Method and system for determining authentication levels in transactions

Inactive Publication Date: 2012-12-20
ONEID
View PDF12 Cites 373 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0011]According to an alternative embodiment of the present invention, an authentication level determination system is provided. The system includes an identity repository coupled to a network and including a data processor and a non-transitory computer-readable storage medium comprising a plurality of computer-readable instructions tangibly embodied on the computer-readable storage medium, which, when executed by a data processor, provide authentication level determination, the plurality of instructions comprising instructions that cause the data processor to receive transaction information associated with a

Problems solved by technology

Users of social networks, online banking, e-commerce, online transactions, and/or email are in constant danger of phishing, malware,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for determining authentication levels in transactions
  • Method and system for determining authentication levels in transactions
  • Method and system for determining authentication levels in transactions

Examples

Experimental program
Comparison scheme
Effect test

case ii

Security

[0307]For higher security, you'd pair your Bluetooth device with the OneID app so that the app knows your Bluetooth MAC address. Then you'd only ask the chip for an authentication if the correct device for the present login name is present. Bluetooth connection isn't needed. Just a ping can be done to the device, which saves power. That means once you log in, if you walk away from the terminal, someone using the terminal can't do an authentication because they won't have the Bluetooth device.

Case III: Even Higher Security

[0308]Since Bluetooth MAC address can be easily determined and easily forged, we can have the Bluetooth phone run an app (optionally PIN protected) that will do a PKI style authentication so we can guarantee it is the device associated with your account. You'd have the SmartMX in the keyboard communicate with the Bluetooth and the keyboard only issues a signature if the Bluetooth device can mutually authenticate with it that they both have a signed OneID cer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to an embodiment of the present invention, a method for determining a transaction authentication level includes receiving transaction information associated with a transaction between a user and a relying party, receiving relying party preferences, and determining a relying party authentication level based on the transaction information and the relying party preferences. The method also includes accessing user preferences, and determining a user authentication level based the transaction information and the user preferences. The method further includes determining the transaction authentication level using the user authentication level and the relying party authentication level.

Description

CROSS-REFERENCES TO RELATED APPLICATIONS[0001]This application claims priority to U.S. Provisional Patent Application No. 61 / 497,865, filed on Jun. 16, 2011, entitled “Secure Transfer of Sensitive Data”, the disclosure of which is hereby incorporated by reference in its entirety for all purposes.[0002]The following three regular U.S. patent applications (including this one) are being filed concurrently, and the entire disclosure of the other applications are incorporated by reference into this application for all purposes:[0003]Application No. ______, filed June ______, 2012, entitled “Method and System for Determining Authentication Levels in Transactions” (Attorney Docket No. 94276-841065(0001210US));[0004]Application No. ______, filed June ______, 2012, entitled “Method and System for a Fully Encrypted Repository” (Attorney Docket No. 94276-842856(0001220US)); and[0005]Application No. ______, filed June ______, 2012, entitled “Method and System for Delayed Authorization of Online...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q40/00G06Q30/06
CPCG06Q20/0855G06Q20/12G06Q20/382G06Q20/38215G06Q20/401G06Q20/405H04L63/08G06Q40/02G06Q30/0609G06F21/31H04L63/105H04L63/205G06F21/6245G06Q20/3829H04L63/0435H04L63/061G06Q20/384
Inventor KIRSCH, STEVEN TODD
Owner ONEID
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products