ELECTRONIC TRANSACTION SECURITY SYSTEM
First Claim
Patent Images
1. A method for providing access to an account maintained by an institution, the method comprising the steps of:
- generating by a mobile device a login credential derived, but different, from data associated with the account according to a predetermined conversion algorithm;
transmitting the login credential to the institution; and
accessing the account based on confirmation that the login credential corresponds to the account.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for generating a limited use login credential associated with an account maintained by an institution, where the credential facilitates secure access to the account.
44 Citations
6 Claims
-
1. A method for providing access to an account maintained by an institution, the method comprising the steps of:
-
generating by a mobile device a login credential derived, but different, from data associated with the account according to a predetermined conversion algorithm; transmitting the login credential to the institution; and accessing the account based on confirmation that the login credential corresponds to the account. - View Dependent Claims (2)
-
-
3. A method for providing login credentials to a transaction terminal involving a mobile device, wherein the login credentials may be used to gain access to a user account maintained by the transaction terminal and associated with a user of the mobile device, the method comprising the step of:
generating by the mobile device a login credential corresponding to the user account but different from any credentials associated with the user account and maintained by the transaction terminal, wherein the login credential has a limited use and identifies the user, but cannot do so without the use of additional information maintained by the transaction terminal.
-
4. A method for providing access to an account of a user identified by a unique identifier, wherein the account is maintained by an institution, the method comprising the steps of:
-
generating by a mobile device an authentication indicia derived from data associated with the account according to a predetermined conversion algorithm; generating by the mobile device a login credential comprising the unique identifier and the authentication indicia; transmitting the login credential to the institution; and accessing the account based on confirmation that the authentication indicia authenticates the user based on the identification of the user by the unique identifier. - View Dependent Claims (5, 6)
-
Specification