×

Secure identity authentication in an electronic transaction

  • US 9,715,686 B2
  • Filed: 01/12/2017
  • Issued: 07/25/2017
  • Est. Priority Date: 01/15/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer system comprising:

  • a central processing unit (CPU);

    a memory coupled to the CPU; and

    a computer-readable storage device coupled to the CPU, the storage device containing instructions that are executed by the CPU via the memory to implement a method of securely authenticating an identity of a user participating in an electronic transaction with an enterprise, the method comprising the steps of;

    the computer system converting (1) a request for a biometric identifier or (2) a security question to a first complete Quick Response (QR) code, the request for the biometric identifier or the security question being selected to authenticate the identity of the user;

    based on information that specifies attributes of (1) the user and (2) a request from a mobile device of the user to initiate the electronic transaction, the computer system disassembling the first complete QR code into first and second portions of the first complete QR code, the first portion of the first complete QR code selected by a QR code disassembly algorithm, and the first and second portions of the first complete QR code not having an element in common;

    the computer system sending to the mobile device the first portion of the first complete QR code, but not the second portion of the first complete QR code, which prevents an entity other than the user and the enterprise from obtaining the request for the biometric identifier or the security question by intercepting or capturing network traffic that includes the electronic transaction;

    in response to a scan of the first portion of the first complete QR code by the mobile device, a reassembly of the first complete QR code by the mobile device which employs the first portion of the first complete QR code and a QR code assembly algorithm, a display by the mobile device of the request for the biometric identifier or the security question, a receipt by the mobile device of the biometric identifier or an answer to the security question, a conversion of the biometric identifier or the answer to the security question to a second complete QR code, a disassembly of the second complete QR code into first and second portions of the second complete QR code by employing the QR code disassembly algorithm, and a transmission of the first portion of the second complete QR code from the mobile device to the computer system, the computer system reassembling the second complete QR code by employing the QR code assembly algorithm and the first portion of the second complete QR code, which prevents the entity other than the user and the enterprise from obtaining the biometric identifier or the answer to the security question by intercepting or capturing the network traffic that includes the electronic transaction;

    the computer system determining whether the biometric identifier or the answer to the security question converted to the second complete QR code matches a record in a data repository that includes biometric identifiers or answers to security questions; and

    if the biometric identifier or the answer to the security question converted to the second complete QR code matches the record in the data repository, the computer system authorizing the electronic transaction or if the biometric identifier or the answer to the security question converted to the second complete QR code does not match any record in the data repository, the computer system indicating the electronic transaction is not authorized.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×