System and method for partner key management
First Claim
1. A method for securely processing an online transaction between a user and a first institution, the method comprising:
- storing, by an institution computer of the first institution, a file comprising a stored policy statement mutually agreed upon by the first institution and the user, wherein the stored policy statement comprises security procedures governing transactions between the first institution and the user;
generating a credential to execute a plurality of online transactions with the first institution and a second institution;
generating a digital signature with the credential using Portable Security Transaction Protocol;
registering, by the institution computer, the credential to represent the user with regard to a plurality of online transactions with the first institution based on a determination that a request for registration of the credential by the user complies with registration requirements established by the first institution;
receiving, by the first institution computer, a request from the user for a transaction comprising a received policy statement and the digital signature, wherein the received policy statement comprises security procedures governing transactions between the first institution and the user;
verifying the identity of the user by examining the digital signature;
determining whether the received policy statement complies with the stored policy statement; and
executing the requested online transaction based on successful verification of the identity of the user and determining that the received policy statement complies with the stored policy statement.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key infrastructure (PKI), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the PKM protocol, a user may take advantage of credential interoperability by using the same credential at a plurality of different financial institutions for authentication or digital signatures. Additionally, the credential interoperability achieved according to the PKM protocol allows the user to employ the same credential at a plurality of financial institutions for the purpose of digital or electronic signatures.
649 Citations
20 Claims
-
1. A method for securely processing an online transaction between a user and a first institution, the method comprising:
-
storing, by an institution computer of the first institution, a file comprising a stored policy statement mutually agreed upon by the first institution and the user, wherein the stored policy statement comprises security procedures governing transactions between the first institution and the user; generating a credential to execute a plurality of online transactions with the first institution and a second institution; generating a digital signature with the credential using Portable Security Transaction Protocol; registering, by the institution computer, the credential to represent the user with regard to a plurality of online transactions with the first institution based on a determination that a request for registration of the credential by the user complies with registration requirements established by the first institution; receiving, by the first institution computer, a request from the user for a transaction comprising a received policy statement and the digital signature, wherein the received policy statement comprises security procedures governing transactions between the first institution and the user; verifying the identity of the user by examining the digital signature; determining whether the received policy statement complies with the stored policy statement; and executing the requested online transaction based on successful verification of the identity of the user and determining that the received policy statement complies with the stored policy statement. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for securely processing an online transaction between a user and a first institution, the system comprising:
-
a first institution computer communicatively coupled over a network to a user module, the first institution computer comprising; a memory configured to store a file comprising a stored policy statement mutually agreed upon by the first institution and the user, wherein the stored policy statement comprises security procedures governing transactions between the first institution and the user; and a processor configured to; generate a credential to execute a plurality of online transactions with the first institution and a second institution; generate a digital signature with the credential using Portable Security Transaction Protocol; register the credential to represent the user with regard to a plurality of online transactions with the first institution based on a determination that a request for registration of the credential by the user complies with registration requirements established by the first institution; receive a request from the user for a transaction comprising a received policy statement and the digital signature, wherein the received policy statement comprises security procedures governing transactions between the first institution and the user; verify the identity of the user by examining the digital signature; determine whether the received policy statement complies with the stored policy statement; and execute the requested online transaction based on successful verification of the identity of the user and determining that the received policy statement complies with the stored policy statement. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer-readable medium comprising computer executable software code tangibly embodied thereon, the code for conducting an online transaction using an established interoperable credential, the code, when executed, causes a processor to perform the following:
-
storing a file comprising a stored policy statement mutually agreed upon by the first institution and the user, wherein the stored policy statement comprises security procedures governing transactions between the first institution and the user; generating a credential to execute a plurality of online transactions with the first institution and a second institution; generating a digital signature with the credential using Portable Security Transaction Protocol; registering the credential to represent the user with regard to a plurality of online transactions with the first institution based on a determination that a request for registration of the credential by the user complies with registration requirements established by the first institution; receiving a request from the user for a transaction comprising a received policy statement and the digital signature, wherein the received policy statement comprises security procedures governing transactions between the first institution and the user; verifying the identity of the user by examining the digital signature; determining whether the received policy statement complies with the stored policy statement; and executing the requested online transaction based on successful verification of the identity of the user and determining that the received policy statement complies with the stored poliy statement. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification