Systems and methods for identity verification for secure transactions
First Claim
1. An identity verification secure transaction system comprising:
- a host computer for storing a user code associated with a user, for supplying a pseudo-random security string for a transaction, wherein said host computer determines a one time transaction code by selecting characters from said pseudo-random security string on a positional basis determined by the value of each digit of the user code; and
at least one electronic device in electronic communication with said host computer for administering said transaction by receiving said pseudo-random security string and for transmitting a user generated transaction input code to the host computer, wherein said user generated transaction input code is determined by selecting characters from said pseudo-random security string on a positional basis determined by each digit of the user code, wherein said user generated transaction input code is sent to said host computer; and
wherein said host computer verifies that said user generated input code matches said one time transaction code.
3 Assignments
0 Petitions
Accused Products
Abstract
Secure identification of a user in an electronic communications environment, wherein a host computer communicates with a plurality of electronic devices operated by the user. The user is issued a user code, known only to the user and stored in the host computer. User identification involves the host computer generating a pseudo-random security string and applying the user code to the pseudo-random security string to generate a transaction code. The host computer also transmits the pseudo-random security string to one of the electronic devices which displays the pseudo-random security string to the user. The user generates the transaction code by applying their known user code to the displayed pseudo-random security string. The user enerated transaction code is entered into an electronic device, then transmitted back to the host computer. Positive identification is achieved when the host computer determined transaction code matches the user generated transaction code.
-
Citations
25 Claims
-
1. An identity verification secure transaction system comprising:
-
a host computer for storing a user code associated with a user, for supplying a pseudo-random security string for a transaction, wherein said host computer determines a one time transaction code by selecting characters from said pseudo-random security string on a positional basis determined by the value of each digit of the user code; and at least one electronic device in electronic communication with said host computer for administering said transaction by receiving said pseudo-random security string and for transmitting a user generated transaction input code to the host computer, wherein said user generated transaction input code is determined by selecting characters from said pseudo-random security string on a positional basis determined by each digit of the user code, wherein said user generated transaction input code is sent to said host computer; and
wherein said host computer verifies that said user generated input code matches said one time transaction code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of verifying an identity for conducting secure transactions comprising the steps of:
-
storing information about a user code associated with a host computer; generating a pseudo-random security string by said host computer; determining a transaction code by selecting characters from said pseudo-random security string on a positional basis determined by the value of each digit of the user code; transmitting said pseudo-random security string to at least one electronic device; displaying said pseudo-random security string on said at least one electronic device for use by said user; receiving from the user said user generated transaction input code on said at least one electronic device, wherein said user generated transaction input code is determined by the user selecting characters from said pseudo-random security string on a positional basis determined by each digit of the user code; wherein said at least one electronic device transmits said user generated transaction input code to said host computer; and said host computer determines whether said transaction code and said user generated transaction input code match. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification