Authentication password for interaction

A password and password matching technology, applied in the field of verification password for interaction

Active Publication Date: 2022-04-08
VISA INT SERVICE ASSOC
View PDF18 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although peer-to-peer transactions enable individuals to send value to each other, peer-to-peer transactions create many security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication password for interaction
  • Authentication password for interaction
  • Authentication password for interaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Embodiments of the present invention relate to preventing man-in-the-middle attacks, replay attacks, and other fraudulent interactions. Embodiments may prevent these fraudulent interactions by verifying the authenticity of the interaction and interaction parameters. A first party (eg, "sender") may initiate an interaction via a first device (eg, "sender device") to send value to a second party (referred to as a "recipient"). The sender can initiate the interaction by selecting the value to send, selecting the account from which to get the value, and by indicating the recipient to receive the value. The sender device may then generate a password for the interaction. The password may be generated using a key associated with the sender, information identifying the sender, and information identifying the recipient.

[0022] When an interaction request is sent to the interaction processing computer, the interaction processing computer may verify that the password is authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for verifying interaction. The first interaction password may be generated by the first device using information about the first party to the interaction and the second party to the interaction. The second interaction password may be generated by the second device also using information about the first party to the interaction and the second party to the interaction. Verifying each password verifies that the details of the interaction have not been altered and that both the first and second parties have legitimately authorized the interaction.

Description

[0001] Cross References to Related Applications [0002] This application is an International Patent Application claiming the benefit of the filing date of U.S. Provisional Application No. 62 / 308,788, filed March 15, 2016, which is hereby incorporated by reference in its entirety for all purposes. Background technique [0003] Peer-to-peer transactions allow individuals to exchange information and value directly. Peer-to-peer transactions can be implemented by intermediary applications such as digital wallet providers. [0004] For example, Alice can activate the digital wallet application on her mobile device and activate the peer-to-peer transaction function. Alice enters her account credentials and indicates that she wants to send the payment to Bob by entering Bob's phone number. When Alice submits the transaction, Alice's mobile device sends her credentials to the digital wallet provider along with the transaction amount and Bob's phone number. The digital wallet prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60H04L9/08
CPCH04L63/0428H04L63/12H04L9/14H04L9/3247H04L2209/56H04L2463/102H04L9/0618H04L9/30
Inventor P·拉凡德V·莫迪G·L·鲍威尔
Owner VISA INT SERVICE ASSOC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products