Transaction system and method
First Claim
Patent Images
1. A method of authenticating a transaction between a purchaser and a merchant on an on-line network, including the steps of:
- the purchaser sending a transaction request from a mobile telephone having a SIM card;
receiving said transaction request from said purchaser including unique identification information relating to said purchaser; and
authenticating said transaction request and, if authenticated, providing the purchaser with a transaction number, different from the purchaser'"'"'s credit/debit card number, which the purchaser uses in order to effect the transaction;
wherein said unique identification information relating to the purchase is obtained via said SIM card.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a system and method for authenticating a financial transaction on an on-line network, the method involving: receiving a transaction request from a purchaser including unique information relating to the purchaser; authenticating the transaction request, and if authenticated, providing the purchaser with a transaction number, different from the purchaser'"'"'s credit/debit card number, which the purchaser uses in order to effect the financial transaction.
121 Citations
56 Claims
-
1. A method of authenticating a transaction between a purchaser and a merchant on an on-line network, including the steps of:
-
the purchaser sending a transaction request from a mobile telephone having a SIM card;
receiving said transaction request from said purchaser including unique identification information relating to said purchaser; and
authenticating said transaction request and, if authenticated, providing the purchaser with a transaction number, different from the purchaser'"'"'s credit/debit card number, which the purchaser uses in order to effect the transaction;
wherein said unique identification information relating to the purchase is obtained via said SIM card. - View Dependent Claims (2, 21, 22, 23, 24, 25, 26, 27, 28, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
3. A system for undertaking transactions in an on-line environment, including:
-
a plurality of credit or debit cards, such that the cards have identical physical card numbers;
an authentication system for authenticating purchases to be made using any respective one of said cards, said system being operable;
to receive and authenticate unique identification information relating to and provided by the user of said respective card, said unique identification information being not physically associated with said respective said card; and
for a positive authentication, to provide said user with a transaction number to be provided to a merchant as a card number, such that the transaction number is different from the physical card number. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of authenticating a transaction between a purchaser and a merchant on an on-line network, wherein the purchaser is requesting the transaction from a mobile telephone with a SIM card, including the step of:
authenticating the purchaser'"'"'s credit via said SIM card. - View Dependent Claims (13, 15)
-
14. A method for a purchaser to effect a transaction with a merchant, said method involving:
-
said purchaser submitting a request for a transaction number, said request including identification information relating to said purchaser;
said purchaser receiving said transaction number if said request has been authenticated; and
providing said transaction number to said merchant in order to effect the transaction;
wherein said transaction number includes a portion of a genuine account or card number of said purchaser or a portion of a common account or card number of said purchaser.
-
-
16. A system for enabling a transaction between a purchaser and a merchant, said system having:
-
purchaser authenticating means operable to receive a request for a transaction number from said purchaser via a mobile telephone having a SIM card, said request including identification information derived from said SIM card, and to authenticate said purchaser based on said identification information; and
a transaction number generator operable to generate said transaction number associated with said purchaser for use by said purchaser in effecting said transaction. - View Dependent Claims (17, 18, 19, 20, 29, 30)
-
-
39. A method of authenticating the identity of a user to a server in an on-line or other telecommunications environment, including the steps of:
-
establishing a user account with an associated user identification information and receiving, from said user, a password;
generating a pool of pseudo-passwords on the basis of said password and a code derived from said password;
receiving a log-in request from said user at a user device including said user identification information;
activating a pseudo-password from said pool of pseudo-passwords and generating a set of one or more numbers, wherein one of said set of numbers is derived from said code according to a rule;
transmitting to a user device said set of numbers;
entering said password into said user device and modifying said set of numbers according to said password and an inverse of said rule at said user device to produce a modified set of numbers;
transmitting said modified set of numbers to said server, said modified set of numbers including said code if said password has been entered correctly by said user;
releasing said selected pseudo-password and effecting user log-in if said modified set of numbers includes said code. - View Dependent Claims (40, 41, 42, 43)
-
-
44. A method of effecting a transaction between a purchaser and a merchant, involving:
-
providing purchaser account information to said merchant;
said merchant requesting transaction approval from a credit issuer or agent thereof;
said credit issuer sending an authentication request to said purchaser; and
said purchaser responding to said authentication request by sending authentication data to said credit issuer;
wherein said authentication data comprises a predetermined first portion of a password or phrase supplied by said purchaser and a requested second portion of said password or phrase. - View Dependent Claims (46)
-
-
45. A method of effecting a transaction between a purchaser and a merchant, involving:
-
receiving a request for transaction approval from said merchant;
sending an authentication request to said purchaser; and
receiving authentication data from said purchaser;
wherein said authentication data comprises a predetermined first portion of a password or phrase supplied by said purchaser and a requested second portion of said password or phrase.
-
-
47. A method of authenticating the identity of a user to a server in an on-line or other telecommunications environment, including the steps of:
-
receiving a log-in request from said user including unique information relating to said user;
authenticating the log-in request, and if authenticated, providing said user with a log-in number, which said user uses in order to log-in to said server.
-
-
48. A method of authenticating the identity of a user to a server in an on-line or other telecommunications environment, including the steps of:
-
sending to a mobile telephone or other portable communications device of said user an authentication request;
deeming user identity verified if said user responds to said request by sending a suitable response from said mobile telephone or other portable communications device. - View Dependent Claims (49, 50, 51)
-
-
52. A method of effecting a transaction between a purchaser and a merchant, involving:
-
providing purchaser account information to said merchant;
said merchant requesting transaction approval from a credit issuer or agent thereof;
said credit issuer sending an authentication request to said purchaser; and
said purchaser responding to said authentication request by sending authentication data to said credit issuer;
wherein said authentication data comprises a predetermined first portion of a password or phrase supplied by said purchaser and a second portion of said password or phrase, said first portion being submitted over a first channel and second portion being submitted over a second channel distinct from said first channel. - View Dependent Claims (54, 55, 56)
-
-
53. A method of authenticating the identity of a user, involving:
-
said user receiving an authentication request for authentication;
said user responding to said authentication request by submitting authentication data;
wherein said authentication data comprises a predetermined first portion of a password or phrase supplied by said user and a second portion of said password or phrase, said first portion being submitted over a first channel and second portion being submitted over a second channel distinct from said first channel.
-
Specification