Method and system for secure online transaction processing
First Claim
1. A method for executing a secure online transaction between a user computer and a vendor computer, the vendor computer and the user computer being interconnected to a computer network for data communications therebetween, the user computer having associated therewith a network address unique thereto at the time of the request;
- the method comprising the steps of;
a) the user computer executing a transaction request, comprising the steps ofi) generating a user authentication number as a first function ofa user registration number unique to the user computer,time stamp data correlated to the time of the transaction request, andan internally stored user matrix unique to the user computer;
ii) assigning a network protocol port number as a second function ofthe user registration number,the time stamp data, andthe user matrix;
iii) transmitting a transaction request message to the vendor computer via the computer network, the transaction request message comprisingthe user registration number,the time stamp data,first data indicative of the requested transaction, andthe network address associated with the user computer;
b) in response to receiving the transaction request message, the vendor computer sending a transaction verification request to a trust server computer interconnected to the computer network, the transaction verification request comprising(i) the user registration number,(ii) the time stamp data,(iii) second data indicative of the requested transaction, and(iv) the network address associated with the user computer;
c) in response to receiving the transaction verification request from the vendor computer, the trust server computer authenticating the user computer by(i) calculating the user matrix by from an internal memory by utilizing the received user registration number to address the memory,(ii) generating a trust server authentication number as a first function ofthe received user registration number,the received time stamp data, andthe calculated matrix;
(iii) calculating an expected network protocol port number as a second function ofthe received user registration number,the received time stamp data, andthe calculated user matrix,(iv) communicating via the computer network with the user computer by utilizing the user computer network address received from the vendor computer and the calculated expected network protocol port number,(v) obtaining from the user computer the user authentication number,(vi) comparing the obtained user authentication number with the generated trust server authentication number; and
vii) indicating that the user computer is authentic when the comparison step has passed, and indicating that the user computer is not authentic when the comparison step has failed.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for executing a secure online transaction between a vendor computer and a user computer, wherein the vendor computer and the user computer are interconnected to a computer network such as the Internet for data communications therebetween. The method comprises the steps of the user computer transmitting a transaction request message to the vendor computer via the computer network, the financial transaction request comprising user identification data unique to the user computer; in response to receiving the transaction request, the vendor computer sending a transaction verification request to a trust server computer interconnected to the computer network, the transaction verification request comprising the user identification data and data indicative of the requested transaction; in response to receiving the transaction verification request, the trust server computer authenticating the user computer by using the user identification data and communicating with the user computer for verification with the user identification data; and the trust server authorizing the transaction when the authenticating step has passed.
1074 Citations
11 Claims
-
1. A method for executing a secure online transaction between a user computer and a vendor computer, the vendor computer and the user computer being interconnected to a computer network for data communications therebetween, the user computer having associated therewith a network address unique thereto at the time of the request;
- the method comprising the steps of;
a) the user computer executing a transaction request, comprising the steps of i) generating a user authentication number as a first function of a user registration number unique to the user computer, time stamp data correlated to the time of the transaction request, and an internally stored user matrix unique to the user computer; ii) assigning a network protocol port number as a second function of the user registration number, the time stamp data, and the user matrix; iii) transmitting a transaction request message to the vendor computer via the computer network, the transaction request message comprising the user registration number, the time stamp data, first data indicative of the requested transaction, and the network address associated with the user computer; b) in response to receiving the transaction request message, the vendor computer sending a transaction verification request to a trust server computer interconnected to the computer network, the transaction verification request comprising (i) the user registration number, (ii) the time stamp data, (iii) second data indicative of the requested transaction, and (iv) the network address associated with the user computer; c) in response to receiving the transaction verification request from the vendor computer, the trust server computer authenticating the user computer by (i) calculating the user matrix by from an internal memory by utilizing the received user registration number to address the memory, (ii) generating a trust server authentication number as a first function of the received user registration number, the received time stamp data, and the calculated matrix; (iii) calculating an expected network protocol port number as a second function of the received user registration number, the received time stamp data, and the calculated user matrix, (iv) communicating via the computer network with the user computer by utilizing the user computer network address received from the vendor computer and the calculated expected network protocol port number, (v) obtaining from the user computer the user authentication number, (vi) comparing the obtained user authentication number with the generated trust server authentication number; and vii) indicating that the user computer is authentic when the comparison step has passed, and indicating that the user computer is not authentic when the comparison step has failed. - View Dependent Claims (2, 3)
