System and method for partner key management
First Claim
1. A method comprising:
- storing, by an institution computer of a first institution, a file comprising a stored policy statement mutually agreed upon by the first institution and a user, wherein the stored policy statement comprises security procedures governing transactions between the first institution and the user;
generating a credential to execute a plurality of online transactions with the first institution and a second institution;
generating a digital signature with the credential using Portable Security Transaction Protocol;
receiving, by the institution computer, a request from the user for registration of the credential;
examining, by the institution computer, the request for registration of the credential;
determining whether the request for registration of the credential complies with registration requirements established by the first institution;
in response to determining that the request for registration of the credential complies with the registration requirements established by the first institution, registering, by the institution computer, the credential to represent the user with regard to a plurality of online transactions with the first institution;
receiving, from the user, a request for an online transaction comprising a received policy statement and the digital signature, wherein the received policy statement comprises security procedures governing transactions between the first institution and the user;
verifying the identity of the user by examining the digital signature;
determining whether the received policy statement complies with the stored policy statement; and
in response to verifying the identity of the user and determining that the received policy statement complies with the stored policy statement, authorizing, by the institution computer, the requested online transaction; and
executing the requested online transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key infrastructure (PKI), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the PKM protocol, a user may take advantage of credential interoperability by using the same credential at a plurality of different financial institutions for authentication or digital signatures. Additionally, the credential interoperability achieved according to the PKM protocol allows the user to employ the same credential at a plurality of financial institutions for the purpose of digital or electronic signatures.
-
Citations
12 Claims
-
1. A method comprising:
-
storing, by an institution computer of a first institution, a file comprising a stored policy statement mutually agreed upon by the first institution and a user, wherein the stored policy statement comprises security procedures governing transactions between the first institution and the user; generating a credential to execute a plurality of online transactions with the first institution and a second institution; generating a digital signature with the credential using Portable Security Transaction Protocol; receiving, by the institution computer, a request from the user for registration of the credential; examining, by the institution computer, the request for registration of the credential; determining whether the request for registration of the credential complies with registration requirements established by the first institution; in response to determining that the request for registration of the credential complies with the registration requirements established by the first institution, registering, by the institution computer, the credential to represent the user with regard to a plurality of online transactions with the first institution; receiving, from the user, a request for an online transaction comprising a received policy statement and the digital signature, wherein the received policy statement comprises security procedures governing transactions between the first institution and the user; verifying the identity of the user by examining the digital signature; determining whether the received policy statement complies with the stored policy statement; and in response to verifying the identity of the user and determining that the received policy statement complies with the stored policy statement, authorizing, by the institution computer, the requested online transaction; and executing the requested online transaction. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium comprising computer executable software code executable by a processor to cause the processor to perform a method comprising:
-
storing, by an institution computer of a first institution, a file comprising a stored policy statement mutually agreed upon by the first institution and a user, wherein the stored policy statement comprises security procedures governing transactions between the first institution and the user; generating a credential to execute a plurality of online transactions with the first institution and a second institution; generating a digital signature with the credential using Portable Security Transaction Protocol; receiving, by the institution computer, a request from the user for registration of the credential; examining, by the institution computer, the request for registration of the credential; determining whether the request for registration of the credential complies with registration requirements established by the first institution; in response to determining that the request for registration of the credential complies with the registration requirements established by the first institution, registering, by the institution computer, the credential to represent the user with regard to a plurality of online transactions with the first institution; receiving, from the user, a request for an online transaction comprising a received policy statement and the digital signature, wherein the received policy statement comprises security procedures governing transactions between the first institution and the user; determining whether the received policy statement complies with the stored policy statement; and in response to determining that the received policy statement complies with the stored policy statement, authorizing, by the institution computer, the requested online transaction. - View Dependent Claims (8)
-
-
9. A system comprising:
-
a memory configured to store credential registration requirements established by a first institution and a stored policy statement mutually agreed upon by the first institution and a user, wherein the policy statement comprises security procedures governing transactions between the first institution and the user; and a processor coupled to the memory, the processor configured to; generate a credential to execute a plurality of online transactions with the first institution and a second institution; generate a digital signature with the credential using Portable Security Transaction Protocol; receive a request from the user for registration of the credential; examine the request for registration of the credential; determining whether the request for registration of the credential complies with the credential registration requirements established by the first institution, in response to determining that the request for registration of the credential complies with the registration requirements established by the first institution, register the credential to represent the user with regard to a plurality of online transactions with the first institution; receive, from the user, a request for an online transaction comprising a received policy statement and the digital signature, wherein the received policy statement comprises security procedures governing transactions between the first institution and the user; determine whether the received policy statement complies with the stored policy statement; and in response to determining that the received policy statement complies with the stored policy statement, authorize the requested online transaction. - View Dependent Claims (10)
-
-
11. A method for establishing an interoperable credential of a first type selected from a group consisting of:
- a certificate, a one-time password, an IP address, and a machine fingerprint, for use in an online transaction between a user and an institution, the method comprising;
storing, by an institution computer of a first institution, a file comprising a stored policy statement mutually agreed upon by the first institution and a user, wherein the stored policy statement comprises security procedures governing transactions between the first institution and the user; generating the interoperable credential to execute a plurality of online transactions with the first institution and a second institution; generating a digital signature with the interoperable credential using Portable Security Transaction Protocol; receiving, by the institution computer, a request from the user for registration of the credential, wherein the request is signed by the digital signature using a credential of second type selected from a group consisting of;
a certificate, a one-time password, an IP address, and a machine fingerprint, wherein the first type and the second type are not the same;examining, by the institution computer, the request for registration of the credential; determining whether the request for registration of the credential complies with registration requirements established by the first institution; in response to determining that the request for registration of the credential complies with the registration requirements established by the first institution, registering, by the institution computer, the credential to represent the user with regard to a plurality of online transactions with the first institution; receiving, from the user, a request for an online transaction comprising a received policy statement and the digital signature including the interoperable credential, wherein the received policy statement comprises security procedures governing transactions between the first institution and the user; determining whether the received policy statement complies with the stored policy statement; and in response to determining that the received policy statement complies with the stored policy statement, authorizing, by the institution computer, the requested online transaction if the received policy statement complies with the stored policy statement associated with the user. - View Dependent Claims (12)
- a certificate, a one-time password, an IP address, and a machine fingerprint, for use in an online transaction between a user and an institution, the method comprising;
Specification