Systems and methods for authentication of electronic transactions

Inactive Publication Date: 2005-02-10
U S ENCODE CORP
View PDF16 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0014] An electronic transaction authentication system allows for multi-factor authentication to reduce fraud and increase the reliability of identity verification. In one aspect, the presence of a card, or token, during an electronic transactio

Problems solved by technology

Unlike an off-line transaction, however, the merchant has no ability to verify the identifying information supplied in the electronic commerce scenario.
In other words, in an electronic commerce transaction, the merchant cannot verify that the user is who they say they are, or therefore that the charge account belongs to the user making the purchase.
With U.S. households predicted to spend $184 billion on-line by the year 2004, such losses clearly present a serious problem that is only going to get worse.
Fear of fraud, however, may prevent on-line sales from rising to predicted levels.
Further, fraud losses often fall on the merchant, even though the merchant currently has no way to verify the identity provided by the user.
While these mandates do not necessarily provide an increased ability t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for authentication of electronic transactions
  • Systems and methods for authentication of electronic transactions
  • Systems and methods for authentication of electronic transactions

Examples

Experimental program
Comparison scheme
Effect test

Example

[0029] To help better understand the systems and methods described herein, some specific examples involving electronic commerce over the Internet, i.e., online transactions, are examined below. It should be remembered, however, that the examples provided are not intended to limit the systems and methods described to electronic commerce or Internet implementations. Rather, the systems and methods described can be implemented for any type of electronic transaction that requires authentication.

[0030]FIG. 1 is a diagram illustrating an example embodiment of an online transaction system 100 configured in accordance with one embodiment of the systems and methods described herein. System 100 comprises a terminal 102 that is configured to engage in an online transaction. Terminal 102 can also be configured to communicate through a communication network 108 with an authentication authority 110 configured to authenticate the electronic transaction. Network 108 can also be used to engage in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An online transaction system configured to implement authentication methods that allow for strong multi-factor authentication in online environments. The authentication methods can be combined with strong security methods to further ensure that the authentication process is secure. Further, the strong multi-factor authentication can be implemented with zero adoption dependencies through the implementation of automated enrollment methods.

Description

RELATED APPLICATIONS INFORMATION [0001] This application claims priority under 35 U.S.C. §119 to U.S. Provisional Application Ser. No. 60 / 409,422, entitled “Authentication of Online Transactions,” filed Sep. 9, 2002, which is incorporated by reference in its entirety as if set forth herein. This application also claims priority as a continuation under 35 USC §120 to U.S. patent application Ser. No. ______ TBD (attorney docket No. 034260.0007.UTL1), entitled “Systems and Methods for Secure Authentication of Electronic Transactions,” filed Jan. 7, 2003. This application is also related to the following copending U.S. patent application Ser. No. ______ TBD (attorney docket No. 034260.0004.UTL1), entitled “Systems and Methods for Enrolling a Token in an Online Authentication Program,” filed Jan. 16, 2003, U.S. patent application Ser. No. ______ TBD (attorney docket No. 034260.0005.UTL1), entitled “A Token for Use in Electronic Transactions,” filed Jan. 16, 2003, U.S. patent application ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G07F7/10
CPCG06F21/34H04L2209/56G06F2221/2117G06Q20/108G06Q20/341G06Q20/367G06Q20/3672G06Q20/3674G06Q20/382G06Q20/3821G06Q20/40G06Q20/40975G07F7/1008G07F7/1016G07F7/1025H04L9/0869H04L9/3213H04L9/3231H04L9/3271G06F21/36
Inventor HOLDSWORTH, JOHN
Owner U S ENCODE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products