SECURE AUTHENTICATION BETWEEN MULTIPLE PARTIES
First Claim
1. A payment authentication apparatus comprising:
- a processor on a server; and
a memory adapted to store a plurality of machine-readable instructions for the server wherein the memory is executed by the processor to provide;
a payment authentication application adapted to receive a payment request PIN (Personal Identification Number) from a first party and to compare the payment request PIN to a stored PIN of a user for authenticating a payment request, wherein the payment request PIN is derived from an access code received from a second party and wherein the access code is hidden from the payment authentication application.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed herein to allow a party to a multiple-party transaction to perform authentications using identification information received from another party while allowing the party generating the identification information to maintain confidentiality of information. A user may enter an access code to identify the user to a first party that will be generating identification information to a second party in the transaction. The access code may be entered without requiring the entry of an alphanumeric PIN (Personal Identification Number). The first party may convert the access code to a second code for transmission to the second party so that the access code is not revealed to the second party. The second party may use the second code to authenticate the user, to authenticate a payment transaction or other types of communications from the user or the first party. Thus, parties in a multiple-party transaction may perform authentications while maintaining the confidentiality of information.
60 Citations
24 Claims
-
1. A payment authentication apparatus comprising:
-
a processor on a server; and a memory adapted to store a plurality of machine-readable instructions for the server wherein the memory is executed by the processor to provide; a payment authentication application adapted to receive a payment request PIN (Personal Identification Number) from a first party and to compare the payment request PIN to a stored PIN of a user for authenticating a payment request, wherein the payment request PIN is derived from an access code received from a second party and wherein the access code is hidden from the payment authentication application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of authenticating a payment request by a payment provider, comprising:
-
receiving a payment request PIN from a first party, wherein the payment request PIN is derived from an access code received from a second party and wherein the access code is hidden from the payment provider; verifying the payment request PIN against a stored PIN of a user; and approving the payment request. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer program product in a payment authentication device comprising a computer readable medium having computer readable code for instructing a processor to perform a method for authenticating a payment request, the method comprising:
-
receiving a payment request PIN from a first party, wherein the payment request PIN is derived from an access code received from a second party and wherein the access code is hidden from the computer program product; verifying the payment request PIN against a stored PIN of the user; and approving the payment request. - View Dependent Claims (23, 24)
-
Specification