Proxy Authentication Methods and Apparatus
First Claim
1. A method for authorizing a transaction using a personal terminal, a transaction terminal and an electronic identification device having memory, the electronic identification device having been offered up to the personal terminal for communication therewith and verification information having been entered into the personal terminal, the method comprising:
- the personal terminal verifying if the verification information is valid and setting a verification flag in the memory of the electronic identification device indicative of the verification information being valid, andreceiving evidence of the status of the verification flag at the transaction terminal from the electronic identification device.
1 Assignment
0 Petitions
Accused Products
Abstract
A proxy authentication method and apparatus is described for use in user authentication, e.g. for payment transactions.
The authentication is carried out before the transaction between a electronic, e.g. digital identification device and a person terminal. Verification information is entered at the personal terminal to authenticate the user and if this is successful a verification flag is set in the digital identification device.
The status of this flag, or an encrypted version thereof can be used by a transaction terminal of evidence that the user has been authenticated without having to transmit any secret identification information to the transaction terminal.
71 Citations
24 Claims
-
1. A method for authorizing a transaction using a personal terminal, a transaction terminal and an electronic identification device having memory, the electronic identification device having been offered up to the personal terminal for communication therewith and verification information having been entered into the personal terminal, the method comprising:
-
the personal terminal verifying if the verification information is valid and setting a verification flag in the memory of the electronic identification device indicative of the verification information being valid, and receiving evidence of the status of the verification flag at the transaction terminal from the electronic identification device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 23, 24)
-
-
12. A system for authorizing a transaction using a personal terminal, a transaction terminal and an electronic identification device having memory, the electronic identification device having been offered up to the personal terminal for communication therewith and verification information having been entered into the personal terminal, wherein:
-
the personal terminal has means for verifying if the verification information is valid and for setting a verification flag in the memory of the electronic identification device indicative of the verification information being valid, and the transaction terminal has means for receiving evidence of the status of the verification flag at the transaction terminal from the electronic identification device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A personal terminal for use with an electronic identification device having memory, comprising means for communicating with the electronic identification device,
means for entering verification information, and means for verifying if the verification information is valid and for sending via the means for communicating a verification flag to be set in the memory of the electronic identification device indicative of the verification information being valid.
Specification