is used herein to denote any alphanumeric name, id, login name or other identification phrase, which may be used by the “Central-Entity” to identify the user.
  • The term “Password” is used herein to denote any alphanumeric password, secret code, PIN, prose phrase or other code, which may be stored in the system to authenticate the user by the “Central-Entity”.
  • The term “SecureCode” is used herein to denote any dynamic, non-predictable and time dependent alphanumeric code, secret code, PIN or other code, which may be broadcast to the user over a communication network, and may be used as part of a digital identity to identify a user as an authorized user.
  • The term “digital identity” is used herein to denote a combination of user's “SecureCode” and user's information such as “UserName”, which may result in a dynamic, non-predictable and time dependent digital identity that could be used to identify a user as an authorized user.
  • The term “financial information” is used herein to denote any credit card and banking account information such as debit cards, savings accounts and checking accounts.
  • SUMMARY OF THE INVENTION
  • The invention relates to a system and method provided by a Central-Entity for centralized identification and authentication of users and their transactions to increase security in e-commerce. The system includes:
      • A Central-Entity: This entity centralizes users personal and financial information in a secure environment in order to prevent the distribution of user's information in e-commerce. This information is then used to create digital identity for the users. The users may use their digital identity to identify themselves instead of providing their personal and financial information to the External-Entities;
      • A plurality of users: A user represents both a typical person consuming goods and services as well as a business consuming goods and services, who needs to be identified in order to make online purchases or to get access to the restricted web sites. The user registers at the Central-Entity to receive his digital identity, which is then provided to the External-Entity for identification;
      • A plurality of External-Entities: An External-Entity is any party offering goods or services in e-commerce and needs to authenticate the users based on digital identity.
  • The user signs-up at the Central-Entity by providing his personal or financial information. The Central-Entity creates a new account with user's personal or financial information and issues a unique UserName and Password to the user. The user provides his Username and Password to the Central-Entity for identification and authentication purposes when accessing the services provided by the Central-Entity. The Central-Entity also generates dynamic, non-predictable and time dependent SecureCode for the user per user's request and issues the SecureCode to the user. The Central-Entity maintains a copy of the SecureCode for identification and authentication of the user's digital identity. The user presents his UserName and SecureCode as digital identity to the External-Entity for identification. When an External-Entity receives the user's digital identity (UserName and SecureCode), the External-Entity will forward this information to the Central-Entity to identify and authenticate the user. The Central-Entity will validate the information and sends an approval or denial response back to the External-Entity.
  • There are also communications networks for the user, the Central-Entity and the External-Entity to give and receive information between each other.
  • This invention also relates to a system and method provided by a Central-Entity for centralized identification and authentication of users to allow them access to restricted web sites using their digital identity, preferably without revealing confidential personal or financial information.
  • This invention further relates to a system and method provided by a Central-Entity for centralized identification and authentication of users to allow them to purchase goods and services from an External-Entity using their digital identity, preferably without revealing confidential personal or financial information.
  • Accordingly, it is a principal object of the invention to offer digital identity to the users for identification in e-commerce.
  • It is another object of the invention to centralize user's personal and financial information in a secure environment.
  • It is another object of the invention to prevent the user from distributing their personal and financial information.
  • It is a further object of the invention to keep merchants, service providers, Internet sites and financial institutions satisfied by positively identifying and authenticating the users.
  • It is another object of the invention to reduce fraud and increase security for e-commerce.
  • It is another object of the invention to allow businesses to control visitor's access to their web sites.
  • It is another object of the invention to protect the customer from getting bills for goods and services that were not ordered.
  • It is another object of the invention to increase customers' trust and reduce customers' fear for e-commerce.
  • It is another object to decrease damages to the customers, merchants and financial institutions.
  • It is an object of the invention to provide improved elements and arrangements thereof for the purposes described which are inexpensive, dependable and fully effective in accomplishing its intended purposes.
  • These and other objects of the present invention will become readily apparent upon further review of the following specification and drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a high-level overview of a centralized identification and authentication system and method according to the present invention.
  • FIG. 2 is a detailed overview of a centralized identification and authentication system and method according to the present invention.
  • FIG. 3 is a block diagram of the registration of a customer utilizing a centralized identification and authentication system and method according to the present invention.
  • FIG. 4 is a block diagram of the transaction of a customer utilizing a centralized identification and authentication system and method according to the present invention.
  • FIG. 5 is a block diagram of a Central-Entity authorizing a user utilizing a centralized identification and authentication system and method according to the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • Detailed descriptions of the preferred embodiment are provided herein. It is to be understood, however, that the present invention may be embodied in various forms. Therefore, specific details disclosed herein are not to be interpreted as limiting, but rather as a basis for the claims and as a representative basis for teaching one skilled in the art to employ the present invention in virtually any appropriately detailed system, structure or manner.
