Secure authentication system and method
First Claim
Patent Images
1. A method comprising:
- sending, by a control server, a Purchase Authentication Page to a computer over a communications network, the Purchase Authentication Page having a user response posting field to receive a response from a user to authenticate the user;
receiving, by the control server, a returned Purchase Authentication Page from the computer over the communications network, the returned Purchase Authentication Page having a user response disposed in the user response posting field and a secure datum received from a verification token associated with the computer;
comparing, by the control server, at least a portion of the received user response to a stored user response to make a first determination of whether a match exists;
comparing, by the control server, the received secure datum to a stored secure datum to make a second determination of whether a match exists; and
generating, by the control server, a Payer Authentication Response message based on at least the first and second determinations.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a verification token is associated with a computer and can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation entity. The control server can validate the secure datum and authentication data and can generate a payer authentication response.
-
Citations
20 Claims
-
1. A method comprising:
-
sending, by a control server, a Purchase Authentication Page to a computer over a communications network, the Purchase Authentication Page having a user response posting field to receive a response from a user to authenticate the user; receiving, by the control server, a returned Purchase Authentication Page from the computer over the communications network, the returned Purchase Authentication Page having a user response disposed in the user response posting field and a secure datum received from a verification token associated with the computer; comparing, by the control server, at least a portion of the received user response to a stored user response to make a first determination of whether a match exists; comparing, by the control server, the received secure datum to a stored secure datum to make a second determination of whether a match exists; and generating, by the control server, a Payer Authentication Response message based on at least the first and second determinations. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A control server comprising:
-
a processor; and a computer readable medium, the computer readable medium comprising code, executable by the processor, for implementing a method comprising sending, by a control server, a Purchase Authentication Page to a computer over a communications network, the Purchase Authentication Page having a user response posting field to receive a response from a user to authenticate the user, receiving, by the control server, a returned Purchase Authentication Page from the computer over the communications network, the returned Purchase Authentication Page having a user response disposed in the user response posting field and a secure datum received from a verification token associated with the computer, comparing, by the control server, at least a portion of the received user response to a stored user response to make a first determination of whether a match exists, comparing, by the control server, the received secure datum to a stored secure datum to make a second determination of whether a match exists, and generating, by the control server, a Payer Authentication Response message based on at least the first and second determinations. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
obtaining, by a control server, a risk assessment for a transaction; generating and sending, by the control server, a Purchase Authentication Page to a computer with page display parameters that cause the Purchase Authentication Page to not be visible or to not be fully visible on a display of the computer if the risk assessment is below a threshold value; and sending, by the control server, the Purchase Authentication Page to the computer with page display parameters that cause the Purchase Authentication Page to be visible on the display of the computer if the risk assessment is above the threshold value. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification