[go: up one dir, main page]

US20180165441A1 - Systems and methods for multifactor authentication - Google Patents

Systems and methods for multifactor authentication Download PDF

Info

Publication number
US20180165441A1
US20180165441A1 US11/137,409 US13740905A US2018165441A1 US 20180165441 A1 US20180165441 A1 US 20180165441A1 US 13740905 A US13740905 A US 13740905A US 2018165441 A1 US2018165441 A1 US 2018165441A1
Authority
US
United States
Prior art keywords
display
authentication
user
characters
customer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/137,409
Inventor
Glenn Cobourn Everhart
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JPMorgan Chase Bank NA
Original Assignee
JPMorgan Chase Bank NA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/105,471 external-priority patent/US20030182241A1/en
Priority claimed from US10/419,107 external-priority patent/US7899753B1/en
Application filed by JPMorgan Chase Bank NA filed Critical JPMorgan Chase Bank NA
Priority to US11/137,409 priority Critical patent/US20180165441A1/en
Assigned to JPMORGAN CHASE BANK reassignment JPMORGAN CHASE BANK ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EVERHART, GLENN COBOURN
Priority to US11/567,903 priority patent/US20170103395A1/en
Priority to US13/621,995 priority patent/US10726417B1/en
Assigned to JPMORGAN CHASE BANK, N.A. reassignment JPMORGAN CHASE BANK, N.A. CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE'S NAME TO JPMORGAN CHASE BANK, N.A. PREVIOUSLY RECORDED ON REEL 016607 FRAME 0090. ASSIGNOR(S) HEREBY CONFIRMS THE CORRECTION OF THE ASSIGNEE'S NAME. Assignors: EVERHART, GLENN COBOURN
Publication of US20180165441A1 publication Critical patent/US20180165441A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Definitions

  • the invention provides an authentication system and method.
  • the invention provides a method for performing a financial authentication utilizing a token associated with a user, the method comprising the token generating a set of display characters that are viewable by the user, the token generating the display characters using logic; the user transforming a portion of the set of display characters using a transformation process, based on knowledge of the user, so as to form a display character sequence; the user outputting the display character sequence to an authentication entity; and the authentication entity authenticating the display character sequence using the logic and knowledge of the transformation.
  • FIG. 1 is a diagram showing aspects of an encryption process in accordance with one embodiment of the invention
  • FIG. 2 is a flowchart showing further aspects of the encryption process in accordance with one embodiment of the invention.
  • FIG. 3 is a block diagram showing an authentication system in accordance with one embodiment of the invention.
  • FIG. 4 is a block diagram showing further details of an authentication system, and in particular the authentication entity system, in accordance with one embodiment of the invention.
  • FIG. 5 is a diagram showing processing associated with display characters in accordance with one embodiment of the invention.
  • FIG. 6 is a high level flowchart showing an authentication process in accordance with one embodiment of the invention.
  • FIG. 7 is a flowchart showing further details of the “customer generates authentication information” step of FIG. 6 in accordance with one embodiment of the invention.
  • FIG. 8 is a flowchart showing in further detail the “authentication entity system authenticates the billing information, including authenticating the display character sequence” step of FIG. 6 in accordance with one embodiment of the invention
  • FIG. 9 is a flowchart showing in further detail the “authenticator character generating portion generates an authorizing character sequence based on the authentication characters” step of FIG. 8 in accordance with one embodiment of the invention.
  • FIG. 10 is a flowchart showing in further detail the “display character sequence is compared to the authorizing character sequence” step of FIG. 8 in accordance with one embodiment of the invention.
  • FIG. 11 is a diagram showing further aspects of an encryption process relating to a purchase amount in accordance with one embodiment of the invention.
  • What is proposed here is a system and method which provides a form of two factor authentication which resists theft of the authentication tokens even by someone who can intercept the authentication messages in total, in accordance with one embodiment of the invention.
  • the invention can be supported using relatively very simple hardware.
  • One embodiment uses a token which displays numbers that change (either with time or with uses, but in ways that cannot be easily predicted by observation) but whose values can be tracked and predicted by an authenticating authority (who issued the tokens generally).
  • the token will display a set of numbers which will have their positions labeled (e.g., 1 through 6, for a 6 digit display).
  • FIG. 1 is a diagram illustrating such a token 100 .
  • a customer will be told ahead of time, “choose three positions of the display 10 , as shown in FIG. 1 , you will select in order, and remember the positions and order you picked.”
  • the customer authenticates by getting his token to display a new set of numbers (which should change so that their values are effectively unpredictable), and then to report the values in the three positions he chose and told the authenticating authority about earlier.
  • FIG. 1 shows the display of the token 100 in an “off” position.
  • the customer activates the display in some manner, i.e., pushes a button, the token is turned on, and numbers are seen on the display.
  • the display 10 reads: and the customer decided to report position 5, 1, and 4 in that order. The customer would then transmit the 5th, 1st, and 4th digits in order: 2 5 9
  • another set of labels may be provided under the display, like 01, 23; 45, 67, 89.
  • the customer is asked, later in a transaction, to encode a few digits of the transaction amount as positions of the display, and then requested to transmit the digits.
  • This too can be easily verified by a payment processor (who has the amount as part of a payment record), and it shows that someone with the token agreed to the payment amount. In effect, this is a signing by the customer (who would have authenticated as an individual moments before with the same token) of the transaction amount. Similarly, any external observer will be unable to deduce any of this from the digits transmitted. The customer may be told what the purchase amount is.
  • the customer would report the characters shown in the position five, position five and position two, i.e., if the display was labeled 0, 1-2, 3-4, 5-6, 7-8, 9.
  • FIG. 11 shows a token 30 so labeled.
  • the displayed number is 5 3 7 9 2 1.
  • the customer would report the displayed numbers in the positions, 5, 5, 2, i.e., the customer would report the numbers 2 2 3.
  • an authentication entity can confirm that the customer indeed knows what the customer is agreeing to, e.g., a dollar amount. It is appreciated that such processing adds complexity, but may be desired in some circumstances, e.g., in high dollar transactions. To reduce the complexity, a prompt screen might be provided to the customer so as to take them through the process, e.g., a window on a web page.
  • the problem being addressed is in the area of authentication.
  • Authentication of customers to a bank is vital since the entire business is involved with caring for other peoples' money and using it per their instructions. If the owners cannot be identified, their instructions cannot be followed and the business collapses. When trying to identify people over computer links, this is harder than otherwise.
  • One of the major issues is that spyware and other man in the middle attacks on information passed for authentication are very common. By providing people with a token that can produce an effectively random number which an authority can compute as well, anytime it is needed, people might be able to prove clearly that they have the token. Unfortunately, theft of tokens (even from the mails) is also common.
  • This may be as simple as picking an order in which to report several of the digits of the random number, as described above. Then, the one doing the authentication performs the same transform on his copy of the random number and checks if the value is correct. Note that anyone observing the numbers picked will see only the random numbers, not the secret method by which they were produced, and thus will have nothing very useful in attempting a replay or PIN theft.
  • FIG. 2 is a flowchart in accordance with one embodiment of the invention. As shown, the present invention provides a novel way to authenticate a customer or other person.
  • the invention might be compared to a known one-time pad.
  • One time pad cryptography is usually illustrated with the pad values being XORed with data.
  • embodiments of the invention perform an encryption hand operation on display characters displayed by a token.
  • FIG. 2 if the “random number” choices are changed appropriately, we could produce 3 digit outputs from 000 to 999, i.e., the entire range possible. This means we may have no test possible to pick the correct key as an observer in the middle. This makes the operation the user undertakes (which might be the illustrated permutation or anything else convenient) far stronger than what the same operation on normal text might be.
  • the user operation remains a simple one, but the fact that it operates on one time data which is effectively random makes it basically as strong as the randomness.
  • the cipher and key are well chosen which may be used for computing the numbers to be synchronized the resulting ciphertext may be treated as random and the discussion above holds.
  • FIG. 3 is a block diagram showing an authentication system 100 in accordance with one embodiment of the invention.
  • the authentication system 100 includes a user authentication device 120 .
  • the user authentication device 120 may be in the form of a token, for example.
  • the user authentication device 120 provides the user with display characters (for example numbers) 192 (see FIG. 3 ) that are used by the user to effect an authentication, as discussed below.
  • the user authentication device 120 includes a display character generating portion 124 and a display portion 130 .
  • the display portion 130 includes a plurality of display positions 138 , i.e., display positions ( 131 - 136 ).
  • Each display position 138 is a display, i.e., such as an LCD display, that displays a number, or any other character, so as to be visually observed by a user 110 , in accordance with one embodiment of the invention.
  • the display character generating portion 124 generates the characters that are displayed in the display portion 130 .
  • the display character generating portion 124 uses predetermined logic (i.e., a suitable algorithm) to populate the display positions 138 .
  • This logic provides a predetermined progression of numbers, or other characters, that may be similarly generated by an authentication entity system 140 .
  • the user authentication device 120 has a button 121 , which may be pressed by a user 110 .
  • the display character generating portion 124 generates the characters that are displayed in the display portion 130 . Accordingly, the user 110 interfaces with the user authentication device 120 using the button and visually, in accordance with one embodiment of the invention.
  • the user authentication device 120 further includes a device memory portion 126 .
  • the device memory portion 126 serves as a memory or database, as is needed to perform the various functions of the user authentication device 120 .
  • the authentication system 100 also includes an authentication entity system 140 and an illustrative merchant 180 .
  • the user 110 using the user authentication device 120 ) interfaces with the merchant 180 so as effect a desired transaction.
  • the transaction might be over the telephone, the Internet, or any other communication channel, as desired.
  • the systems and methods of embodiments of the invention may be used in any “transaction”, including a conveyance of information, in which authentication of a user is needed or desired.
  • Such transaction might include a telephone transaction, Internet transaction (such as an Internet purchase), network transaction, infrared transaction, radio signal transaction, credit card transaction, debit card transaction, smart card transaction, ACH transaction, stock trade transaction, mutual fund transaction, swap, PAYPAL® transaction, BILL ME LATER® transaction, electronic funds transfer transaction, financial application transaction, an arrangement to set up payments to an entity, a verification, an ATM transaction, and/or a message, for example.
  • a transaction might include a message from one human user to another human user, a human user communicating with an electronic device, and/or two electronic devices communicating with each other.
  • the transaction may or may not be in a financial context, i.e., for example, the message might be authorizing the opening of a door or the transfer of a non-financial related message, for example.
  • FIG. 3 shows a communication channel 160 over which the transaction is performed.
  • the communication channel 160 carries an authorization request 162 .
  • the communication channel 160 then carries an authorization 164 , in the example of FIG. 3 .
  • the authentication entity system 140 might alternatively not authorize the requested transaction.
  • the authorization request 162 and the provided authorization is passed through the merchant 180 .
  • the authorization request 162 and/or the authorization provided 164 might be communicated to the authentication entity system 140 in some other manner, such as by some third party, and not via the merchant 180 .
  • the user authentication device 120 need not take on the form of the device shown in FIGS. 1 and 3 , for example. That is, for example, the user authentication device 120 might be in the form of a software program running on a computer, or in some other alternative form.
  • FIG. 4 is a block diagram showing further details of the authentication entity system 140 .
  • the authentication entity system 140 includes an input portion 142 and an entity memory portion 144 .
  • the input portion 142 interfaces with the communication channel 160 so as to communicate data, i.e., such as the authorization request 162 and the authorization provided 164 information.
  • the entity memory portion 144 serves as a database to store various data associated with, and needed by, operation of the authentication entity system 140 .
  • the authentication entity system 140 also includes an authenticating processing portion 150 .
  • the authenticating processing portion 150 performs the various processing of the authentication entity system 140 .
  • the authenticating processing portion 150 includes an authenticator character generating portion 152 and a comparison portion 154 .
  • the authenticator character generating portion 152 generates an authorizing character sequence 198 to be used to authenticate the transaction initiated by the user 110 .
  • the comparison portion 154 performs a comparison between the authorizing character sequence 198 (generated by the authenticator character generating portion 152 ) and the display character sequence 194 (provided by the user-customer).
  • FIG. 5 is a diagram showing further features in accordance with one embodiment of the invention. Specifically, FIG. 5 shows aspects of the generation and the manipulation of the display characters 192 (generated by the display character generating portion 124 ) and the authentication characters 196 (generated by the authenticator character generating portion 152 ). Both the portions ( 124 , 152 ) use the same logic (i.e., random logic as described above) to generate sets of characters ( 192 , 196 ) in some predetermined manner. That is, the display character generating portion 124 will generate the same characters as the authenticator character generating portion 152 in a progressive manner. As used herein, the generation of a new set of characters by the portions ( 124 , 152 ) is characterized as generating the next “logic step”.
  • the display characters 192 associated with a particular logic step will be the same as the authentication characters 196 , if for the same logic step, in accordance with one embodiment of the invention.
  • the particular logic step that each of the display character generating portion 124 and the authenticator character generating portion 152 are at
  • the particular logic step will dictate the particular set of characters that are generated.
  • the user observes only the particular display positions 138 that the user is assigned, i.e., the user might make this choice upon activation of the user authentication device 120 .
  • the user might have picked the 1, 4 and 5 positions to be the selected positions (from which the user 110 actually uses the characters).
  • the user 110 orders the select display characters 192 in a predetermined manner.
  • FIG. 1 described above shows an example of this ordering.
  • the selected display characters are ordered, this results in a “display character sequence” 194 , as used herein. It is this display character sequence 194 that is submitted to authenticate the desired transaction, in accordance with one embodiment of the invention in which ordering is used as the transformation to the display characters 192 .
  • the authentication entity system 140 In a parallel manner to the user 110 , the authentication entity system 140 generates authentication characters 196 , selects particular authentication characters 196 as agreed upon with the customer, and then orders the selected authentication characters 196 . In this manner, the authentication entity system 140 generates a sequence of characters (e.g. a number) that may be compared with the display character sequence 194 (submitted by the user/customer).
  • a sequence of characters e.g. a number
  • the authentication entity system 140 may perform variations on the above processing methodology. That is, the authentication entity system 140 may not in fact generate all the authentication characters 196 , but rather only the select authentication characters 196 that will indeed be used in the ordered set, which constitutes the authorizing character sequence 198 . This approach might somewhat limit needed processing since the authentication entity system 140 is of course aware that only select characters in the authentication characters 196 will indeed be used. However, this approach would generally not be performed with the user authentication device 120 , since the inclusion of all the display characters 192 (and subsequent disregarding of some of the display characters 192 by the user 110 ) is part of the encryption process.
  • FIG. 6 is a high level flowchart showing an authentication process in accordance with one embodiment of the invention.
  • the process starts in step 200 .
  • step 202 in this example, the customer initiates a transaction.
  • the transaction is with a merchant.
  • step 204 the process passes to step 204 .
  • step 204 the merchant requests various information from the customer so as to process the transaction.
  • step 206 the customer enters item information, i.e., regarding the particular item that the customer is purchasing, and shipping information. It should of course be appreciated that the merchant may request, and the customer may enter, any of a variety of desired information.
  • the customer prepares billing information. Specifically, in step 210 , the customer generates authentication information to accompany the customer's submission of other billing information. Further details of step 210 are described in conjunction with FIG. 7 below.
  • step 220 of FIG. 6 the customer enters the billing information including authentication information, i.e., including a display character sequence for use by an authentication entity system in authenticating the transaction.
  • step 220 the process passes to step 230 of FIG. 6 .
  • step 230 all the information (item, shipping, billing) that the customer has prepared is sent to the merchant.
  • step 240 the merchant sends the authentication information on to the authentication entity system, i.e., for authentication of the transaction that the customer is requesting the merchant to process.
  • step 250 the authentication entity system authenticates the billing information, including authenticating the display character sequence that the customer has provided. Further details of step 250 are described below with reference to FIG. 8 .
  • step 280 the authentication entity system sends authorization, or alternatively denial, of the transaction back to the merchant. Then, the process passes to step 282 .
  • step 282 the merchant authorizes the transaction if the authentication entity system authenticated the display character sequence.
  • PIN personal identification number
  • step 282 of FIG. 6 the process passes to step 284 .
  • step 284 the process of FIG. 6 ends.
  • FIG. 7 is a flowchart showing further details of the “customer generates authentication information” step 210 of FIG. 6 in accordance with one embodiment of the invention.
  • the subprocess of FIG. 7 starts in step 210 and passes to step 212 .
  • the customer pushes a button on the user authentication device, which the customer has been provided.
  • the user authentication device advances to a next number sequence based on logic contained in the user authentication device (i.e., the user authentication device 120 displays information associated with the next “logic step” as described above).
  • This logic may be in the form of an algorithm that generates a plurality of display characters in some predetermined manner, i.e., in a manner that an authentication entity system 140 may perform a generation of the same numbers based on the same logic.
  • the user authentication device displays a number sequence on the display portion, i.e., one number for each display position.
  • a number sequence i.e., one number for each display position.
  • the invention is not limited to the use of numbers. That is, any suitable character or other indicia might be used in lieu of or in conjunction with numbers.
  • step 216 the customer recalls the particular positions that the user is assigned. That is, out of six display positions, the customer only uses three numbers (associated with three display positions) so as to generate a display character sequence.
  • step 216 the customer further reads the numbers from those particular assigned positions in a particular assigned order. Accordingly, in step 218 , the customer now has a display character sequence to include in the billing information.
  • step 218 the process passes to step 219 of FIG. 7 .
  • step 219 the process returns to step 220 of FIG. 6 .
  • FIG. 8 is a flowchart showing in further detail the “authentication entity system authenticates the billing information, including authenticating the display character sequence” step 250 of FIG. 6 in accordance with one embodiment of the invention.
  • the subprocess of FIG. 8 starts in step 250 and passes to step 252 .
  • step 252 of FIG. 8 the authentication entity system inputs the billing information, including the display character sequence from the customer.
  • the authenticator character generating portion (in the authentication entity system) advances to the next logic step, i.e., in parallel to the user authentication device 120 . That is, the authenticator character generating portion generates authentication characters based on the same logic as is implemented in the user authentication device. It should be appreciated that some synchronization feature may be used to coordinate the particular step in logic, i.e., in generating the next logic step.
  • step 254 the process passes to step 254 .
  • step 254 the authenticator character generating portion in the authentication entity system generates an authorizing character sequence based on the authentication characters. Further details of step 254 are discussed below with reference to FIG. 9 .
  • step 256 of FIG. 8 the display character sequence is compared to the authorizing character sequence. Further details of step 256 are discussed below with reference to FIG. 10 .
  • step 256 the process passes to step 258 .
  • step 258 of FIG. 8 based on a match or no match, the authentication entity system determines if authorization should be given. Then in step 259 of FIG. 8 , the subprocess of FIG. 8 returns to step 280 of FIG. 6 .
  • FIG. 9 is a flowchart showing in further detail the “authenticator character generating portion generates an authorizing character sequence based on the authentication characters” step 254 of FIG. 8 in accordance with one embodiment of the invention.
  • the subprocess passes to step 262 .
  • the authenticator character generating portion retrieves information regarding particular fixed positions that the user is assigned. Then, the process passes to step 264 .
  • the authenticator character generating portion retrieves the authentication characters disposed in such particular fixed positions. This processing is in parallel to the selection of numbers (from the display positions) as is performed by the customer.
  • the authenticator character generating portion orders the retrieved authentication characters using an order that the user is assigned. As a result, the authenticator character generating portion generates an “authorizing character sequence”, which is to be compared with the “display character sequence” that is provided by the user.
  • other transformation processes might be used in lieu of ordering select characters. That is, any suitable transformation, e.g. such as ordering or adding a value of one, might be used to convert a plurality of selected characters (shown on the token display) to a display character sequence.
  • step 266 of FIG. 9 the process passes to step 268 .
  • step 268 the subprocess of FIG. 9 returns to step 256 of FIG. 8 .
  • FIG. 10 is a flowchart showing in further detail the “display character sequence is compared to the authorizing character sequence” step 256 of FIG. 8 in accordance with one embodiment of the invention. After starting in step 256 of FIG. 10 , the subprocess passes to step 272 .
  • step 272 the authentication entity comparison portion compares: the authorizing character sequence versus the display character sequence (obtained from the customer). After step 272 , the process passes to step 274 . In step 274 , the comparison portion considers any variation between the authorizing character sequence versus the display character sequence based on predetermined thresholds.
  • the variation might be acceptable so that the authentication entity system will still authenticate the transaction.
  • the particulars of what is acceptable and what is not acceptable variation may be based on thresholds, as is desired.
  • step 276 the comparison portion outputs data regarding match or no match back to the merchant. As a result, the merchant will process or not process the desired transaction. Then, in step 278 of FIG. 10 , the process returns to step 258 of FIG. 8 . Processing then continues as described above with reference to FIG. 8 .
  • the scheme described herein uses the idea of a remote token synchronized with or tracked with a central authentication database, and uses a cipher as the secret to authenticate the user.
  • the use of the cipher which may typically be relatively simple, together with the remote token system provides a novel combination in accordance with one embodiment of the invention.
  • the method described herein may be implemented in innumerable different ways, i.e., such as picking different simple ciphers. But there must be local and remote effectively random numbers, in accordance with one embodiment of the invention, so that a simple operation on the numbers can be computed by a person and used to authenticate that the person is the right person to be using the token, rather than simply confirming that the toke is correct.
  • the invention relates to the notion of using second encryption with a token that generates changing numbers, so that the second encryption embeds or combines additional information with the token's number, so that authentication depends on both.
  • the additional information might be a pattern or other information remembered by an individual, some parameter (like amount) of a payment or transaction, or any other information it is desired to verify.
  • the invention further relates to the notion of combining information in such a way that someone who can figure what the token will be generating might use it to reconstruct some information remotely, with no fear of the information being intercepted by man in the middle attacks.
  • this functionality is discussed above in conjunction with using a purchase amount to generate a display character sequence, i.e., using the purchase amount and matching digits (of the purchase amount) with labels under the display positions.
  • the authentication entity system 140 authenticates a display character sequence that is provided by the customer.
  • the authentication entity system 140 does not allow multiple submissions of a display character sequence.
  • the multiple submission checking portion 156 (of the authentication entity system 140 ) may perform a check on a newly submitted display character sequence. This check determines whether the particular display character sequence has been previously submitted, e.g., previously submitted in a particular period of time. If the multiple submission checking portion 156 determines that the particular display character sequence has been previously submitted, the authenticating processing portion 150 will not authenticate the display character sequence. For example, this might occur in the situation when a customer fails to press button 121 (on the user authentication device 120 ) to generate a new number sequence.
  • a repeat display character sequence (based on the repeat number sequence) will not be authenticated.
  • the check for multiple display character sequences provides a further fraud prevention measure.
  • the authenticating processing portion 150 may be provided with the ability to keep track of which display character sequences have been observed.
  • the customer pushes a button on the user authentication device 120 and a number sequence is displayed. From the number sequence, the customer selects characters to form the display character sequence. It is appreciated that if the number sequence is all fives, i.e., 5 5 5 5 5 5 (or even 2 2 2 2 4 4), then the particular order that the user has selected will be irrelevant. For this reason, the content of the number sequence displayed on the user authentication device 120 may want to be controlled, i.e., so as to avoid excessive repeat of numbers or other characters.
  • the authenticating processing portion 150 may be needed to synchronize the user authentication device 120 with the authenticating processing portion 150 .
  • the authenticating processing portion 150 may “run ahead.” That is, the authenticating processing portion 150 may run ahead with the authorizing character sequences assuming that there have been presses of the button 121 which were not submitted to the authentication entity system 140 .
  • the authenticating processing portion 150 may run ahead some predetermined number of times, until it finds a match, or alternately it reaches the predetermined number of times and concludes the display character sequence should not be authenticated.
  • the customer may provide two sets of display characters or two sets of display character sequences. These two sets, for example, might then be used by the authenticating processing portion 150 to synchronize with the user authentication device 120 . i.e., based on the two sets of display characters, the authenticating processing portion 150 could determine where in the progression the user authentication device 120 is disposed.
  • the user authentication device 120 may be used in multiple manners. For example, a customer may use the authentication device 120 to generate the display character sequence as described above, i.e., by selecting the display characters in a particular order. Such use may be implemented for Internet transactions, for example. However, in one embodiment, the same user authentication device 120 may also be used by submitting all the display characters to the merchant (and in turn the authenticating processing portion 150 ). A higher exchange rate may be applied to the second use as compared with the exchange rate applied to the first use. For example, such differential in exchange rate might be applied since the second use bears higher risk than the first use. Illustratively, the second use might occur in a situation in which the user authentication device 120 is used in a restaurant, and a person other than the customer is effecting the transaction.
  • a single token may be given to a family, or provided to be used in some other situation in which multiple persons will use the same token, i.e., the same user authentication device 120 .
  • the user authentication device 120 will proceed through a progression of display characters, i.e., upon presses of the button 121 .
  • different users of the user authentication device 120 will be assigned different display positions to read characters, as well as a different order in which to place those observed characters. Accordingly, for example, if a brother were provided the display character sequence of FIG. 1 , the brother will give the 2 5 9 number as shown in FIG. 1 .
  • the same person might use the same user authentication device 120 , but be assigned different display character sequences for different uses of the user authentication device 120 .
  • the single user may be assigned ([position 5] [position 4] [position 1] (display character sequence would be 2 9 5)) for effecting financial transaction versus ([position 5][position 1] [position 4] (display character sequence would be 2 5 6)) for opening their garage door.
  • the systems and methods of the invention as described herein may be used for any of a variety of situations that an authentication procedure is required.
  • the invention may be used for effecting financial transactions, accessing information, opening doors, controlling access to devices (e.g. access to a computer) and/or other situations where an authentication procedure is needed.
  • the invention may be used to prevent fraud in high risk and/or high value transactions, e.g., Internet, telephone and ATM transactions.
  • high risk and/or high value transactions e.g., Internet, telephone and ATM transactions.
  • the reduced risk of fraud associated with using the invention might typically result in a lower interchange fee, as compared to financial transactions using other known authentication methods.
  • the authentication device 120 may take any of a variety of forms and/or be combined with other devices.
  • the user authentication device 120 may be used or combined with a cellular phone, a PDA, an RFID device, and/or other devices.
  • the display character sequence, as described herein may be used in the place of a traditional PIN (personal identification number). Accordingly, the display character sequence might be used in an ATM transaction. Such might be used to prevent ATM Fraud.
  • the invention herein described is a method by which token authentication can be incorporated in payment systems with very minor changes at issuer sites and using mainly existing merchant facilities.
  • the method may use a token which will generate a display of numbers which changes either with time or with uses—and whose values are unpredictable to the external observer who has not complete information about the internal (hidden) mechanisms, i.e., processing.
  • One aspect of the invention is the use of the display of such a token or the use of a function or selection from that display (the selection or function being done by the customer as something he remembers) as an authenticator reported instead of the existing CVV2 or CVC2 (or equivalent for other card brands) card authenticator string.
  • the CVV2 field is normally printed on the back of payment cards and is often asked for in phone or net transactions. Its value is checked mainly by the card issuer.
  • the checking routine described herein can easily be adapted to check the correctness of the token-derived numbers for that particular token. Accordingly, this field is already present, it is already handled by payment networks.
  • the use of the display character sequence in lieu of the CVV2 or CVC2 presents few problems either for merchant expense or network changes and only very minor expense for the issuer.
  • a further aspect relating to one embodiment of the invention is the use of a token display in place of PIN values.
  • Facilities for entering PIN values already are widespread anywhere payment cards exist, and a replacement for a PIN value where the replacement changes (and especially one which depends on the token the customer has and on the selection pattern he knows) gives a much stronger authentication of the customer than a fixed PIN.
  • Using this replacement may require no new network or merchant changes, and as PINs are checked by issuer only, the changes to issuer system would be basically limited to the PIN validation routines, which are well known and can be readily added to, i.e., so that issuer would validate the display character sequence, as opposed to a PIN.
