Authentication technique for electronic transactions
First Claim
1. A method for authenticating a device in an electronic transaction, comprising the steps of:
- transmitting a device signature of a first device from said first device to a second device;
verifying said device signature in said second device;
mutating said device signature to define a mutated device signature; and
communicating said mutated device signature between said first device and said second device.
0 Assignments
0 Petitions
Accused Products
Abstract
A technique for authenticating a first party to a second party is applicable to electronic transactions. In addition to employing personal passwords, and a device operational parameter fingerprint, two signatures are employed, one being characteristic of the first party, and the other being associated with the computer or communications device of the first party. The signatures mutate at random intervals, responsive to mutation requests made by the device of first party to the device employed by the second party. The mutated signatures invalidate previous signatures, and are stored in the computing or communications devices of both parties. The mutation process authenticates the computer or communication device, and may also authenticate the password holder.
109 Citations
68 Claims
-
1. A method for authenticating a device in an electronic transaction, comprising the steps of:
-
transmitting a device signature of a first device from said first device to a second device;
verifying said device signature in said second device;
mutating said device signature to define a mutated device signature; and
communicating said mutated device signature between said first device and said second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for authenticating a device in an electronic transaction, comprising the steps of:
-
transmitting a device signature of a first device from said first device to a second device;
transmitting a customer account signature from said first device to said second device;
verifying said device signature in said second device;
verifying said customer account signature in said second device;
mutating said device signature to define a mutated device signature;
mutating said customer account signature to define a mutated customer account signature; and
communicating said mutated device signature and said mutated customer account signature between said first device and said second device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer system for conducting electronic commerce, comprising:
a server, having a software application executing therein, wherein said server is in communication with a user device via a data network, and program instructions of said software application are read by said server, causing said server to perform the steps of;
responsive to receipt of a device signature from said user device, verifying said device signature;
mutating said device signature to define a mutated device signature; and
communicating said mutated device signature to said user device. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34)
-
35. A computer system for conducting electronic commerce, comprising:
-
a first server, connected to a user device via a data network, wherein said first server transmits a device signature that identifies said user device on said data network, said first server operating in accordance with first program instructions, wherein said first server receives a device built-in identifier from said user device that is associated in said first server with said device signature;
a second server, having a software application executing therein, wherein said second server is in communication with said first server via said data network, and second program instructions of said software application are read by said second server, causing said second server to perform the steps of;
responsive to detection of said device signature, verifying said device signature;
mutating said device signature to define a mutated device signature; and
communicating said mutated device signature to said first server. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A computer software product for authentication of a participant in an electronic transaction, comprising a computer-readable medium in which computer program instructions are stored, which instructions, when read by a computer, cause the computer to perform the steps of:
-
receiving a device signature of a device from a transmitter;
verifying said device signature;
mutating said device signature to define a mutated device signature; and
communicating said mutated device signature to said transmitter. - View Dependent Claims (55, 56, 57, 58)
-
-
59. A computer software product for authentication of a participant in an electronic transaction, comprising a computer-readable medium in which computer program instructions are stored, which instructions, when read by a computer, cause the computer to perform the steps of:
-
receiving a device signature of a device from a transmitter;
receiving a customer account signature of said device from said transmitter;
verifying said device signature;
verifying said customer account signature;
mutating said device signature to define a mutated device signature;
mutating said customer account signature to define a mutated customer account signature; and
communicating said mutated device signature and said mutated customer account signature to said transmitter. - View Dependent Claims (60, 61, 62, 63, 64, 65, 66, 67, 68)
-
Specification