METHOD AND SYSTEM FOR SECURING ELECTRONIC TRANSACTIONS
First Claim
1. A method for secure electronic transaction over a computer network, comprising:
- at a trusted relationship profile server computer operably connected to the computer network;
(a) storing a unique identity of a trusted computing unit;
(b) generating a confirmation message regarding the unique identity of the trusted computing unit in response to a request from the trusted computing unit;
at a computer operably connected to the computer network and comprising a security proxy server, having computer readable instructions stored in a computer readable storage medium for execution by a processor;
(c) storing real credentials and local credentials of a customer in a secure vault;
(d) receiving the confirmation message and permitting a login process to be performed with the security proxy server using the local credentials, provided the confirmation message is valid; and
(e) replacing the local credentials submitted in the login process with the real credentials.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for secure electronic transaction over a computer network, comprising: at a trusted relationship profile server computer: storing a unique identity of a trusted computing unit; generating a confirmation message regarding the unique identity of the trusted computing unit in response to a request from the trusted computing unit; at a security proxy server computer: storing real credentials and local credentials of a customer in a secure vault; receiving the confirmation message and permitting a login process to be performed with the security proxy server using the local credentials, provided the confirmation message is valid; and replacing the local credentials submitted in the login process with the real credentials. A corresponding system for secure electronic transactions is also provided.
-
Citations
20 Claims
-
1. A method for secure electronic transaction over a computer network, comprising:
-
at a trusted relationship profile server computer operably connected to the computer network; (a) storing a unique identity of a trusted computing unit; (b) generating a confirmation message regarding the unique identity of the trusted computing unit in response to a request from the trusted computing unit; at a computer operably connected to the computer network and comprising a security proxy server, having computer readable instructions stored in a computer readable storage medium for execution by a processor; (c) storing real credentials and local credentials of a customer in a secure vault; (d) receiving the confirmation message and permitting a login process to be performed with the security proxy server using the local credentials, provided the confirmation message is valid; and (e) replacing the local credentials submitted in the login process with the real credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more computer readable storage media having computer readable instructions stored thereon for execution by a processor, for performing a method for secure electronic transaction over a computer network, comprising:
-
at a trusted relationship profile server computer operably connected to the computer network; (a) storing a unique identity of a trusted computing unit; (b) generating a confirmation message regarding the unique identity of the trusted computing unit in response to a request from the trusted computing unit; at a computer comprising a security proxy server, having computer readable instructions stored in a computer readable storage medium for execution by a processor, the computer being operably connected to the computer network; (c) storing real credentials and local credentials of a customer in a secure vault; (d) receiving the confirmation message and permitting a login process to be performed with the security proxy server using the local credentials, provided the confirmation message is valid; and (e) replacing the local credentials submitted in the login process with the real credentials.
-
-
11. A computer-based system for providing security for an electronic transaction over a computer network, comprising:
-
a) a trusted relationship profile server computer operably connected to the computer network, the computer having a first processor and a first computer readable storage medium having computer readable instructions stored thereon for executing by the first processor, storing a unique identity of a trusted computing unit;
the trusted relationship profile server computer having a message generator unit for generating a confirmation message regarding the unique identity of the trusted computing unit in response to a request from the trusted computing unit;b) a security proxy server operably connected to the trusted computing unit, the security proxy server having a second computer readable storage medium having computer readable instructions stored thereon for executing by a second processor, comprising; (i) a secure vault, storing real credentials and local credentials of a customer in the secure vault; (ii) a message confirmation unit receiving the confirmation message from the message generator unit and permitting a login process to be performed with the security proxy server using the local credentials, provided the confirmation message is valid; and (iii) a message parameter replacement unit for replacing the local credentials submitted in the login process with the real credentials. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
- 19. The system of claim 19, further including a transaction server computer operably connected to the computer network, the transaction server computer having a computer readable storage medium having computer readable instructions stored thereon for executing by a processor for completing the login process with the transaction server computer with the modified login password.
Specification