Secure identity authentication in an electronic transaction

Inactive Publication Date: 2016-07-21
IBM CORP
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0012]Embodiments and aspects of the present invention summarized above provide enhanced security for authentication whenever establishing the identity of a person is critical, such as conducting high value financial transactions, making life altering decisions, managing war heads, etc. Transmission of a portion of a QR code that specifies biographic information o

Problems solved by technology

With the advent of mobile device-based payments and new online fraud patterns, authentication of an identity of a user participating in an electronic transaction over the Internet has become more challenging.
The security of identify auth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure identity authentication in an electronic transaction
  • Secure identity authentication in an electronic transaction
  • Secure identity authentication in an electronic transaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Overview

[0016]Embodiments of the present invention sends a portion of a complete QR code during an electronic transaction between a first computer (e.g., mobile device) and a second computer, where the QR code specifies authentication information which authenticates the identity of a user of the first computer. By sending only a portion of the complete QR code, rather than the complete QR code, embodiments of the present invention prevent a malicious entity from (1) intercepting the authentication information or (2) intercepting the complete QR code and deriving the authentication information from the intercepted complete QR code, and subsequently using the authentication information for a fraudulent transaction.

System for Secure Authentication of an Identity in an Electronic Transaction

[0017]FIG. 1 is a block diagram of a system 100 for securely authenticating an identity of a user participating in an electronic transaction with an enterprise, in accordance with embodiments of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An approach is provided for securely authenticating an identity of a user participating in an electronic transaction. A request is received from a mobile device to initiate the electronic transaction. Attributes of the user and request are received. A request is selected for a biometric identifier or a security question to authenticate the identity of the user. The request for the biometric identifier or security question is converted to a complete Quick Response (QR) code. Based on the user and request attributes, the complete QR code is disassembled into first and second portions by employing a disassembly algorithm. The first portion, but not the second portion, is sent to the mobile device, which prevents an entity other than the user and the enterprise from obtaining the request for the biometric identifier or security question by capturing network traffic that includes the electronic transaction.

Description

TECHNICAL FIELD[0001]The present invention relates to managing an electronic transaction, and more particularly to securely authenticating an identity of a party to an electronic transaction.BACKGROUND[0002]With the advent of mobile device-based payments and new online fraud patterns, authentication of an identity of a user participating in an electronic transaction over the Internet has become more challenging. Forms of identity authentication include security questions and biometric identifiers (e.g., fingerprints). The security of identify authentication is vulnerable because attackers capture and log wireless network traffic that includes transmissions of security questions, answers to security questions, biometric identifiers and requests for particular biometric identifiers. After being unlawfully captured or captured without permission from the parties to the transaction, information needed to authenticate an identity is used to perform fraudulent transactions.BRIEF SUMMARY[0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0861H04W12/06G06F21/36G06Q20/3223G06Q20/3276G06Q20/40145G06Q20/405H04L2463/121
Inventor SADACHARAM, SARAVANANVISWANATHAN, RAM
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products