Authentication System
First Claim
Patent Images
1. A two way authentication method, comprising:
- receiving by an authentication server first encrypted data from a merchant computing device;
receiving by said authentication server second encrypted data from a customer computing device;
determining by said authentication server if said first encrypted data matches said second encrypted data;
if said first encrypted data matches said second encrypted data, authenticating said customer computing device;
if said first encrypted data does not matches said second encrypted data, not authenticating said customer computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
A two way authentication method, including receiving by an authentication server first encrypted data from a merchant computing device, receiving by the authentication server second encrypted data from a customer computing device, determining by the authentication server if the first encrypted data matches the second encrypted data, if the first encrypted data matches the second encrypted data, authenticating the customer computing device, if the first encrypted data does not matches the second encrypted data, not authenticating the customer computing device.
16 Citations
24 Claims
-
1. A two way authentication method, comprising:
-
receiving by an authentication server first encrypted data from a merchant computing device; receiving by said authentication server second encrypted data from a customer computing device; determining by said authentication server if said first encrypted data matches said second encrypted data; if said first encrypted data matches said second encrypted data, authenticating said customer computing device; if said first encrypted data does not matches said second encrypted data, not authenticating said customer computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 16)
-
-
9. An article of manufacture comprising a non-transitory computer readable medium having computer readable program code encoded therein to perform authentication of a customer computing device located adjacent to a merchant computing device, the computer readable program code comprising a series of computer readable program steps to effect:
-
receiving first encrypted data from said merchant computing device; receiving second encrypted data from said customer computing device; determining if said first encrypted data matches said second encrypted data; if said first encrypted data matches said second encrypted data, authenticating said customer computing device; if said first encrypted data does not matches said second encrypted data, not authenticating said customer computing device. - View Dependent Claims (10, 11)
-
-
12. The article of manufacture of claim 12, the computer readable program code further comprising a series of computer readable program steps to effect:
-
causing said merchant computing device to generate a first plurality of images, wherein said first plurality of image comprise said first encrypted data; causing said merchant computing device to display said first plurality of images on a display device. - View Dependent Claims (13, 14, 15)
-
-
17. A computer program product encoded in a computer readable medium, said computer program product being useable by a programmable computer processor to perform authentication of a customer computing device located adjacent to a merchant computing device, comprising:
-
computer readable program code which causes said programmable computer processor to receive first encrypted data from said merchant computing device; computer readable program code which causes said programmable computer processor to receive second encrypted data from said customer computing device; computer readable program code which causes said programmable computer processor to determine if said first encrypted data matches said second encrypted data; computer readable program code which, if said first encrypted data matches said second encrypted data, causes said programmable computer processor to authenticate said customer computing device; computer readable program code which, if said first encrypted data does not match said second encrypted data, causes said programmable computer processor to not authenticate said customer computing device. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification