DYNAMIC CONTENT AUTHENTICATION FOR SECURE MERCHANT-CUSTOMER COMMUNICATIONS
First Claim
1. A computer system comprising:
- a processor;
a memory device holding an instruction set executable on the processor to cause the computer system to perform operations comprising;
receiving permission for future access of dynamically-changing content available on a client device corresponding to a first account;
receiving a request from the first account for a transaction with a. second account;
based on the request, retrieving a portion of the dynamically-changing content from the client device corresponding to the first account; and
sending the portion of the dynamically-changing content to the second account, the portion of the dynamically-changing content to be included in a message related to the transaction sent from the second account as verification of authenticity of the second account.
1 Assignment
0 Petitions
Accused Products
Abstract
According to various embodiments, the Message Authentication Engine is given permission to access dynamically changing content provided by a buyer system. The Message Authentication Engine receives a purchase request from the buyer system for an item from a vendor system. Based on the purchase request, the Message Authentication Engine retrieves a portion of the dynamically changing content from a client device of the buyer system. The Message Authentication Engine provides to the vendor system the portion of the dynamically changing content provided by the buyer system. The vendor system sends a message to the buyer system with a copy of the portion of the dynamically changing content as a visual verification that the vendor system can be trusted.
6 Citations
20 Claims
-
1. A computer system comprising:
-
a processor; a memory device holding an instruction set executable on the processor to cause the computer system to perform operations comprising; receiving permission for future access of dynamically-changing content available on a client device corresponding to a first account; receiving a request from the first account for a transaction with a. second account; based on the request, retrieving a portion of the dynamically-changing content from the client device corresponding to the first account; and sending the portion of the dynamically-changing content to the second account, the portion of the dynamically-changing content to be included in a message related to the transaction sent from the second account as verification of authenticity of the second account. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method, comprising:
-
receiving permission for future access of dynamically-changing content available on a client device corresponding to a first account; receiving a request from the first account for a transaction with a second account; based on the request, via one or more processors, retrieving a portion of the dynamically-changing content from the client device corresponding to the first account; and sending the portion of the dynamically-changing content to the second account, the portion of the dynamically-changing content to be included in a message related to the transaction sent from the second account as verification of authenticity of the second account. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium storing executable instructions thereon, which, when executed by a processor, cause the processor to perform operations including:
-
receiving permission for future access of dynamically-changing content available on a client device corresponding to a first account; receiving a request from the first account for a transaction with a second account; based on the request, retrieving a portion of the dynamically-changing content from the client device corresponding to the first account; and sending the portion of the dynamically-changing content to the second account, the portion of the dynamically-changing content to be included in a message related to the transaction sent from the second account as verification of authenticity of the second account. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification