Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure identity authentication in an electronic transaction

Inactive Publication Date: 2016-07-21
IBM CORP
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides a way to enhance security when verifying a person's identity for critical activities, such as high value financial transactions or making life-changing decisions. This is done by using a portion of a QR code that includes biographic information or biometric identifiers. This helps prevent malicious entities from interfering with the transmission of authentication requests or data during electronic transactions. The invention can coexist with existing biographic based authentication methods.

Problems solved by technology

With the advent of mobile device-based payments and new online fraud patterns, authentication of an identity of a user participating in an electronic transaction over the Internet has become more challenging.
The security of identify authentication is vulnerable because attackers capture and log wireless network traffic that includes transmissions of security questions, answers to security questions, biometric identifiers and requests for particular biometric identifiers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure identity authentication in an electronic transaction
  • Secure identity authentication in an electronic transaction
  • Secure identity authentication in an electronic transaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Overview

[0016]Embodiments of the present invention sends a portion of a complete QR code during an electronic transaction between a first computer (e.g., mobile device) and a second computer, where the QR code specifies authentication information which authenticates the identity of a user of the first computer. By sending only a portion of the complete QR code, rather than the complete QR code, embodiments of the present invention prevent a malicious entity from (1) intercepting the authentication information or (2) intercepting the complete QR code and deriving the authentication information from the intercepted complete QR code, and subsequently using the authentication information for a fraudulent transaction.

System for Secure Authentication of an Identity in an Electronic Transaction

[0017]FIG. 1 is a block diagram of a system 100 for securely authenticating an identity of a user participating in an electronic transaction with an enterprise, in accordance with embodiments of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An approach is provided for securely authenticating an identity of a user participating in an electronic transaction. A request is received from a mobile device to initiate the electronic transaction. Attributes of the user and request are received. A request is selected for a biometric identifier or a security question to authenticate the identity of the user. The request for the biometric identifier or security question is converted to a complete Quick Response (QR) code. Based on the user and request attributes, the complete QR code is disassembled into first and second portions by employing a disassembly algorithm. The first portion, but not the second portion, is sent to the mobile device, which prevents an entity other than the user and the enterprise from obtaining the request for the biometric identifier or security question by capturing network traffic that includes the electronic transaction.

Description

TECHNICAL FIELD[0001]The present invention relates to managing an electronic transaction, and more particularly to securely authenticating an identity of a party to an electronic transaction.BACKGROUND[0002]With the advent of mobile device-based payments and new online fraud patterns, authentication of an identity of a user participating in an electronic transaction over the Internet has become more challenging. Forms of identity authentication include security questions and biometric identifiers (e.g., fingerprints). The security of identify authentication is vulnerable because attackers capture and log wireless network traffic that includes transmissions of security questions, answers to security questions, biometric identifiers and requests for particular biometric identifiers. After being unlawfully captured or captured without permission from the parties to the transaction, information needed to authenticate an identity is used to perform fraudulent transactions.BRIEF SUMMARY[0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0861H04W12/06G06F21/36G06Q20/3223G06Q20/3276G06Q20/40145G06Q20/405H04L2463/121
Inventor SADACHARAM, SARAVANANVISWANATHAN, RAM
Owner IBM CORP
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More