  • The invention relates to a system 1 and method 2 to identify and authenticate the users and their transactions to increase security in e-commerce. FIG. 1 illustrates a system to positively identify the users 10 in e-commerce based on digital identity.
  • The system 1 comprises a plurality of users 10, a plurality of External-Entities 20 with goods and services that are desired by the users 10 and a Central-Entity 30 providing a unique UserName and Password to the users 10 and generating dynamic, non-predictable and time dependent SecureCode for the users 10 per user's request. There are also communication networks 50 for the user 10, the Central-Entity 30 and the External-Entity 20 to give and receive information between each other.
  • It would be desirable to develop a new system 1 and method 2 to centralize user's personal and financial information in a secure environment and to offer digital identity to the users 10 in order to provide privacy, increase security and reduce fraud in e-commerce. Ideally, a secure identification and authentication system 1 would identify legitimate users 10 and unauthorized users 10. This would increase the user's trust, which leads to more sales and cash flow for the merchants/service providers.
  • The present invention relates to a system 1 and method 2 to support this ideal identification and authentication system. For identification purpose, a digital identity (a unique UserName and a dynamic, non-predictable and time dependent SecureCode) is used by the user 10 at the time of ordering or at the time of accessing a restricted Internet site. A series of steps describing the overall method are conducted between the users 10, the Central-Entity 30 and the External-Entity 20 and are outlined in FIG. 3,4,5.
  • There are three distinct phases involved in using the centralized identification and authentication system FIG. 2, the first of which being the registration phase, which is depicted in FIG. 3. During the registration phase, the user 10 provides his personal or financial information to the Central-Entity 30. The user 10 registers at the Central-Entity 30, 100, 104 and receives his account and login information such as UserName and Password 108. User 10 can access his account at any time by accessing the Central-Entity's system using a communication network 50 and logging into the system.
  • Next is the transaction phase, where the user 10 attempts to access a restricted web site or attempts to buy services or products 110, as illustrated in FIG. 4, through a standard interface provided by the External-Entity 20, similar to what exists today and selects digital identity as his identification and authorization or payment option. The External-Entity 20 displays the access or purchase authorization form requesting the user 10 to authenticate himself using his UserName and SecureCode as digital identity. The user 10 requests SecureCode from the Central-Entity 30 by accessing his account over the communication network 50, 114. The Central-Entity 30 generates dynamic, non-predictable and time dependent SecureCode 118 for the user 10. The Central-Entity 30 maintains a copy of the SecureCode for identification and authentication of the user 10 and issues the SecureCode to the user 10. When the user 10 receives the SecureCode 120, the user 10 provides his UserName and SecureCode as digital identity to the External-Entity 20, 124, FIG. 4.
  • The third phase is identification and authorization phase. Once the user 10 provides his digital identity to the External-Entity 20, the External-Entity 20 forwards user's digital identity along with the identification and authentication request to the Central-Entity 30, 130, as illustrated in FIG. 5. When the Central-Entity 30 receives the request containing the user's digital identity, the Central-Entity 30 locates the user's digital identity (UserName and SecureCode) in the system 134 and compares it to the digital identity received from the External-Entity 20 to identify and validate the user 10, 138. The Central-Entity 30 generates a reply back to the External-Entity 20 via a communication network 50 as a result of the comparison. If both digital identities match, the Central-Entity 30 will identify the user 10 and will send an approval of the identification and authorization request to the External-Entity 20, 140, otherwise will send a denial of the identification and authorization request to the External-Entity 20, 150. The External-Entity 20 receives the approval or denial response in a matter of seconds. The External-Entity 20 might also display the identification and authentication response to the user 10.
  • To use the digital identity feature, the Central-Entity 30 provides the authorized user 10 the capability to obtain a dynamic, non-predictable and time dependent SecureCode. The user 10 will provide his UserName and SecureCode as digital identity to the External-Entity 20 when this information is required by the External-Entity 20 to identify the user 10.
  • The Central-Entity 30 may add other information to the SecureCode before sending it to the user 10, by algorithmically combining SecureCode with user's information such as UserName. The generated SecureCode will have all the information needed by the Central-Entity 30 to identify the user 10. In this case the user will only need to provide his SecureCode as digital identity to the External-Entity 20 for identification.
  • In the preferred embodiment, the user 10 uses the communication network 50 to receive the SecureCode from the Central-Entity 30. The user 10 submits the SecureCode in response to External-Entity's request 124. The SecureCode is preferably implemented through the use of an indicator. This indicator has two states: “on” for valid and “off” for invalid. When the user 10 receives the SecureCode, the SecureCode is in “on” or “valid” state. The Central-Entity 30 may improve the level of security by invalidating the SecureCode after it's use. This may increase the level of difficulty for unauthorized user. Two events may cause a valid SecureCode to become invalid:
      • 1. Timer event: This event occurs when the predefined time passes. As mentioned above the SecureCode is time dependent.
      • 2. Validation event: This event occurs when the SecureCode forwarded to the Central-Entity 30 (as part of digital identity) corresponds to the user's SecureCode held in the system. When this happens the Central-Entity 30 will invalidate the SecureCode to prevent future use and sends an approval identification and authorization message to the External-Entity 20,140.
  • A valid digital identity corresponds to a valid SecureCode. When the SecureCode becomes invalid, the digital identity will also become invalid.
  • While the invention has been described in connection with a preferred embodiment, it is not intended to limit the scope of the invention to the particular form set forth, but on the contrary, it is intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims.

