$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for generating a dynamic verification value 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
출원번호 UP-0642878 (2003-08-18)
등록번호 US-7761374 (2010-08-09)
발명자 / 주소
  • Sahota, Jagdeep Singh
  • Aabye, Christian
출원인 / 주소
  • Visa International Service Association
대리인 / 주소
    DeSandro, Bradley K.
인용정보 피인용 횟수 : 55  인용 특허 : 42

초록

Methods and systems for dynamically generating a verification value for a transaction and for utilizing such value to verify the authenticity of the payment service application. The dynamically created verification value may be generated on a payment device, such as an integrated circuit credit card

대표청구항

What is claimed is: 1. A method comprising a plurality of steps, each being performed by hardware executing software, wherein the steps include: generating a verification value in response to a transaction involving a mobile electronic device, wherein the verification value is generated by: creatin

이 특허에 인용된 특허 (42)

  1. Mukherjee Arabinda (South Brunswick NJ), Adaptive fraud monitoring and control.
  2. Fujii, Satoru, Authentication system using information on position.
  3. Baulier Gerald Donald ; Cahill Michael H. ; Ferrara Virginia Kay ; Lambert Diane, Automated and selective intervention in transaction-based networks.
  4. Foladare Mark Jeffrey ; Goldman Shelley B. ; Gorini Dominick ; Silverman David Phillip ; Wang Shaoqing ; Westrich Robert S., Credit card spending authorization control system.
  5. Gopinathan Krishna M. ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K. ; Jost Allen, Fraud detection using predictive modeling.
  6. Penzias Arno A. (Highland Park NJ), Fraud protection for card transactions.
  7. Goldberg Samuel (Even Yehuda ILX), Magnetic smartcard.
  8. Deland, Robert S., Magnetic stripe authentication and verification system.
  9. Indeck Ronald S. ; Muller Marcel W. ; Morley ; Jr. Robert E., Method and apparatus for fingerprinting and authenticating various magnetic media.
  10. Indeck Ronald Scott ; Muller Marcel Wettstein ; Engel George Lawrence ; Hege Alan Lee, Method and apparatus for improved fingerprinting and authenticating various magnetic media.
  11. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO), Method and apparatus for secure data storage and manipulation using magnetic media.
  12. Mos Robert ; Von Mueller Clay, Method and apparatus for securing and authenticating encoded data and documents containing such data.
  13. Kanevsky Dimitri ; Yung Marcel Mordechay ; Zadrozny Wlodek Wlodzimierz, Method and apparatus utilizing dynamic questioning to provide secure access control.
  14. Pettitt John Philip, Method and system for detecting fraud in a credit card transaction over the internet.
  15. Barrett,Michael Richard; Armes,David; Bishop,Fred; Shelby,James; Glazer,Elliott; Steitz,Philip W.; Gibbons,Stephen P., Method and system for implementing and managing an enterprise identity management for distributed security.
  16. Hilpert, Lee; Hensley, Gary L., Method and system for mass flow balance accounting.
  17. Burke Bertram V., Method and system to create and distribute excess funds from consumer spending transactions.
  18. Suzuki, Koji, Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor.
  19. Suzuki, Koji, Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor.
  20. Wallace Michelle H., Method for authenticating credit transactions to prevent fraudulent charges.
  21. Li Yang ; Rao D. Ramesh K. ; Subbiah Subramanian, Method of using fingerprints to authenticate wireless communications.
  22. Buer Mark Leonard, Muti-cycle non-parallel data encryption engine.
  23. Endo Kimikazu (Kyoto JPX), Personal identification system.
  24. Brown,Kerry Dennis, Programmable magnetic data storage card.
  25. Hynes John E. (6417 Deer Park Rd. Reistertown MD 21136) Conner Stephen A. (3631 Yolando Rd. Baltimore MD 21218), Securing magnetically encoded data using timing variations in encoded data.
  26. Maes,Stephane H., System and method for confirming electronic transactions.
  27. Hillmer, James M.; Jones, Richard A.; Gessner, Colleen M.; Johnston, Connie S.; Lewis, Jr., Kelly R.; Deshpande, Sanjay H., System and method for detecting fraudulent transactions.
  28. Jones Charles R., System and method for electronically auditing point-of-sale transactions.
  29. McAllister Alex (Wheaton MD), Telephone based credit card protection.
  30. Teitelbaum Neil,CAX, Telephone with biometric sensing device.
  31. Blonder Greg E. ; Greenspan Steven Lloyd ; Mirville J. Robert ; Sugla Binay, Transaction authorization and alert system.
  32. Rahman Sam (4809 Laurette St. Torrance CA 90503) Magner James (5092 Tripoli Ave. Los Alamitos CA 90720) Brown John (12831 Longden St. Garden Grove CA 92645) Pun Adarsh (5404 White Fox Dr. Rancho Palo, Transaction device, equipment and method for protecting account numbers and their associated personal identification num.
  33. Joao,Raymond Anthony; Bock,Robert Richard, Transaction security apparatus.
  34. Joao Raymond Anthony ; Bock Robert Richard, Transaction security apparatus and method.
  35. Joao Raymond Anthony ; Bock Robert Richard, Transaction security apparatus and method.
  36. Joao, Raymond Anthony; Bock, Robert Richard, Transaction security apparatus and method.
  37. Pickett Thomas E., Transaction security method and apparatus.
  38. Woodward,Sean, Transaction system and method of conducting a point-of-sale transaction between a merchant and a consumer using a wireless platform.
  39. Cooper J. Carl, Universal credit card apparatus and method.
  40. Cooper J. Carl, Universal credit card apparatus and method.
  41. Keresman, III,Michael A.; Sherwin,Francis M.; Balasubramanian,Chandra S., Universal merchant platform for payment authentication.
  42. Joseph C. Kawan, Wireless transaction and information system.

이 특허를 인용한 특허 (55)

  1. Wong, Erick; Flurscheim, Christian; Makhotin, Oleg; Lopez, Eduardo; Sharma, Sanjeev; Jones, Christopher; Guglani, Abhishek; Sevanto, Jarkko Oskari; Patel, Bharatkumar; Or, Tai Lung Burnnet; Aabye, Christian; Ngo, Hao; Sheets, John F., Cloud-based transactions methods and systems.
  2. Hammad, Ayman; Maw, Brian, Device including form factor indicator.
  3. Manessis, Thomas; Gerber, Gary, Dynamic payment device characteristics.
  4. Lopez, Eduardo, Embedding cloud-based functionalities in a communication device.
  5. Faith, Patrick L.; Koganti, Kris; Hammad, Ayman; Rewis, Ben, Encryption switch processing.
  6. Faith, Patrick; Koganti, Kris; Hammad, Ayman; Rewis, Ben, Encryption switch processing.
  7. Smirnoff, Sergey; Bhattacharya, Soumendra, Hybrid integration of software development kit with secure execution environment.
  8. Hammad, Ayman, Integration of payment capability into secure elements of computers.
  9. Hammad, Ayman, Integration of payment capability into secure elements of computers.
  10. Hammad, Ayman, Integration of verification tokens with mobile communication devices.
  11. Hammad, Ayman, Integration of verification tokens with mobile communication devices.
  12. Hammad, Ayman, Integration of verification tokens with mobile communication devices.
  13. Hammad, Ayman, Integration of verification tokens with portable computing devices.
  14. Hammad, Ayman, Integration of verification tokens with portable computing devices.
  15. Hammad, Ayman; Faith, Patrick; Aabye, Christian; Sahota, Jagdeep Singh, Method and system for generating a dynamic verification value.
  16. Hammad, Ayman; Faith, Patrick; Aabye, Christian; Sahota, Jagdeep Singh, Method and system for generating a dynamic verification value.
  17. Hammad, Ayman; Faith, Patrick; Aabye, Christian; Sahota, Jagdeep Singh, Method and system for generating a dynamic verification value.
  18. Perlman, Jeffrey W.; Kearney, Michael J.; Lee, Timothy M.; Storey, Gregory, Method and system for processing micropayment transactions.
  19. Colnot, Vincent Cedric; Fellers, Ty, Methods and apparatus for enabling secure network-based transactions.
  20. Taveau, Sebastien; Stone, Carl; Naaman, Nadav; Nahari, Hadi, Network updates of time and location.
  21. Taveau, Sebastien; Stone, Carl; Naaman, Nadav; Nahari, Hadi, Network updates of time and location.
  22. Makhotin, Oleg; Purves, Tom; Gardner, Chris, Payment channel returning limited use proxy dynamic value.
  23. Sahota, Jagdeep Singh; Aabye, Christian, Payment service authentication for a transaction using a generated dynamic verification value.
  24. Perlman, Jeffrey William, Peer-to-peer and group financial management systems and methods.
  25. Perlman, Jeffrey William, Peer-to-peer and group financial management systems and methods.
  26. Hammad, Ayman; Faith, Patrick, Portable consumer device verification system.
  27. Hammad, Ayman, Secure Communication of payment information to merchants using a verification token.
  28. Hammad, Ayman; Faith, Patrick; Koganti, Krishna Prasad; Rewis, Ben; Louis, Brendan Xavier; Weller, Kevin; Dominguez, Benedicto Hernandez, Secure authentication system and method.
  29. Hammad, Ayman; Faith, Patrick; Koganti, Krishna Prasad; Rewis, Ben; Louis, Brendan Xavier; Weller, Kevin; Dominguez, Benedicto Hernandez, Secure authentication system and method.
  30. Hammad, Ayman, Secure communication of payment information to merchants using a verification token.
  31. Hammad, Ayman, Secure communication of payment information to merchants using a verification token.
  32. Hurry, Simon; Aabye, Christian, System and method for account identifier obfuscation.
  33. Manessis, Thomas, System and method for authorizing financial transactions with online merchants.
  34. Perlman, Jeffrey William; Dempsey, Caroline Grace, System and method for promotion processing and authorization.
  35. Sheets, John, System and method for sensitive data field hashing.
  36. Hammad, Ayman, System and method including security parameters used for generation of verification value.
  37. Perlman, Jeffrey William, Systems and methods for brokered authentication express seller links.
  38. Ward, Hilary, Systems and methods for managing digital certificate based communications.
  39. Ward, Hilary; Greenwald, Gary E.; Shanahan, Francis A., Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI).
  40. Ward, Hilary; Greenwald, Gary E.; Shanahan, Francis A., Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI).
  41. Ward, Hilary; Greenwald, Gary E.; Shanahan, Francis A., Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI).
  42. Hammad, Ayman, Track data encryption.
  43. Hammad, Ayman, Track data encryption.
  44. Tunnell, Charles David; Mitchell, Justin; Zurasky, Jacob, Un-password™: risk aware end-to-end multi-factor authentication via dynamic pairing.
  45. Ross, David Justin, Verification engine for user authentication.
  46. Ross, David Justin, Verification engine for user authentication.
  47. Hammad, Ayman; Faith, Patrick; Koganti, Krishna Prasad; Rewis, Ben; Louis, Brendan Xavier; Weller, Kevin; Dominguez, Benedicto Hernandez, Verification of portable consumer device for 3-D secure services.
  48. Hammad, Ayman; Faith, Patrick; Koganti, Krishna Prasad; Rewis, Ben; Louis, Brendan Xavier; Weller, Kevin; Dominguez, Benedicto Hernandez, Verification of portable consumer device for secure services.
  49. Hammad, Ayman, Verification of portable consumer devices.
  50. Hammad, Ayman, Verification of portable consumer devices.
  51. Hammad, Ayman, Verification of portable consumer devices.
  52. Hammad, Ayman, Verification of portable consumer devices.
  53. Hammad, Ayman, Verification of portable consumer devices.
  54. Hammad, Ayman, Verification of portable consumer devices.
  55. Hammad, Ayman, Verification of portable consumer devices.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로