- the method comprising the steps of;
-
4. A method for executing a secure online transaction between a user computer and a vendor computer, the vendor computer and the user computer being interconnected to a computer network for data communications therebetween, the user computer having associated therewith a network address unique thereto at the time of the request;
- the method comprising the steps of;
a) the user computer executing a transaction request, comprising the steps of i) generating a user authentication number as a first function of a user registration number unique to the user computer, and an internally stored user matrix unique to the user computer; ii) assigning a network protocol port number as a second function of the user registration number, and the user matrix; iii) transmitting a transaction request message to the vendor computer via the computer network, the transaction request message comprising the user registration number, first data indicative of the requested transaction, and the network address associated with the user computer; b) in response to receiving the transaction request message, the vendor computer sending a transaction verification request to a trust server computer interconnected to the computer network, the transaction verification request comprising (i) the user registration number, (ii) second data indicative of the requested transaction, and (iv) the network address associated with the user computer; c) in response to the transaction verification request from the vendor computer, the trust server computer authenticating the user computer by (i) calculating the user matrix from an internal memory by utilizing the received user registration number to address the memory, (ii) generating a trust server authentication number as a first function of the received user registration number, and the calculated matrix, (iii) calculating an expected network protocol port number as a second function of the received user registration number, and the calculated user matrix, (iv) communicating with the user computer by utilizing the user computer network address received from the vendor computer and the calculated expected network protocol port number, (v) obtaining from the user computer the user authentication number, (vi) comparing the obtained user authentication number with the generated trust server authentication number; and (vii) indicating that the user computer is authentic when the comparison step has passed, and indicating that the user computer is not authentic when the comparison step has failed. - View Dependent Claims (5, 6, 7, 8)
- the method comprising the steps of;
-
9. A method for executing a secure online transaction between a user computer and a vendor computer, the vendor computer and the user computer being interconnected to a computer network for data communications therebetween, the user computer having associated therewith a network address unique thereto at the time of the request;
- the method comprising the steps of;
a) the user computer executing a transaction request, comprising the steps of i) generating a user authentication number as a first function of a user registration number unique to the user computer, and time stamp data correlated to the time of the transaction request; ii) assigning a network protocol port number as a second function of the user registration number, and the time stamp data; iii) transmitting a transaction request message to the vendor computer via the computer network, the transaction request message comprising the user registration number, the time stamp data, first data indicative of the requested transaction, and the network address associated with the user computer; b) in response to the transaction request message, the vendor computer sending a transaction verification request to a trust server computer interconnected to the computer network, the transaction verification request comprising (i) the user registration number, (ii) the time stamp data, (iii) second data indicative of the requested transaction, and (iv) the network address associated with the user computer; c) in response to receiving the transaction verification request from the vendor computer, the trust server computer authenticating the user computer by (i) generating a trust server authentication number as a first function of the received user registration number, and the received time stamp data; (iii) calculating an expected network protocol port number as a second function of the received user registration number, and the received time stamp data, and (iv) communicating with the user computer by utilizing the user computer network address received from the vendor computer and the calculated expected network protocol port number, (v) obtaining from the user computer the user authentication number, (vi) comparing the obtained user authentication number with the generated trust server authentication number; and (vii) indicating that the user computer is authentic when the comparison step has passed, and indicating that the user computer is not authentic when the comparison step has failed. - View Dependent Claims (10, 11)
- the method comprising the steps of;
Specification