Method and system for securing a transaction using a card generator, a RFID generator, and a challenge response protocol
First Claim
1. A system for securing a transaction, comprising:
- an authentication unit capable of processing an input, the authentication unit is capable of generating a dynamic card transaction code valid for a single transaction; and
a RFID generator capable of generating at least a dynamic RFID key for a predefined limited time period by using the dynamic card transaction code for the single transaction,wherein the authentication of the input is performed locally with the authentication unit through an encrypted and unique RFID communication between the authentication unit and a third party by using a challenge response protocol.
0 Assignments
0 Petitions
Accused Products
Abstract
A system for securing a transaction comprises an authentication unit capable of processing an input and generating a dynamic card transaction code/virtual card code which is valid for a single transaction upon authentication; and a RFID generator capable of generating at least a dynamic RFID key for a predefined limited time period by using the dynamic card transaction code for the single transaction. The authentication of the input is performed locally with the authentication unit through an encrypted and unique RFID communication between the authentication unit and a third party by using a challenge response protocol. The authentication unit is capable of working alone and as a plug-in with at least any one of a personal digital assistant (PDA), a hand-held remote control, a cellular telephone, a fax machine, and a printer is used for securing the transaction.
90 Citations
40 Claims
-
1. A system for securing a transaction, comprising:
-
an authentication unit capable of processing an input, the authentication unit is capable of generating a dynamic card transaction code valid for a single transaction; and a RFID generator capable of generating at least a dynamic RFID key for a predefined limited time period by using the dynamic card transaction code for the single transaction, wherein the authentication of the input is performed locally with the authentication unit through an encrypted and unique RFID communication between the authentication unit and a third party by using a challenge response protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for securing a transaction, comprising the steps of:
-
receiving an input from a user; authenticating the input by an authentication unit, wherein the input is authenticated by pairing the input stored in the authentication unit with the input extracted from the user; generating a dynamic card transaction code for a single transaction upon authentication of the input; generating a dynamic RFID key for the single transaction by using the dynamic card transaction code; communicating the dynamic RFID key to a third party for validating the transaction by using a challenge response protocol; and communicating an ID of the transaction to the third party by the RFID generator upon validation of the transaction, wherein the transaction is authenticated locally by the authentication unit with the third party by using at least one of the dynamic RFID key, the dynamic card transaction code, and the challenge response protocol. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A method of authenticating a transaction, comprising the steps of:
-
obtaining the biometric characteristics input locally with the authentication unit of the user from the biometric reader sensor; comparing the biometric characteristics and templates input with the stored biometric characteristics and templates to authenticate the transaction; generating a dynamic card transaction code for a single transaction by the authentication unit if the biometric characteristics input match with the stored biometric characteristics; generating a dynamic RFID key for the single transaction by using the dynamic card transaction code; sending the encrypted dynamic RFID key to the third party through the authenticating unit using a challenge response protocol, wherein the atomic time is used as a serialization and challenge response protocol variable; receiving a confirmation for validating the transaction by the third party at the authentication unit; and communicating an ID of the transaction to the third party by the RFID generator upon validation of the transaction.
-
Specification