Method and system for abstracted and randomized one-time use passwords for transactional authentication
a transactional authentication and password technology, applied in the field of authentication systems and methods, can solve the problems of fraudulent transactions to be processed, the individual's password or pin to be reverse-engineered, and the difficulty of reverse-engineering the individual's password or pin from a copy of data, etc., to achieve simple or more complex determination, easy monitoring or observation, and improved security. the effect of security matrix
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031]In the following description the following identifications are used.
[0032]The Secure System 20 is a system that requires a User to authenticate as a pre-requisite to processing transactions or requests for information.
[0033]The Security System 30 is the system in which the User's Keyword and Preferences, the Secure Systems preferences are stored and where processing for the Security System's interfaces is performed.[0034]Authentication Request 11[0035]Security Matrix 31[0036]One-Time Code 12[0037]Authentication Result 32[0038]Success Message 33
[0039]The User Preferences 40 are defined in Table 3 and are stored internally by the Security System 30.
[0040]A keyword 41 is a linear string of alpha characters that is defined by the User 10. In the examples given, the keyword is limited to being alpha characters only (A to Z) however, the method and system supports Alpha (case sensitive or case insensitive), Numeric, Symbolic or any combination thereof.
[0041]The Secure System Prefere...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


