MOBILE PEER-TO-PEER AUTHENTICATED TRANSFERS
First Claim
1. An electronic transaction security method for peer-to-peer authenticated transfers between independent users each equipped with a personal trusted device, comprising the steps of:
- pushing an encryption of a first video image from a transaction server over a network to a first personal trusted device;
displaying a decryption of the encrypted video image reconstituted as the first video image on said first personal trusted device;
optically capturing a second video image of that displayed on said first personal trusted device with a second personal trusted device;
uploading an encryption of the second video image from the second personal trusted device to the transaction server; and
authenticating an associated transaction between independent users respectively equipped with the first and second personal trusted devices based on a comparison of the first video image that was pushed to the first personal trusted device and the second video image that was uploaded from the second personal trusted device.
0 Assignments
0 Petitions
Accused Products
Abstract
A peer-to-peer transaction security method includes authentication and identification steps for pushing an encrypted colorgram from a transaction server to a first personal trusted device. Such provides a visual key for user authentication. Persona descriptors may be included for user identification. A decryption of the colorgram is displayed on the first personal trusted device to be optically captured by a second personal trusted device. The image captured from the second personal trusted device is encrypted and uploaded to the transaction server. In some cases, the persona descriptors alone are used to build a composite rendering for identification of the first user by the second user. The second user clicks and returns an acceptance if they recognize the composite drawing as a reasonable persona of the first user.
153 Citations
9 Claims
-
1. An electronic transaction security method for peer-to-peer authenticated transfers between independent users each equipped with a personal trusted device, comprising the steps of:
-
pushing an encryption of a first video image from a transaction server over a network to a first personal trusted device; displaying a decryption of the encrypted video image reconstituted as the first video image on said first personal trusted device; optically capturing a second video image of that displayed on said first personal trusted device with a second personal trusted device; uploading an encryption of the second video image from the second personal trusted device to the transaction server; and authenticating an associated transaction between independent users respectively equipped with the first and second personal trusted devices based on a comparison of the first video image that was pushed to the first personal trusted device and the second video image that was uploaded from the second personal trusted device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification