Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!
Electronic commerce with cryptographic authentication
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
a cryptographic authentication and electronic commerce technology, applied in electronic credentials, payment protocols, instruments, etc., to achieve the effect of increasing the speed of an authentication process
Inactive Publication Date: 2016-05-26
SECURITY FIRST
View PDF0 Cites 11 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Benefits of technology
The invention provides a method for securely authenticating transactions involving vendors and users using cryptographic keys and authentication data. The method ensures that the keys and data are not lost, stolen, or compromised, which helps avoid the need for constant re-issue and management. The method also allows users to use the same keys for multiple activities, vendors, or authentication requests. The trust engine performs most of the cryptographic processing on behalf of clients, which saves them computing resources. The authentication process allows for parallel processing of vendor and user activities, while also tracking failed access attempts and limiting malicious intruders. Additionally, the method includes a method for increasing the speed of the authentication process by performing various steps in parallel.
Problems solved by technology
According to another embodiment, the multiple depositories are geographically remote such that a rogue employee or otherwise compromised system at one depository will not provide access to a user's key or authentication data.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0065]One aspect of the present invention is to provide a cryptographic system where one or more secure servers, or a trust engine, stores cryptographic keys and user authentication data. Users access the functionality of conventional cryptographic systems through network access to the trust engine, however, the trust engine does not release actual keys and other authentication data and therefore, the keys and data remain secure. This server-centric storage of keys and authentication data provides for user-independent security, portability, availability, and straightforwardness.
[0066]Because users can be confident in, or trust, the cryptographic system to perform user and document authentication and other cryptographic functions, a wide variety of functionality may be incorporated into the system. For example, the trust engine provider can ensure against agreement repudiation by, for example, authenticating the agreement participants, digitally signing the agreement on behalf of or ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
A method for facilitating an authentication related to an electronic transaction between a first and a second user is provided. Authentication data is received from the first user along with transaction data defining the first user and the electronic transaction to be authenticated. This authentication data is compared to enrollment authentication data associated with the first user in order to verify the identity of the first user. When the user is properly verified, access to at least one private cryptographic key stored on a secure server is available for use in securing the electronic transaction. The particular private cryptographic key need not be released from the secure server. Data indicating the status of the authentication may then be sent to one of either the first or second user.
Description
REFERENCE TO RELATED APPLICATION[0001]The present application claims priority benefit under 35 U.S.C. §119(e) from U.S. Provisional Application No. 60 / 154,734, filed Sep. 20, 1999, entitled “SECURE SITE FOR INTERNET TRANSACTIONS” and from U.S. Provisional Application No. 60 / 200,396, filed Apr. 27, 2000, entitled “SECURE SITE FOR INTERNET TRANSACTIONS.”.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates to cryptographic authentication in electronic commerce. More specifically, the present invention relates to the use of cryptographic authentication to provide security to transactions in electronic commerce.[0004]2. Description of the Related Art[0005]With the continued increase in commercial and other transactions taking place across linked computer systems, it has become desirable to secure these transactions and the information related to these transactions. One form of security is to prevent access to systems which perform certain functio...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.
Login to View More
Patent Type & Authority Applications(United States)
Inventor DICKINSON, ALEXANDER G.O'HARE, MARK S.RORHBACH, MARK D.ZOCCOLI, JAMES G.ORSINI, RICK L.BROOKS, AARON A.DAVENPORT, ROGER S.CLOUGH, PHILIP W.CLAYTON, RICHARD F.STARK, GREGORY H.FERRANTE, MICHELLEBERGER, BRIANDOBSON, JR., ROBERT T.