Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a verification token is associated with a computer and can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation
Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a verification token is associated with a computer and can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation entity. The control server can validate the secure datum and authentication data and can generate a payer authentication response.
대표청구항▼
1. A method comprising: sending, by a control server, a Purchase Authentication Page to a computer over a communications network, the Purchase Authentication Page having a user response posting field to receive a response from a user to authenticate the user;receiving, by the control server, a retur
1. A method comprising: sending, by a control server, a Purchase Authentication Page to a computer over a communications network, the Purchase Authentication Page having a user response posting field to receive a response from a user to authenticate the user;receiving, by the control server, a returned Purchase Authentication Page from the computer over the communications network, the returned Purchase Authentication Page having a user response disposed in the user response posting field and a secure datum received from a verification token associated with the computer;comparing, by the control server, at least a portion of the received user response to a stored user response to make a first determination of whether a match exists;comparing, by the control server, the received secure datum to a stored secure datum to make a second determination of whether a match exists; andgenerating, by the control server, a Payer Authentication Response message based on at least the first and second determinations. 2. The method of claim 1 wherein the secure datum was received by the verification token from a validation entity after the validation entity validates information received from the verification token. 3. The method of claim 1 wherein the secure datum is generated based on an identity of a merchant with which the user conducts a transaction, and a date or time of the transaction. 4. The method of claim 1 wherein the secure datum is generated based on an identifier associated with the verification token or an IP address of the computer. 5. The method of claim 1 wherein the verification token comprises a data processor and a computer readable medium comprising code, executable by the processor, for causing the verification token to read portable consumer device identification information from the portable consumer device, the portable consumer device being used by the user. 6. The method of claim 5 wherein the portable consumer device is a credit card. 7. The method of claim 1 wherein the control server is an access control server. 8. A control server comprising: a processor; anda computer readable medium, the computer readable medium comprising code, executable by the processor, for implementing a method comprisingsending, by a control server, a Purchase Authentication Page to a computer over a communications network, the Purchase Authentication Page having a user response posting field to receive a response from a user to authenticate the user,receiving, by the control server, a returned Purchase Authentication Page from the computer over the communications network, the returned Purchase Authentication Page having a user response disposed in the user response posting field and a secure datum received from a verification token associated with the computer,comparing, by the control server, at least a portion of the received user response to a stored user response to make a first determination of whether a match exists,comparing, by the control server, the received secure datum to a stored secure datum to make a second determination of whether a match exists, andgenerating, by the control server, a Payer Authentication Response message based on at least the first and second determinations. 9. The control server of claim 8 wherein the secure datum is generated based on at least two of an identity of a merchant with which the user conducts a transaction, a date or time of the transaction, an identifier associated with the verification token, and an IP address of the computer. 10. The control server of claim 8 wherein the secure datum was received by the verification token from a validation entity after the validation entity validates information received from the verification token. 11. The control server of claim 8, wherein the method further comprises: receiving the secure datum from a validation entity before receiving the secure datum from the verification token. 12. A system comprising: the control server of claim 8; andthe computer in communication with the control server. 13. The system of claim 12 further comprising: a validation entity in communication with the computer. 14. A method comprising: obtaining, by a control server, a risk assessment for a transaction;generating and sending, by the control server, a Purchase Authentication Page to a computer with page display parameters that cause the Purchase Authentication Page to not be visible or to not be fully visible on a display of the computer if the risk assessment is below a threshold value; andsending, by the control server, the Purchase Authentication Page to the computer with page display parameters that cause the Purchase Authentication Page to be visible on the display of the computer if the risk assessment is above the threshold value. 15. The method of claim 14 wherein the risk assessment is performed based upon data from a directory server. 16. The method of claim 14, wherein the Purchase Authenticate Page is sent to the computer with display parameters which cause the Purchase Authentication Page to be in hidden form to a user on the computer. 17. The method of claim 14 further comprising: receiving, by the control server, a secure datum from a verification token associated with the computer, wherein the secure datum is a 3-D secure datum. 18. The method of claim 14 further comprising: receiving, by the control server, a secure datum from a verification token associated with the computer. 19. The method of claim 14 further comprising: receiving, by the control server, a secure datum from a verification token associated with the computer. 20. The method of claim 19 wherein the verification token is in the form of a USB stick.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (267)
Raj, Thanigaivel Ashwin; Fuentes, Jacob Saul; Tullis, John; Shastry, Vishwanath, Alias management and value transfer claim processing.
Asghari Kamrani,Nader; Asghari Kamrani,Kamran, Direct authentication and authorization system and method for trusted network of financial institutions.
Ziarno Witold A. (4519 S. St. Louis Ave. Chicago IL 60632), Display cursor controlling device for reading card information from an information bearing credit or debit card.
Mullen, Jeffrey David, Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card.
Mullen, Jeffrey David, Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card.
Mullen, Jeffrey David, Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card.
Franklin D. Chase ; Rosen Daniel ; Benaloh Josh ; Simon Daniel R., Electronic online commerce card with customer generated transaction proxy number for online transactions.
Bierbaum, Christopher J.; Cope, Warren B.; Katzer, Robin D.; Paczkowski, Lyle W., Electronic payment using a proxy account number stored in a secure element.
Stolfo,Salvotore J.; Yemini,Yechiam; Shaykin,Leonard P., Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party.
Goldstein,Seth; Mahajan,Rajesh; Muppirala,Prakash; Quigley,Benjamin L.; Rawat,Jai; Subramanya,Venkatesh; Tran,Vincent, Intelligent method of order completion in an e-commerce environment based on availability of stored billing information.
Hirai Chiaki (Tokyo JPX) Kondo Hidefumi (Yamato JPX), Method and apparatus for completing a partially completed document in accordance with a blank form from data automatical.
Bajikar,Sundeep M.; Girard,Luke E.; Silvester,Kelan C.; McKeen,Francis X., Method and system and authenticating a user of a computer system that has a trusted platform module (TPM).
DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
Talbert, Vincent W.; Keithly, Thomas H.; Hirschfeld, Daniel A.; Lavelle, Mark L., Method and system for completing a transaction between a customer and a merchant.
Fisher, Douglas; Dominguez, Benedicto H.; Lee, Timothy Mu-Chu, Method and system for performing two factor authentication in mail order and telephone order transactions.
Mutschler ; III Eugene Otto ; Stefaniak Joseph Peter, Method for dynamically embedding objects stored in a web server within HTML for display by a web browser.
Jonathan Shem-Ur IL; Anat Wolfson IL; Shaul Bar-Lev IL; Roni Sivan IL; Ehud Kaahtan IL, Method for preventing unauthorized use of credit cards in remote payments and an optional supplemental-code card for use therein.
Fung, Daniel Y.; Evans, Stephen C., Method, system and computer readable medium for web site account and e-commerce management from a central location.
Veteläinen,Altti Pekka Henrik, Methods, system, and computer readable medium for user data entry, at a terminal, for communication to a remote destination.
Khan,Mohammad; Kumar,Pradeep; Vijayshankar,Roshan; Liu,Ming Li; Narayanan,Narendra, Methods, systems and computer program products for over the air (OTA) provisioning of soft cards on devices with wireless communications capabilities.
Bhambri, Vikram; Walsh, Deirdre L.; Sausville, Paul C.; Biyani, Raj; Button, Thomas L.; Nolan, Sean; Warren, Susan; Hempey, Matthew D., Payment information security for multi-merchant purchasing environment for downloadable products.
Baker, David Preston; Marshall, III, Stanley N.; Hussein, Mohamed Reza; Hiller, Matthew Eric; Tung, Chin Pang; Mitchell, Andrew Robert, Secure storage of payment information on client devices.
Smith Robert Neal, Smart card authentication system comprising means for converting user identification and digital signature to pointing device position data and vice versa using lut.
Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Saunders, Peter D., System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions.
Snapper,Erik J.; Jiggins,Julian P.; Shyam,Bharat; Partovi,Hadi; Berman,Eric R.; Freedman,Steven J.; Allard,James E.; Chang,Frank Z.; Proteau,Stephen P.; Jorgenson,Clint C., System and method for populating forms with previously used data values.
Chien, Emily; Sanchez, Trish; Saunders, Daniela; Wiseman, Jill; Balagopal, C R; Kinderknecht, Al; Parson, Jon W.; Preston, Ray, System and method for using loyalty rewards as currency.
Chien, Emily; Sanchez, Trish; Saunders, Daniela; Wiseman, Jill; Balagopal, C. R.; Kinderknecht, Al; Parson, Jon W.; Preston, Ray, System and method for using loyalty rewards as currency.
Chien, Emily; Sanchez, Trish; Saunders, Daniela; Wiseman, Jill; Balagopal, C. R.; Kinderknecht, Al; Parson, Jon W.; Preston, Ray, System and method for using loyalty rewards as currency.
Hughes Thomas S. (31310 Eagle Haven Cir. ; Ste. 100 Rancho Palos Verdes CA 90274) Molina Gustavo (24292 Rhona Dr. Laguna Niguel CA 92656), System for remote purchase payment transactions and remote bill payments.
Saunders, Peter D.; Leggatt, Lesley; Chuang, I-Hsin; Oh, John J., Systems, methods and computer program products for performing mass transit merchant transactions.
Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Wallet application for interacting with a secure element application without a trusted server for authentication.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.