Electronic commerce with cryptographic authentication

a cryptographic authentication and electronic commerce technology, applied in electronic credentials, payment protocols, instruments, etc., to achieve the effect of increasing the speed of an authentication process

Inactive Publication Date: 2016-05-26
SECURITY FIRST
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The invention provides a method for securely authenticating transactions involving vendors and users using cryptographic keys and authentication data. The method ensures that the keys and data are not lost, stolen, or compromised, which helps avoid the need for constant re-issue and management. The method also allows users to use the same keys for multiple activities, vendors, or authentication requests. The trust engine performs most of the cryptographic processing on behalf of clients, which saves them computing resources. The authentication process allows for parallel processing of vendor and user activities, while also tracking failed access attempts and limiting malicious intruders. Additionally, the method includes a method for increasing the speed of the authentication process by performing various steps in parallel.

Problems solved by technology

According to another embodiment, the multiple depositories are geographically remote such that a rogue employee or otherwise compromised system at one depository will not provide access to a user's key or authentication data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic commerce with cryptographic authentication
  • Electronic commerce with cryptographic authentication
  • Electronic commerce with cryptographic authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065]One aspect of the present invention is to provide a cryptographic system where one or more secure servers, or a trust engine, stores cryptographic keys and user authentication data. Users access the functionality of conventional cryptographic systems through network access to the trust engine, however, the trust engine does not release actual keys and other authentication data and therefore, the keys and data remain secure. This server-centric storage of keys and authentication data provides for user-independent security, portability, availability, and straightforwardness.

[0066]Because users can be confident in, or trust, the cryptographic system to perform user and document authentication and other cryptographic functions, a wide variety of functionality may be incorporated into the system. For example, the trust engine provider can ensure against agreement repudiation by, for example, authenticating the agreement participants, digitally signing the agreement on behalf of or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for facilitating an authentication related to an electronic transaction between a first and a second user is provided. Authentication data is received from the first user along with transaction data defining the first user and the electronic transaction to be authenticated. This authentication data is compared to enrollment authentication data associated with the first user in order to verify the identity of the first user. When the user is properly verified, access to at least one private cryptographic key stored on a secure server is available for use in securing the electronic transaction. The particular private cryptographic key need not be released from the secure server. Data indicating the status of the authentication may then be sent to one of either the first or second user.

Description

REFERENCE TO RELATED APPLICATION[0001]The present application claims priority benefit under 35 U.S.C. §119(e) from U.S. Provisional Application No. 60 / 154,734, filed Sep. 20, 1999, entitled “SECURE SITE FOR INTERNET TRANSACTIONS” and from U.S. Provisional Application No. 60 / 200,396, filed Apr. 27, 2000, entitled “SECURE SITE FOR INTERNET TRANSACTIONS.”.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates to cryptographic authentication in electronic commerce. More specifically, the present invention relates to the use of cryptographic authentication to provide security to transactions in electronic commerce.[0004]2. Description of the Related Art[0005]With the continued increase in commercial and other transactions taking place across linked computer systems, it has become desirable to secure these transactions and the information related to these transactions. One form of security is to prevent access to systems which perform certain functio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06G06F1/00G06F21/00G06Q20/02G06Q20/04G06Q20/12G06Q20/38G07F7/10H04L9/32
CPCH04L63/0435H04L63/083H04L63/061G06F21/31G06F21/32G06F21/33G06F21/40G06F21/41G06F21/64G06F2221/2113G06F2221/2115G06F2221/2117G06Q20/02G06Q20/04G06Q20/12G06Q20/38215G06Q20/3823G06Q20/3829G07F7/1016H04L9/0844H04L9/085H04L9/0897H04L9/3073H04L9/321H04L9/3231H04L9/3236H04L9/3247H04L9/3265H04L63/0428H04L63/06H04L63/0823H04L63/0853H04L63/105H04L2209/56H04L2209/80G06Q20/3825G06Q20/3821H04L9/0825G06Q20/382
Inventor DICKINSON, ALEXANDER G.O'HARE, MARK S.RORHBACH, MARK D.ZOCCOLI, JAMES G.ORSINI, RICK L.BROOKS, AARON A.DAVENPORT, ROGER S.CLOUGH, PHILIP W.CLAYTON, RICHARD F.STARK, GREGORY H.FERRANTE, MICHELLEBERGER, BRIANDOBSON, JR., ROBERT T.
Owner SECURITY FIRST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products