Systems and methods for secure authentication of electronic transactions

a technology of electronic transactions and authentication methods, applied in the field of electronic transactions, can solve the problems of preventing on-line sales from rising to the predicted level, serious problems that are only going to get worse, and the inability of the merchant to verify the identification information supplied in the electronic commerce scenario, so as to increase the reliability of identity verification and reduce fraud

Inactive Publication Date: 2005-02-24
U S ENCODE CORP
View PDF16 Cites 63 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0014] An electronic transaction authentication system allows for multi-factor authentication to reduce fraud and increase the reliability of identity verification. In one aspect, the presence of a card, or token, during an electronic transaction can be authenticated using standard equipment and, therefore, does not require any custom hardware. The token can be configured to work with standard input / output devices for a plurality of terminals that can be used in electronic transactions.

Problems solved by technology

Unlike an off-line transaction, however, the merchant has no ability to verify the identifying information supplied in the electronic commerce scenario.
In other words, in an electronic commerce transaction, the merchant cannot verify that the user is who they say they are, or therefore that the charge account belongs to the user making the purchase.
With U.S. households predicted to spend $184 billion on-line by the year 2004, such losses clearly present a serious problem that is only going to get worse.
Fear of fraud, however, may prevent on-line sales from rising to predicted levels.
Further, fraud losses often fall on the merchant, even though the merchant currently has no way to verify the identity provided by the user.
While these mandates do not necessarily provide an increased ability to verify the identity of the user, they do shift the liability for fraud to card issuers.
Once verified, the issuer will authenticate the transaction; however, the issuer is also liable if it turns out that the user is not who they are supposed to be.
Unfortunately for issuers, verification methods currently available still fail to match that of off-line transactions.
But in the online environment, the first factor—card present verification—is often not available.
Therefore, it is difficult even with the new authentication mandates to achieve a satisfactory level of authentication.
There are, however, several drawbacks to smart card technology.
Thus, adoption of smart card technology has been slow, e.g., as low as 1% market penetration or lower, and therefore not very effective at reducing fraud.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for secure authentication of electronic transactions
  • Systems and methods for secure authentication of electronic transactions
  • Systems and methods for secure authentication of electronic transactions

Examples

Experimental program
Comparison scheme
Effect test

example implementations

[0047] Example implementations of modules 206-212 are now described for purposes of illustration.

[0048] Autoplay module 206 can, for example, be configured to initiate installation of client software 222 onto terminal 102. For ease of use, it is preferable if the installation process is automated, i.e., does not require user intervention to begin the installation process. A common example of an automated installation process is the process that occurs when a CD is placed into a computer's CD drive. On the typical personal computer, the computer's operating system automatically searches CDs inserted into the CD drive for an autoplay file, which is a “pointer” to an installation program on the CD. Thus, autoplay module 206 can be configured so that it is automatically executed every time token 106 is inserted into terminal 102. This assumes that such an auto play option is enabled within the operating system of terminal 102. Alternatively, the user can be required, or have the option,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An online transaction system configured to implement authentication methods that allow for strong multi-factor authentication in online environments. The authentication methods can be combined with strong security methods to further ensure that the authentication process is secure. Further, the strong multi-factor authentication can be implemented with zero adoption dependencies through the implementation of automated enrollment methods.

Description

RELATED APPLICATIONS INFORMATION [0001] This application claims priority under 35 U.S.C. §119 to U.S. Provisional Application Ser. No. 60 / 409,422, entitled “Authentication of Online Transactions,” filed Sep. 9, 2002, which is incorporated by reference in its entirety as if set forth herein.BACKGROUND [0002] 1. Field of the Inventions [0003] The field of the invention relates generally to electronic transactions and more particularly to the authentication of such transactions. [0004] 2. Background Information [0005] Electronic transactions, including electronic commerce, are becoming more prevalent, fueled of course by increasing Internet use. As the number and type of electronic transactions increase, so to does the need to verify the identity of participants in these transactions. Electronic commerce provides a good example. In a typical electronic commerce scenario, a user uses a web browser running on their computer to access a merchants web page via the Internet. Once the user h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/00G07F7/10
CPCG06F21/34H04L2209/56G06F2221/2117G06Q20/108G06Q20/341G06Q20/367G06Q20/3672G06Q20/3674G06Q20/382G06Q20/3821G06Q20/40G06Q20/40975G07F7/1008G07F7/1016G07F7/1025H04L9/0869H04L9/3213H04L9/3231H04L9/3271G06F21/36
Inventor HOLDSWORTH, JOHN
Owner U S ENCODE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products