Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

ID authentication

A password and device technology, used in digital data authentication, electronic certificates, payment systems, etc.

Inactive Publication Date: 2015-01-07
TECH BUSINESS MANAGEMENT
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, it is flawed because the password on the authentication tag can be read and matched by another computing device in the authentication process
If a tag is included on the payment card, a series of fraudulent transactions may occur before some other countermeasure can be applied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ID authentication
  • ID authentication
  • ID authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The figure illustrates a method for ID authentication in which a device 11 involved in a transaction requests a password from a physically separate but limited-range communication device 12 which, in response to such a request, automatically supplies and communicates the password to the device 11. The password is evaluated as valid or invalid and the transaction is approved or disapproved accordingly.

[0034] Devices 11 include mobile phones or other mobile devices operating in an environment 14 such as a cellular network, or computers communicating with a server 15 over the Internet, which require ID authentication. This could be a credit or debit card transaction system, or an online banking portal, or any other entity where information is stored.

[0035] Physical separation means that both the compromised device (mobile phone or computer 11 ) and device 12 will be required to enable unauthorized access. The mobile phone itself will not allow ID authentication, it ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for ID authentication, in which equipment involved in a transaction requests a password from a physically separate but limited-range communicating device, which automatically supplies a password in response to such request and communicates it to the equipment, the password is assessed as valid or invalid and the transaction approved or not accordingly.

Description

technical field [0001] The present invention relates to ID authentication. Background technique [0002] The usual method for ID authentication is via a PIN, which is typed, for example, on a computer keyboard or the keyboard or keypad of a mobile phone in order to access all or at least some of the functions of such a device, or to pay with a credit or debit card in a store. A four or more digit number entered on the terminal's keypad to verify that the card presenter is the card owner, assuming only the card owner will know the PIN. For credit and debit cards, the PIN is mailed to the card presenter shortly after the card is mailed. The PIN is machine-generated and unknown to the issuing bank or credit card company. [0003] However, the PIN can be compromised, often through inadvertent use, but also by, for example, changing the monitoring at the cash dispenser or sneaking keystroke monitoring software onto the computer. [0004] In some online credit and debit card tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/35G06Q20/32G06Q20/34
CPCG06Q20/385G06Q20/353G06Q20/401G06Q20/4014G06F21/35G06Q20/3674G06Q20/352G06Q20/4097G06Q20/3278G06Q20/3821G06Q2220/00H04W12/04H04L63/0838H04W12/47H04W12/068
Inventor D.L.麦克奈特
Owner TECH BUSINESS MANAGEMENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products