Claims (20)

What is claimed is:
1. A method performed by a central-entity for authenticating a user during an electronic transaction between the user and an external-entity over a communication network, the method comprising:
receiving electronically a request for a dynamic code for the user during the transaction between the user and the external-entity;
providing a dynamic code to the user over a communication network for authentication of the user during electronic transaction wherein the dynamic code is valid for a predefined time and becomes invalid after being used;
receiving user's digital identity over a communication network during electronic transaction between the user and the external-entity, which digital identity includes a dynamic code;
validating said dynamic code during the electronic transaction; and
sending a result of validation to the external-entity during electronic transaction.
2. The method according to claim 1, wherein said dynamic code is alphanumeric.
3. The method according to claim 1, wherein said external-entity and said central-entity are the same entity.
4. The method according to claim 1, wherein the transaction corresponds to one or more of the following; a financial transaction, a non-financial transaction, access request to a restricted web-site or a restricted computer/server or restricted network.
5. The method according to claim 1, wherein said the digital identity comprises said dynamic code and a user-specific information.
6. The method according to claim 1, wherein said digital identity is dynamic code.
7. The method according to claim 1, wherein said communication network comprises one or more of the following: a public network, an internet, a wireless network, a mobile network, a satellite network, and a private network.
8. The method according to claim 1, wherein said the digital identity is invalid if the dynamic code is invalid.
9. The method according to claim 1, wherein said the user is authentic if the digital identity including the dynamic code is valid during the transaction.
10. A method for an external-entity to authenticate a user during a transaction between the user and the external-entity based on authentication result received from a central-entity, the method comprising:
requesting the central-entity to authenticate the user based on a digital identity including a dynamic code received from the user during the transaction wherein the dynamic code provided to the user by the central-entity during the transaction which dynamic code is valid for a predefined time and becomes invalid after being used;
receiving authentication result from the central-entity during the transaction; and
authenticating the user based on authentication result.
11. The method according to claim 10, wherein said dynamic code is alphanumeric.
12. The method according to claim 10, wherein said external-entity and said central-entity are the same entity.
13. The method according to claim 10, wherein the transaction corresponds to one or more of the following; a financial transaction, a non-financial transaction, access request to a restricted web-site or a restricted computer/server or restricted network.
14. The method according to claim 10, wherein said the digital identity comprises said dynamic code and a user-specific information.
15. The method according to claim 10, wherein said digital identity is dynamic code.
16. A method for a central-entity to authenticate a user during a transaction between the user and an external-entity, the method comprising:
providing electronically by the central-entity a dynamic code to the user and expecting the user to use the dynamic code during the transaction between the user and the external-entity for authentication purpose wherein the dynamic code is valid for a predefined time and becomes invalid after being used;
receiving electronically by the central-entity a request for authenticating the user based on a digital identity including the dynamic code;
authenticating by the central-entity the user during the transaction if the digital identity including the dynamic code is valid; and
providing by the central-entity a result of authenticating to the external-entity.
17. The method according to claim 16, wherein said dynamic code is alphanumeric.
18. The method according to claim 16, wherein said external-entity and said central-entity are the same entity.
19. The method according to claim 16, wherein said the digital identity comprises said dynamic code and a user-specific information.
20. The method according to claim 16, wherein said digital identity is dynamic code.
US13/606,538 2001-08-29 2012-09-07 Centralized identification and authentication system and method Active US9727864B2 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US09/940,635 US7356837B2 (en) 2001-08-29 2001-08-29 Centralized identification and authentication system and method
US61560304P true 2004-10-05 2004-10-05
US65013705P true 2005-02-07 2005-02-07
US11/239,046 US7444676B1 (en) 2001-08-29 2005-09-30 Direct authentication and authorization system and method for trusted network of financial institutions
US11/333,400 US8281129B1 (en) 2001-08-29 2006-01-18 Direct authentication system and method via trusted authenticators
US12/210,926 US8266432B2 (en) 2001-08-29 2008-09-15 Centralized identification and authentication system and method
US13/606,538 US9727864B2 (en) 2001-08-29 2012-09-07 Centralized identification and authentication system and method

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US13/606,538 US9727864B2 (en) 2001-08-29 2012-09-07 Centralized identification and authentication system and method
US13/633,680 US9703938B2 (en) 2001-08-29 2012-10-02 Direct authentication system and method via trusted authenticators
US15/614,164 US9870453B2 (en) 2001-08-29 2017-06-05 Direct authentication system and method via trusted authenticators
US15/639,020 US20170308716A1 (en) 2001-08-29 2017-06-30 Centralized identification and authentication system and method
US15/833,909 US10083285B2 (en) 2001-08-29 2017-12-06 Direct authentication system and method via trusted authenticators
US16/103,405 US20190005212A1 (en) 2001-08-29 2018-08-14 Direct authentication system and method via trusted authenticators

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/210,926 Continuation US8266432B2 (en) 2001-08-29 2008-09-15 Centralized identification and authentication system and method

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US09/940,635 Continuation-In-Part US7356837B2 (en) 2001-08-29 2001-08-29 Centralized identification and authentication system and method
US13/633,680 Continuation-In-Part US9703938B2 (en) 2001-08-29 2012-10-02 Direct authentication system and method via trusted authenticators
US15/639,020 Continuation US20170308716A1 (en) 2001-08-29 2017-06-30 Centralized identification and authentication system and method

Publications (3)

Publication Number Publication Date
US20130036053A1 US20130036053A1 (en) 2013-02-07
US20170149566A9 true US20170149566A9 (en) 2017-05-25
US9727864B2 US9727864B2 (en) 2017-08-08

Family

ID=39874438

Family Applications (4)

Application Number Title Priority Date Filing Date
US11/239,046 Active US7444676B1 (en) 2001-08-29 2005-09-30 Direct authentication and authorization system and method for trusted network of financial institutions
US12/210,926 Active US8266432B2 (en) 2001-08-29 2008-09-15 Centralized identification and authentication system and method
US13/606,538 Active US9727864B2 (en) 2001-08-29 2012-09-07 Centralized identification and authentication system and method
US15/639,020 Pending US20170308716A1 (en) 2001-08-29 2017-06-30 Centralized identification and authentication system and method

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US11/239,046 Active US7444676B1 (en) 2001-08-29 2005-09-30 Direct authentication and authorization system and method for trusted network of financial institutions
US12/210,926 Active US8266432B2 (en) 2001-08-29 2008-09-15 Centralized identification and authentication system and method

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/639,020 Pending US20170308716A1 (en) 2001-08-29 2017-06-30 Centralized identification and authentication system and method

Country Status (1)

Country Link
US (4) US7444676B1 (en)

Families Citing this family (92)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8281129B1 (en) 2001-08-29 2012-10-02 Nader Asghari-Kamrani Direct authentication system and method via trusted authenticators
US7444676B1 (en) 2001-08-29 2008-10-28 Nader Asghari-Kamrani Direct authentication and authorization system and method for trusted network of financial institutions
US20040078324A1 (en) * 2002-10-16 2004-04-22 Carl Lonnberg Systems and methods for authenticating a financial account at activation
US8117339B2 (en) * 2004-10-29 2012-02-14 Go Daddy Operating Company, LLC Tracking domain name related reputation
US7797413B2 (en) * 2004-10-29 2010-09-14 The Go Daddy Group, Inc. Digital identity registration
US20080028443A1 (en) * 2004-10-29 2008-01-31 The Go Daddy Group, Inc. Domain name related reputation and secure certificates
US20060200487A1 (en) * 2004-10-29 2006-09-07 The Go Daddy Group, Inc. Domain name related reputation and secure certificates
US20090248623A1 (en) * 2007-05-09 2009-10-01 The Go Daddy Group, Inc. Accessing digital identity related reputation data
US20060095459A1 (en) * 2004-10-29 2006-05-04 Warren Adelman Publishing domain name related reputation in whois records
US20070208940A1 (en) * 2004-10-29 2007-09-06 The Go Daddy Group, Inc. Digital identity related reputation tracking and publishing
US20080022013A1 (en) * 2004-10-29 2008-01-24 The Go Daddy Group, Inc. Publishing domain name related reputation in whois records
US20060095404A1 (en) * 2004-10-29 2006-05-04 The Go Daddy Group, Inc Presenting search engine results based on domain name related reputation
US8904040B2 (en) * 2004-10-29 2014-12-02 Go Daddy Operating Company, LLC Digital identity validation
US20080028100A1 (en) * 2004-10-29 2008-01-31 The Go Daddy Group, Inc. Tracking domain name related reputation
US9015263B2 (en) 2004-10-29 2015-04-21 Go Daddy Operating Company, LLC Domain name searching with reputation rating
US9065643B2 (en) 2006-04-05 2015-06-23 Visa U.S.A. Inc. System and method for account identifier obfuscation
US8762263B2 (en) 2005-09-06 2014-06-24 Visa U.S.A. Inc. System and method for secured account numbers in proximity devices
US7818264B2 (en) 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
US7739169B2 (en) 2007-06-25 2010-06-15 Visa U.S.A. Inc. Restricting access to compromised account information
US8121942B2 (en) 2007-06-25 2012-02-21 Visa U.S.A. Inc. Systems and methods for secure and transparent cardless transactions
US8187972B2 (en) * 2008-07-01 2012-05-29 Teledyne Scientific & Imaging, Llc Through-substrate vias with polymer fill and method of fabricating same
US8219489B2 (en) 2008-07-29 2012-07-10 Visa U.S.A. Inc. Transaction processing using a global unique identifier
CA2742963A1 (en) 2008-11-06 2010-05-14 Visa International Service Association Online challenge-response
CA2751554C (en) 2009-02-05 2015-07-21 Wwpass Corporation Centralized authentication system with safe private data storage and method
US9715681B2 (en) 2009-04-28 2017-07-25 Visa International Service Association Verification of portable consumer devices
US8534564B2 (en) 2009-05-15 2013-09-17 Ayman Hammad Integration of verification tokens with mobile communication devices
US8602293B2 (en) 2009-05-15 2013-12-10 Visa International Service Association Integration of verification tokens with portable computing devices
US9038886B2 (en) 2009-05-15 2015-05-26 Visa International Service Association Verification of portable consumer devices
US7891560B2 (en) 2009-05-15 2011-02-22 Visa International Service Assocation Verification of portable consumer devices
US9105027B2 (en) 2009-05-15 2015-08-11 Visa International Service Association Verification of portable consumer device for secure services
US8893967B2 (en) 2009-05-15 2014-11-25 Visa International Service Association Secure Communication of payment information to merchants using a verification token
US20110107394A1 (en) * 2009-10-30 2011-05-05 Nathan Stanley Jenne Authentication methods and devices
US10255591B2 (en) 2009-12-18 2019-04-09 Visa International Service Association Payment channel returning limited use proxy dynamic value
US10255601B2 (en) 2010-02-25 2019-04-09 Visa International Service Association Multifactor authentication using a directory server
US8336088B2 (en) * 2010-04-19 2012-12-18 Visa International Service Association Alias management and value transfer claim processing
SG193510A1 (en) 2011-02-22 2013-10-30 Visa Int Service Ass Universal electronic payment apparatuses, methods and systems
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
AU2013214801B2 (en) 2012-02-02 2018-06-21 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems
CN103503010B (en) 2011-03-04 2017-12-29 维萨国际服务协会 Ability to pay combined elements of a computer security
US9280765B2 (en) 2011-04-11 2016-03-08 Visa International Service Association Multiple tokenization for authentication
US9600808B1 (en) 2011-06-24 2017-03-21 Epic One Texas, Llc Secure payment card, method and system
US9582598B2 (en) 2011-07-05 2017-02-28 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
AU2012278963B2 (en) 2011-07-05 2017-02-23 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US9704155B2 (en) 2011-07-29 2017-07-11 Visa International Service Association Passing payment tokens through an hop/sop
US9355393B2 (en) 2011-08-18 2016-05-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
WO2013029014A2 (en) 2011-08-24 2013-02-28 Visa International Service Association Method for using barcodes and mobile devices to conduct payment transactions
US8522147B2 (en) 2011-09-20 2013-08-27 Go Daddy Operating Company, LLC Methods for verifying person's identity through person's social circle using person's photograph
US8538065B2 (en) 2011-09-20 2013-09-17 Go Daddy Operating Company, LLC Systems for verifying person's identity through person's social circle using person's photograph
EP2801061A4 (en) 2012-01-05 2015-06-03 Visa Int Service Ass Data protection with translation
WO2013113004A1 (en) 2012-01-26 2013-08-01 Visa International Service Association System and method of providing tokenization as a service
US10282724B2 (en) 2012-03-06 2019-05-07 Visa International Service Association Security system incorporating mobile device
US9524501B2 (en) 2012-06-06 2016-12-20 Visa International Service Association Method and system for correlating diverse transaction data
FR2992124B1 (en) * 2012-06-18 2014-07-25 Morpho Method for processing secure data
WO2014008403A1 (en) 2012-07-03 2014-01-09 Visa International Service Association Data protection hub
US9846861B2 (en) 2012-07-25 2017-12-19 Visa International Service Association Upstream and downstream data conversion
US9256871B2 (en) 2012-07-26 2016-02-09 Visa U.S.A. Inc. Configurable payment tokens
US9665722B2 (en) 2012-08-10 2017-05-30 Visa International Service Association Privacy firewall
AU2013315510A1 (en) 2012-09-11 2015-04-02 Visa International Service Association Cloud-based Virtual Wallet NFC Apparatuses, methods and systems
WO2014066559A1 (en) 2012-10-23 2014-05-01 Visa International Service Association Transaction initiation determination system utilizing transaction data elements
US9876775B2 (en) * 2012-11-09 2018-01-23 Ent Technologies, Inc. Generalized entity network translation (GENT)
US9911118B2 (en) 2012-11-21 2018-03-06 Visa International Service Association Device pairing via trusted intermediary
US10304047B2 (en) 2012-12-07 2019-05-28 Visa International Service Association Token generating component
US20140189794A1 (en) * 2012-12-28 2014-07-03 Richard A. Ferdinand System and method for utilizing and replacing anonymous recognition cards
US9741051B2 (en) 2013-01-02 2017-08-22 Visa International Service Association Tokenization and third-party interaction
US10223710B2 (en) 2013-01-04 2019-03-05 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
US9978062B2 (en) 2013-05-15 2018-05-22 Visa International Service Association Mobile tokenization hub
WO2015013522A1 (en) 2013-07-24 2015-01-29 Visa International Service Association Systems and methods for communicating risk using token assurance data
US9088568B1 (en) 2013-09-11 2015-07-21 Talati Family LP Apparatus, system and method for secure data exchange
US9978094B2 (en) 2013-10-11 2018-05-22 Visa International Service Association Tokenization revocation list
SG10201900029SA (en) 2013-11-19 2019-02-27 Visa Int Service Ass Automated account provisioning
KR20160101117A (en) 2013-12-19 2016-08-24 비자 인터네셔널 서비스 어소시에이션 Cloud-based transactions methods and systems
US9922322B2 (en) 2013-12-19 2018-03-20 Visa International Service Association Cloud-based transactions with magnetic secure transmission
US9509682B2 (en) 2014-01-10 2016-11-29 The Board Of Regents Of The Nevada System Of Higher Education On Behalf Of The University Of Nevada, Las Vegas Obscuring usernames during a login process
US9846878B2 (en) 2014-01-14 2017-12-19 Visa International Service Association Payment account identifier system
US10026087B2 (en) 2014-04-08 2018-07-17 Visa International Service Association Data passed in an interaction
US9942043B2 (en) 2014-04-23 2018-04-10 Visa International Service Association Token security on a communication device
CN106233664A (en) 2014-05-01 2016-12-14 维萨国际服务协会 Data verification using access device
US9848052B2 (en) 2014-05-05 2017-12-19 Visa International Service Association System and method for token domain control
US9780953B2 (en) 2014-07-23 2017-10-03 Visa International Service Association Systems and methods for secure detokenization
US9775029B2 (en) 2014-08-22 2017-09-26 Visa International Service Association Embedding cloud-based functionalities in a communication device
US10140615B2 (en) 2014-09-22 2018-11-27 Visa International Service Association Secure mobile device credential provisioning using risk decision non-overrides
AU2015319804B2 (en) 2014-09-26 2019-03-14 Visa International Service Association Remote server encrypted data provisioning system and methods
US10015147B2 (en) 2014-10-22 2018-07-03 Visa International Service Association Token enrollment system and method
US10257185B2 (en) 2014-12-12 2019-04-09 Visa International Service Association Automated access data provisioning
US10187363B2 (en) 2014-12-31 2019-01-22 Visa International Service Association Hybrid integration of software development kit with secure execution environment
US10096009B2 (en) 2015-01-20 2018-10-09 Visa International Service Association Secure payment processing using authorization request
US10164996B2 (en) 2015-03-12 2018-12-25 Visa International Service Association Methods and systems for providing a low value token buffer
US9998978B2 (en) 2015-04-16 2018-06-12 Visa International Service Association Systems and methods for processing dormant virtual access devices
SG11201805266YA (en) 2016-01-07 2018-07-30 Visa Int Service Ass Systems and methods for device push provisioning
US10313321B2 (en) 2016-04-07 2019-06-04 Visa International Service Association Tokenization of co-network accounts
US20170316433A1 (en) * 2016-04-29 2017-11-02 Ncr Corporation Identity aggregation and integration

Family Cites Families (104)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2146815A (en) * 1983-09-17 1985-04-24 Ibm Electronic fund transfer systems
US4885778A (en) * 1984-11-30 1989-12-05 Weiss Kenneth P Method and apparatus for synchronizing generation of separate, free running, time dependent equipment
DE3736882C2 (en) * 1987-10-30 1997-04-30 Gao Ges Automation Org A method for testing the authenticity of a data carrier with an integrated circuit
US4965568A (en) * 1989-03-01 1990-10-23 Atalla Martin M Multilevel security apparatus and method with personal key
JP3053527B2 (en) * 1993-07-30 2000-06-19 インターナショナル・ビジネス・マシーンズ・コーポレイション Method and apparatus to enable a password, a method and apparatus for generating and preliminarily activate the password, a method and apparatus for controlling the access of the resource by using the authentication code
AU1390395A (en) 1994-01-14 1995-08-01 Michael Jeremy Kew A computer security system
US5563946A (en) * 1994-04-25 1996-10-08 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
US5604803A (en) * 1994-06-03 1997-02-18 Sun Microsystems, Inc. Method and apparatus for secure remote authentication in a public network
US5668876A (en) 1994-06-24 1997-09-16 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
US5535276A (en) * 1994-11-09 1996-07-09 Bell Atlantic Network Services, Inc. Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
GB2297011B (en) 1995-01-13 1999-03-10 Telsis Holdings Ltd Secure access telephony server systems
US5790785A (en) 1995-12-11 1998-08-04 Customer Communications Group, Inc. World Wide Web registration information processing system
FI112895B (en) 1996-02-23 2004-01-30 Nokia Corp A method for obtaining at least one user-specific identification information
US5802176A (en) 1996-03-22 1998-09-01 Activcard System for controlling access to a function, using a plurality of dynamic encryption variables
US5815665A (en) 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network
US5740361A (en) 1996-06-03 1998-04-14 Compuserve Incorporated System for remote pass-phrase authentication
KR100213188B1 (en) * 1996-10-05 1999-08-02 윤종용 Apparatus and method for user authentication
US5881226A (en) 1996-10-28 1999-03-09 Veneklase; Brian J. Computer security system
GB9624127D0 (en) * 1996-11-20 1997-01-08 British Telecomm Transaction system
US6845453B2 (en) 1998-02-13 2005-01-18 Tecsec, Inc. Multiple factor-based user identification and authentication
US7003480B2 (en) * 1997-02-27 2006-02-21 Microsoft Corporation GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions
US7324972B1 (en) 1997-03-07 2008-01-29 Clickshare Service Corporation Managing transactions on a network: four or more parties
US20020133412A1 (en) * 1997-03-07 2002-09-19 David M. Oliver System for management of transactions on networks
DE19718103A1 (en) 1997-04-29 1998-06-04 Kim Schmitz Data transmission system authorise method e.g. for telebanking
US6571290B2 (en) * 1997-06-19 2003-05-27 Mymail, Inc. Method and apparatus for providing fungible intercourse over a network
US5883810A (en) * 1997-09-24 1999-03-16 Microsoft Corporation Electronic online commerce card with transactionproxy number for online transactions
US6233565B1 (en) 1998-02-13 2001-05-15 Saranac Software, Inc. Methods and apparatus for internet based financial transactions with evidence of payment
WO2000002150A1 (en) 1998-07-01 2000-01-13 Webcard Inc. Transaction authorisation method
AT360866T (en) 1998-07-02 2007-05-15 Cryptography Res Inc A leak resistant update an indexed cryptographic wrench
CA2345745A1 (en) 1998-10-02 2000-04-13 Moshe Cohen Card for interaction with a computer
US6338140B1 (en) * 1998-07-27 2002-01-08 Iridium Llc Method and system for validating subscriber identities in a communications network
US7111173B1 (en) 1998-09-01 2006-09-19 Tecsec, Inc. Encryption process including a biometric unit
US6715082B1 (en) * 1999-01-14 2004-03-30 Cisco Technology, Inc. Security server token caching
US6324526B1 (en) 1999-01-15 2001-11-27 D'agostino John System and method for performing secure credit card purchases
US6529885B1 (en) * 1999-03-18 2003-03-04 Oracle Corporation Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts
US6898577B1 (en) * 1999-03-18 2005-05-24 Oracle International Corporation Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts
GB2367168B (en) 1999-05-25 2004-02-18 Safepay Australia Pty Ltd System for handling network transactions
US6687375B1 (en) * 1999-06-02 2004-02-03 International Business Machines Corporation Generating user-dependent keys and random numbers
US7249097B2 (en) * 1999-06-18 2007-07-24 Echarge Corporation Method for ordering goods, services, and content over an internetwork using a virtual payment account
EP1315951A2 (en) 1999-07-21 2003-06-04 E-Payments A method for performing a transaction over a network
US7366702B2 (en) 1999-07-30 2008-04-29 Ipass Inc. System and method for secure network purchasing
GB2352861A (en) 1999-08-04 2001-02-07 Int Computers Ltd Payment transaction system
EP1077436A3 (en) 1999-08-19 2005-06-22 Citicorp Development Center, Inc. System and method for performing an on-line transaction using a single-use payment instrument
US7353541B1 (en) * 1999-09-07 2008-04-01 Sony Corporation Systems and methods for content distribution using one or more distribution keys
US20020029200A1 (en) * 1999-09-10 2002-03-07 Charles Dulin System and method for providing certificate validation and other services
US6300873B1 (en) 1999-09-16 2001-10-09 Atlantes Services, Inc. Locking mechanism for use with one-time access code
US6748367B1 (en) * 1999-09-24 2004-06-08 Joonho John Lee Method and system for effecting financial transactions over a public network without submission of sensitive information
GB9923804D0 (en) 1999-10-08 1999-12-08 Hewlett Packard Co Electronic commerce system
US7236956B1 (en) 1999-10-18 2007-06-26 Stamps.Com Role assignments in a cryptographic module for secure processing of value-bearing items
WO2001042965A1 (en) * 1999-12-10 2001-06-14 Auripay, Inc. Method and apparatus for improved financial instrument processing
GB9929291D0 (en) 1999-12-11 2000-02-02 Connectotel Limited Strong authentication method using a telecommunications device
US20010044787A1 (en) * 2000-01-13 2001-11-22 Gil Shwartz Secure private agent for electronic transactions
US6993658B1 (en) 2000-03-06 2006-01-31 April System Design Ab Use of personal communication devices for user authentication
US7716484B1 (en) * 2000-03-10 2010-05-11 Rsa Security Inc. System and method for increasing the security of encrypted secrets and authentication
US20020046187A1 (en) 2000-03-31 2002-04-18 Frank Vargas Automated system for initiating and managing mergers and acquisitions
US7150038B1 (en) * 2000-04-06 2006-12-12 Oracle International Corp. Facilitating single sign-on by using authenticated code to access a password store
US20010051924A1 (en) * 2000-05-09 2001-12-13 James Uberti On-line based financial services method and system utilizing biometrically secured transactions for issuing credit
US20030046237A1 (en) 2000-05-09 2003-03-06 James Uberti Method and system for enabling the issuance of biometrically secured online credit or other online payment transactions without tokens
EP1290850A2 (en) 2000-05-24 2003-03-12 Expertron Group (Pty) Ltd Authentication system and method
US6678666B1 (en) 2000-06-05 2004-01-13 Van W. Boulware Method of conducting anti-fraud electronic bank security transactions having price-date-time variables and calculating apparatus thereof
GB2367976A (en) 2000-06-19 2002-04-17 Innovation Venture Ltd Generating an access code when a user attempts to gain access to a remote location and causing it to be sent to a mobile communication device
AU9036901A (en) * 2000-09-01 2002-03-13 Globalock Corp Ltd Electronic device with time dependent access codes and apparatus for generating those codes
US7392388B2 (en) 2000-09-07 2008-06-24 Swivel Secure Limited Systems and methods for identity verification for secure transactions
US7043635B1 (en) 2000-09-15 2006-05-09 Swivel Secure Limited Embedded synchronous random disposable code identification method and system
US20020040346A1 (en) * 2000-09-27 2002-04-04 Kwan Khai Hee Computer system and method for on-line generating a password protected and barcode prepaid instrument of entitlement and activating said instrument on presentation over a computer network
CA2423957A1 (en) * 2000-09-27 2002-04-04 Mastercard International Inc. A universal and interoperable system and method utilizing a universal cardholder authentication field (ucaf) for authentication data collection and validation
JP2002123779A (en) * 2000-10-12 2002-04-26 Hitachi Ltd Method and system for processing settlement and recording medium with stored program
WO2002035758A2 (en) * 2000-10-26 2002-05-02 American International Group, Inc. Identity insurance transaction method
JP3695695B2 (en) 2000-12-25 2005-09-14 株式会社カイ・コーポレーション Password generation of the verification system and method
US20020087483A1 (en) 2000-12-29 2002-07-04 Shlomi Harif System, method and program for creating and distributing processes in a heterogeneous network
US7181762B2 (en) 2001-01-17 2007-02-20 Arcot Systems, Inc. Apparatus for pre-authentication of users using one-time passwords
US20020123935A1 (en) 2001-03-02 2002-09-05 Nader Asghari-Kamrani Secure commerce system and method
US7237117B2 (en) 2001-03-16 2007-06-26 Kenneth P. Weiss Universal secure registry
US20020184143A1 (en) * 2001-05-14 2002-12-05 Khater Ali Mohamed Khater plus system
US7546274B2 (en) * 2001-08-09 2009-06-09 Ncr Corporation System and method for facilitating electronic commerce transactions at an automatic teller machine
GB0119629D0 (en) 2001-08-10 2001-10-03 Cryptomathic As Data certification method and apparatus
US7444676B1 (en) 2001-08-29 2008-10-28 Nader Asghari-Kamrani Direct authentication and authorization system and method for trusted network of financial institutions
US7356837B2 (en) 2001-08-29 2008-04-08 Nader Asghari-Kamrani Centralized identification and authentication system and method
US8281129B1 (en) 2001-08-29 2012-10-02 Nader Asghari-Kamrani Direct authentication system and method via trusted authenticators
JP2003076268A (en) 2001-08-31 2003-03-14 Systemneeds Inc Self-deciphering type ciphered file and its using method
US20030074317A1 (en) * 2001-10-15 2003-04-17 Eyal Hofi Device, method and system for authorizing transactions
US7917444B1 (en) * 2001-10-29 2011-03-29 Mcafee, Inc. Secure single-use transaction numbers
US6908030B2 (en) 2001-10-31 2005-06-21 Arcot Systems, Inc. One-time credit card number generator and single round-trip authentication
US6901387B2 (en) * 2001-12-07 2005-05-31 General Electric Capital Financial Electronic purchasing method and apparatus for performing the same
US8751801B2 (en) 2003-05-09 2014-06-10 Emc Corporation System and method for authenticating users using two or more factors
SI21436A (en) * 2003-02-04 2004-08-31 Renderspace - Pristop Interactive D.O.O. Identification system for accessing protected areas
EP1634133B1 (en) 2003-06-18 2008-05-07 Telefonaktiebolaget LM Ericsson (publ) An arrangement and a method relating to ip network access
US9281945B2 (en) * 2003-12-30 2016-03-08 Entrust, Inc. Offline methods for authentication in a client/server authentication system
US7434723B1 (en) 2005-05-26 2008-10-14 Sprint Communications Company L.P. Mobile payment authorization system and method
US7347361B2 (en) * 2005-06-13 2008-03-25 Robert Lovett System, method and program product for account transaction validation
GB0514377D0 (en) 2005-07-13 2005-08-17 Kemshall Andrew Password automation
US20070022301A1 (en) 2005-07-19 2007-01-25 Intelligent Voice Research, Llc System and method for highly reliable multi-factor authentication
US8181232B2 (en) 2005-07-29 2012-05-15 Citicorp Development Center, Inc. Methods and systems for secure user authentication
JP2007102777A (en) 2005-10-04 2007-04-19 Forval Technology Inc User authentication system and method therefor
US20080230614A1 (en) * 2005-10-24 2008-09-25 Adam Rousseau Boalt Credit card security enhancement
US20070107050A1 (en) 2005-11-07 2007-05-10 Jexp, Inc. Simple two-factor authentication
US8245292B2 (en) * 2005-11-16 2012-08-14 Broadcom Corporation Multi-factor authentication using a smartcard
US20070130463A1 (en) 2005-12-06 2007-06-07 Eric Chun Wah Law Single one-time password token with single PIN for access to multiple providers
KR20070077569A (en) 2006-01-24 2007-07-27 삼성전자주식회사 One time password service system using portable phone and certificating method using the same
US7949603B1 (en) * 2006-05-23 2011-05-24 Trend Micro Incorporated Secure online transaction system and method
US7694130B1 (en) * 2008-09-12 2010-04-06 Michael Anthony Martinez System and method to authenticate a user utilizing a time-varying auxiliary code
US20140067675A1 (en) * 2012-09-06 2014-03-06 American Express Travel Related Services Company, Inc. Authentication using dynamic codes
US9449197B2 (en) * 2013-06-13 2016-09-20 Global Foundries Inc. Pooling entropy to facilitate mobile device-based true random number generation

Also Published As

Publication number Publication date
US20170308716A1 (en) 2017-10-26
US20130036053A1 (en) 2013-02-07
US8266432B2 (en) 2012-09-11
US20090013182A1 (en) 2009-01-08
US7444676B1 (en) 2008-10-28
US9727864B2 (en) 2017-08-08

Similar Documents

Publication Publication Date Title
Manchala E-commerce trust metrics and models
Herzberg Payments and banking with mobile personal devices
US6529885B1 (en) Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts
US7257228B2 (en) Account authority digital signature (AADS) system using encoded information
US8893250B2 (en) Tokenization in mobile environments
US5884274A (en) System and method for generating and executing insurance policies for foreign exchange losses
US7096354B2 (en) Central key authority database in an ABDS system
KR100912613B1 (en) Secure transaction protocol
US9805368B2 (en) End-to end secure payment processes
KR100349779B1 (en) Four-party credit/debit payment protocol
US8762283B2 (en) Multiple party benefit from an online authentication service
US7330836B2 (en) Method and system for secure authenticated payment on a computer network
US7571141B2 (en) Method and system for facilitating payment transactions using access devices
US6952773B2 (en) Requesting execution of instructions on accounts in ABDS system
US7376628B2 (en) Methods and systems for carrying out contingency-dependent payments via secure electronic bank drafts supported by online letters of credit and/or online performance bonds
US8036988B2 (en) System and method for performing secure credit card transactions
US7983987B2 (en) System and method for conducting secure payment transaction
US7983993B2 (en) Authenticated payment
US8793777B2 (en) Verification and authentication systems and methods
US8313022B2 (en) Verification of portable consumer device for 3-D secure services
AU2006280131B2 (en) Method and system for performing two factor mutual authentication
AU775976B2 (en) Methods and apparatus for conducting electronic transactions
EP1497947B1 (en) Mobile account authentication service
US6789189B2 (en) Managing account database in ABDS system
US8281991B2 (en) Transaction secured in an untrusted environment

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE