Unlock instant, AI-driven research and patent intelligence for your innovation.

The method used to verify the transaction

A transaction and transaction amount technology, applied in the field of transaction verification, can solve the problems of insecurity, high probability of PIN code being seen and stolen, and unfriendly users.

Active Publication Date: 2017-11-10
NXP BV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, requiring a PIN to verify each transaction may be seen as user-unfriendly and unsafe, as the more times a PIN is entered, the greater the chances of the PIN being seen and stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • The method used to verify the transaction
  • The method used to verify the transaction
  • The method used to verify the transaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Smartphones and tablets with larger touchscreens are becoming more common. Users are increasingly familiar with the tactile and intuitive nature of touchscreen interfaces. Gestures such as "two-finger spread", "two-finger pinch", "rotate", "flick" are standardized actions for interacting with multi-touch devices, and usually improve user experience in multiple ways.

[0014] In an embodiment according to the invention, for transactions performed on a mobile handheld terminal, personal computer, tablet or similar device with a touch screen, if the touch screen is controlled by a master secure element with gesture recognition capability, the transaction can be secured safety.

[0015] An exemplary embodiment is described in the above-mentioned related patent application "Secure user authentication using a master secure element", in which the master secure element acts as a secure processor 120 controlling user access to the touchscreen of a handheld terminal 110 (the to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a method for authenticating transactions suitable for secure transactions carried out on mobile handheld terminals or tablets with a touch screen controlled by a security processor such as a master security with gesture recognition component or trusted execution environment. Since the touchscreen is fully controlled by the secure processor, users can use gestures to securely enter transaction amounts to verify transactions.

Description

technical field [0001] The present invention relates to methods of authenticating transactions, and more particularly to methods of authenticating transactions with secure entry without the need for entry of a PIN code. [0002] US Patent Application (Application No. US 13 / 632,870, Title: Secure User Authentication Using a Primary Secure Element) filed October 1, 2012 is hereby incorporated by reference in its entirety. [0003] US patent application filed on October 1, 2012 (Application No.: US 13 / 632,907, Title of Invention: Verifying Transactions with Secure Inputs and Non-secure Outputs) is hereby incorporated by reference in its entirety. Background technique [0004] Mobile platforms or connected devices, such as smartphones, PCs and tablets, integrate a secure element to authenticate the platform to protect user credentials or secure transactions. Secure Elements are typically highly tamper-resistant devices that provide a secure execution environment isolated from t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40G06Q20/42
CPCG06Q20/385G06Q20/4014G06Q20/425
Inventor 文森特·塞德里克·科尔诺
Owner NXP BV