Transaction system and method performed by using peripheral device
First Claim
Patent Images
1. A method of securing a network transaction, the method performed by a device on behalf of a first external device, and the method comprising:
- receiving, via a first network interface of the device, transaction information including a transaction request requesting the transaction, the transaction information being received from the first external device;
searching, by a computer processor of the device, for a second external device;
receiving, via a second network interface of the device, authentication information from the searched for second external device, wherein the second network interface includes near field communication or Bluetooth communication;
authenticating the transaction, via an application stored in memory of the device, using the authentication information; and
performing, using the computer processor of the device, the transaction with a transaction server by using the transaction information and the authentication information received from the second external device.
0 Assignments
0 Petitions
Accused Products
Abstract
A transaction system and method of performing a transaction by using a peripheral device are provided. The method includes receiving transaction information from an external device, searching for a peripheral device when the transaction information is received, and performing the transaction with a transaction server by using information received from the searched peripheral device and the transaction information.
-
Citations
20 Claims
-
1. A method of securing a network transaction, the method performed by a device on behalf of a first external device, and the method comprising:
-
receiving, via a first network interface of the device, transaction information including a transaction request requesting the transaction, the transaction information being received from the first external device; searching, by a computer processor of the device, for a second external device; receiving, via a second network interface of the device, authentication information from the searched for second external device, wherein the second network interface includes near field communication or Bluetooth communication; authenticating the transaction, via an application stored in memory of the device, using the authentication information; and performing, using the computer processor of the device, the transaction with a transaction server by using the transaction information and the authentication information received from the second external device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of securing a network transaction via a first external device, the method performed by a device, and the method comprising:
-
searching, by a computer processor of the device for the first external device in which a transaction application is installed; requesting, by the computer processor of the device, the first external device for the transaction; and receiving, via a first network interface of the device, transaction completion information that is generated when the first external device performs the transaction, wherein the requesting comprises providing transaction information including a transaction request requesting the transaction to the first external device, wherein the transaction information and authentication information that is received by the first external device via a second network interface from a second external device near the first external device are used by the first external device to authenticate the transaction and perform the transaction, and wherein the second network interface includes near field communication or Bluetooth communication.
-
-
16. A method of securing a network transaction, the method performed by a device on behalf of a first external device, and the method comprising:
-
obtaining, via a first network interface of the device, transaction information for the transaction, the transaction information including a transaction request requesting the transaction; searching, by a computer processor of the device, for at least one second external device near the device; receiving, via a second network interface of the device, authentication information from the searched for at least one second external device, wherein the second network interface includes near field communication or Bluetooth communication; authenticating the transaction, via an application stored in memory of the device, using the authentication information; and performing, using the computer processor of the device, the transaction with a transaction server by using the authentication information and the transaction information received from the at least one second external device and the transaction information.
-
-
17. A device configured to secure a network transaction comprising:
-
a memory configured store at least one program; and a processor configured to perform a transaction on behalf of a first external device by executing the at least one program, wherein the at least one program comprises commands for executing; receiving, via a first network interface of the device, transaction information including a transaction request requesting the transaction, the transaction information being received from the first external device; searching for a second external device; receiving, via a second network interface of the device, authentication information from the searched for second external device, wherein the second network interface includes near field communication or Bluetooth communication; authenticating the transaction using the authentication information; and performing the transaction with a transaction server by using the transaction information and the authentication information received from the second external device.
-
-
18. A non-transitory computer-readable recording medium having a program recorded thereon, the program causing a computer to execute a method for securing a network transaction comprising:
-
receiving, via a first network interface of the computer, transaction information including a transaction request requesting the transaction, the transaction information being received from a first external device; searching for a second external device; receiving, via a second network interface of the computer, authentication information from the searched for second external device through, wherein the second network interface includes near field communication or Bluetooth communication; authenticating the transaction, via an application stored in memory of the computer, using the authentication information; and performing the transaction with a transaction server by using the transaction information and the authentication information received from the second external device.
-
-
19. A non-transitory computer-readable recording medium having a program recorded thereon, the program causing a computer to execute a method for securing a network transaction comprising:
-
searching, by a computer processor of the computer, for a first external device in which a transaction application is installed; requesting the first external device for the transaction; and receiving, via a first network interface of the computer, transaction completion information that is generated when the first external device performs the transaction, wherein the requesting comprises providing transaction information including a transaction request requesting the transaction to the first external device, wherein the transaction information and authentication information that is received by the first external device via a second network interface from a second external device near the first external device are used by the first external device to authenticate the transaction and perform the transaction, and wherein the second network interface includes near field communication or Bluetooth communication.
-
-
20. A non-transitory computer-readable recording medium having a program recorded thereon, the program causing a device to execute a method for securing a network transaction comprising:
-
obtaining transaction information for the transaction via a first network interface, the transaction information including a transaction request requesting the transaction; searching, by a computer processor of the device, for at least one second external device near the device; receiving, via a second network interface of the device, authentication information from the searched for at least one second external device, wherein the second network interface includes near field communication or Bluetooth communication; authenticating the transaction using the authentication information; and performing the transaction with a transaction server by using the transaction information and the authentication information received from the at least one second external device.
-
Specification