System And Method For Secure Transactions
First Claim
Patent Images
1. A method comprising:
- wirelessly conveying first data, a user identifier, and an application identifier from a first device to a second device, wherein the first data is based on confidential data of a user and the user identifier is unique to the user;
transmitting, from the second device to an authentication server, the first data, the user identifier, the application identifier, a second device hardware identifier, a third party identifier, a second device firmware identifier, and a transaction type identifier corresponding to a requested transaction type;
at a computer processor of the authentication server, authenticating the second device hardware identifier and the second device firmware identifier based on the third party identifier;
verifying that a third party is authorized to perform the requested transaction type for the user, wherein said verifying is based on the third party identifier;
authenticating the first data and application identifier based on the user identifier; and
performing a transaction for the user corresponding to the requested transaction type.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure describes systems and methods directed towards a highly secure and intelligent, end to end provisioning, authentication, and transaction system which creates and/or consolidates user data for a unified profile for the user (e.g., a person, place, organization, object, etc.) to allow for the safe, secure, and verifiable exchange of information.
67 Citations
28 Claims
-
1. A method comprising:
-
wirelessly conveying first data, a user identifier, and an application identifier from a first device to a second device, wherein the first data is based on confidential data of a user and the user identifier is unique to the user; transmitting, from the second device to an authentication server, the first data, the user identifier, the application identifier, a second device hardware identifier, a third party identifier, a second device firmware identifier, and a transaction type identifier corresponding to a requested transaction type; at a computer processor of the authentication server, authenticating the second device hardware identifier and the second device firmware identifier based on the third party identifier; verifying that a third party is authorized to perform the requested transaction type for the user, wherein said verifying is based on the third party identifier; authenticating the first data and application identifier based on the user identifier; and performing a transaction for the user corresponding to the requested transaction type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
wirelessly conveying first data, a user identifier, and a first device identifier from a first device to a second device, wherein the first data is based on confidential data of a user and the user identifier is unique to the user; transmitting, from the second device to an interchange payment processor, the first data, the user identifier, the first device identifier, a third party identifier, a second device firmware identifier, and a transaction type identifier corresponding to a requested transaction type; transmitting the first data, the user identifier, the first device identifier, the third party identifier, the second device firmware identifier, and the transaction type identifier from the interchange payment processor to an authentication server; at a computer processor of the authentication server, authenticating the second device firmware identifier based on the third party identifier; verifying that a third party is authorized to perform the requested transaction type for the user, wherein said verifying is based on the third party identifier; authenticating the first data and the first device identifier based on the user identifier; and performing a transaction for the user corresponding to the requested transaction type. - View Dependent Claims (18, 19, 20)
-
-
21. The method of claim 17, further comprising:
-
transmitting a second device hardware identifier from the second device to the authentication server via the interchange payment processor; and authenticating the second device hardware identifier based on the third party identifier.
-
-
22. A method comprising:
-
wirelessly conveying a first credit card number, a user identifier, and a first device identifier from a first device to a second device, wherein the user identifier is unique to a user; transmitting, from the second device to an interchange payment processor, the first credit card number, the user identifier, the first device identifier, a third party identifier, a second device firmware identifier, and a transaction type identifier corresponding to a requested transaction type; verifying the first credit card number at the interchange payment processor; transmitting the first credit card number, the user identifier, the first device identifier, the third party identifier, the second device firmware identifier, and the transaction type identifier from the interchange payment processor to one of a credit card interchange and a bank interchange; at said one of a credit card interchange and a bank interchange, determining an authentication identifier from the first credit card number; transmitting the user identifier, the first device identifier, the third party identifier, the second device firmware identifier, the transaction type identifier, and at least a portion of the first credit card number to an authentication server specified by the authentication identifier; at a computer processor of the authentication server, authenticating the second device firmware identifier based on the third party identifier; performing a transaction for the user corresponding to the requested transaction type.
-
-
23. The method of claim 22, further comprising:
-
verifying that a third party is authorized to perform the requested transaction type for the user, wherein said verifying is based on the third party identifier; and authenticating the first device identifier based on the user identifier.
-
-
24. The method of claim 22, further comprising:
-
based on the at least a portion of the first credit card number, identifying a predetermined substring of the first credit card number; based on the user identifier and the predetermined substring, retrieving a second credit card number associated with the user; and performing the transaction for the user using the second credit card number.
-
-
25. The method of claim 22, wherein said one of a credit card interchange and a bank interchange is a credit card interchange.
-
26. The method of claim 22, wherein said verifying the first credit card number includes determining an issuer identifier, and said one of a credit card interchange and a bank interchange is a bank interchange associated with an issuer bank identified by the issuer identifier.
-
27. A method comprising:
-
wirelessly conveying a first credit card number, a user identifier, and a first device identifier from a first device to a second device, wherein the user identifier is unique to a user; transmitting, from the second device to an interchange payment processor, the first credit card number, the user identifier, the first device identifier, a third party identifier, a second device firmware identifier, and a transaction type identifier corresponding to a requested transaction type; verifying the first credit card number at the interchange payment processor; transmitting the first credit card number, the user identifier, the first device identifier, the third party identifier, the second device firmware identifier, and the transaction type identifier from the interchange payment processor to a credit card interchange; at the credit card interchange, determining an issuer identifier from the first credit card number; transmitting the user identifier, the first device identifier, the third party identifier, the second device firmware identifier, the transaction type identifier, and at least a portion of the first credit card number to a bank interchange associated with an issuer bank identified by the issuer identifier; at the bank interchange, determining an authentication identifier from the first credit card number; transmitting the user identifier, the first device identifier, the third party identifier, the second device firmware identifier, the transaction type identifier, and said at least a portion of the first credit card number to an authentication server specified by the authentication identifier.
-
-
28. The method of claim 27, further comprising:
-
at a computer processor of the authentication server, authenticating the second device firmware identifier based on the third party identifier; verifying that a third party is authorized to perform the requested transaction type for the user, wherein said verifying is based on the third party identifier; authenticating the first device identifier based on the user identifier; and performing a transaction for the user corresponding to the requested transaction type.
-
Specification