Supercharge Your Innovation With Domain-Expert AI Agents!

Secure Transaction Authentication

A technology for safe transactions and transactions, applied in security devices, user identity/authority verification, instruments, etc., can solve problems such as input, abuse, and security threats

Inactive Publication Date: 2011-12-28
ENTERSECT TECH (PTY) LTD
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This workaround results in the issuer (bank in most cases) having to bear the initial hardware cost and the user being forced to carry additional hardware with them
Additionally, the technology requires users to enter an often lengthy and complex security key before allowing them to conduct secure transactions
Mistakes in transcribing the security key from the mobile digital device will result in a rejected transaction, which typically adds significantly to transaction latency as the user has to carefully transcribe the security key
But this workaround is also affected by various different security threats
Since it is a completely offline solution, it is susceptible to abuse without the user's knowledge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure Transaction Authentication
  • Secure Transaction Authentication
  • Secure Transaction Authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In the simplest arrangement, as shown in Figure 1, a secure transaction authentication system (1) includes an authentication server (3), an authentication server (5) and a mobile communication device application software (not shown). The application software is configured to be installed on a mobile communication device (7), which in most cases is a mobile phone of a user (9). It should be understood that the server (3), database (5) and application software are implemented, operated and maintained by authorized service providers, and provide an authentication platform on which authentication operations can be performed.

[0027] In order to utilize the authentication system (1), the user (9) must be registered with an authentication service provider. Registration can be completed after the user (9) downloads the application software to his / her mobile phone (7) and installs it on the mobile phone through the mobile phone Internet browser software on the mobile phone (7)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for authenticating secure transactions between a transacting user and a secure transaction host is provided. The system includes a mobile phone software application installed on a transacting user's mobile phone which is configured to compose a digital fingerprint uniquely associated with the specific mobile phone on which it is installed. The system further includes an authentication service provider with which users of the system may be enrolled by registering at least the digital identifiers composed by the applications installed on their mobile communication devices in an authentication database. The authentication service provider is configured to authenticate secure transactions on request from secure transaction hosts by sending transaction confirmation requests to mobile phones of enrolled users requiring them to confirm or deny secure transactions before such transactions are allowed to be finalized.

Description

technical field [0001] The invention relates to a method of authenticating secure transactions. In particular, but not exclusively, the invention relates to a method of authenticating a user's identity to facilitate secure transactions, particularly secure online transactions. [0002] The invention extends to a user authentication system and a platform used when a user needs to perform user authentication. Background technique [0003] Passwords or security keys are widely used to control electronic media such as computer programs or authorized access to Internet sites, including banking sites. Generally, when a user wants to obtain an authorized channel of a program / website, the user must input a login ID (username) and a password. The program / website then compares this information with entries in a secure database, and access is granted only if the login ID and password are correctly associated with the database entries. The method of using a login ID and password to c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCG06Q20/425H04L63/0876H04L63/18G06Q20/42G06Q20/32H04L2463/102G06Q20/10H04W12/06H04L2463/082G06Q20/326
Inventor C·J·P·布兰德D·D·R·诺尔特A·S·范汤德D·J·穆勒
Owner ENTERSECT TECH (PTY) LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More