  • the display from a token with a display of variable numbers, or a function or permutation or selection from that display may be used as an authenticator instead of CVV2 or CVC2 in credit card processing.
  • the display from such a card, or a permutation or selection from such a display might be used instead of a PIN in card transactions or the logical equivalent thereof.
  • the display will show some numbers.
  • two digits display the least significant digits of an internal counter and 3 to 6 digits (preferably 6) display part of the result of encrypting the internal counter using an encryption key which is hidden within the card, and which may different for every card, i.e., the key should be different enough that anyone analyzing the innards of a card cannot compute the key for a different card even though he may know the complete keys of several other cards. Values may be supplied for these “diversified keys”.
  • the encryption algorithm used may be a “strong” crypto algorithm, as strong as triple DES or better, but may depend on the particular use.
  • the idea is that the internal counter increments, and the Bank tracks its value, with the aid of the 2 digit low order display. It may be acceptable if the display is in octal radix instead of decimal if cost effective.
  • the display needs to be visible either while the button is pressed, or for an interval after the button is pressed, so that the customer has at least 30 seconds (and preferably longer) to refer to it as he may need to compare it to other displays or transcribe it or recite it over the phone.
  • the button must of course be very well debounced, and could well be used to e.g. drive a one-shot multivibrator so that it could be impossible to increment the counter more than once a minute. Something may be provided to ensure that the counter will increment by one only and not by large counts, i.e., even if the button is electrically noisy.
  • the device may live for the 2-3 years that a credit card is issued for. Thus the power supply must suffice for this and for the expected number of uses the device will have. It may be preferable, in particular from a marketing perspective to have the device housed in a credit card. As noted herein, the incorporation of RFID functions may also be used.
  • the invention authenticates a bank to a customers.
  • By encrypting that with the card's key we may have to ask for customer name or account number too, we can predict the display and tell the customer “your display will read nnnnnnn if you are talking to the real bank. If not, hang up immediately and give no further information.”
  • the token is authenticated to the bank.
  • the bank asks a customer to push the button and read the display.
  • the process includes using the 2 digit display (which may be positioned alongside the display characters) to help determine what the counter is and compute the display and see if they match. If they don't, it is possible to try to assume the counter might be 100 or 200 or more. Accordingly, a few more encryptions may be attempted to see if the token value provided by the customer is indeed OK.
  • a 2 digit display may be used in addition to the display of FIG. 1 so as to assist in determining where the customer is disposed in the progression of the token displays, i.e., if the customer's kids have been playing with the token button.
  • a process may authenticate the customer to the bank.
  • each customer is requested to pick an order in which to report digits of the display.
  • the customer pushes his button, reports digits in the order he said he would use.
  • the display shows: and the customer said he would report digits in order 5, 1, 6, 3 (which he has to remember), he tells us the “77” part (if it is agreed upon for him to do so) and reports 3, 5, 9, 1 (the 5th, 1st, 6th, and 3rd digits of the random part). This relies on the token AND the customer memory.
  • the customer may simply report the value of the display (or possibly the first several digits of the display) when asked for CVV2. It is noted that CVV2 reports may be 5 or more digits long, so the counter value AND some ciphertext could be reported. Alternatively the first part of the ciphertext could be reported for CVV2 if no more than 3 digits were accepted.
  • the back end we would assume the counter incremented by 1 and compare, repeating for higher counter values till a comparison matched or we gave up, i.e., we would roll the counter ahead until we identified a match. In accordance with one embodiment of the invention, the back end has to track the counter in all cases. We expect that merchants will quickly start accepting CVV2, and accepting longer CVV2, to handle these devices since the quality of identification will be much higher than otherwise on phone or net orders, and they may eliminate substantial monies in fraud losses for merchants per year.
  • the user authentication device 121 e.g., a token
  • the user authentication device 120 may be used in conjunction with a variety of features, as described below.
  • Optical light emitting devices generally need to be fabricated on thin substrates with some electronics to control current flow to the light emitting polymers. It might be sensible to think of building a backplane for such devices (which are very thin and flexible) on which you also etch transistors and the like to perform the counting, debouncing, crypto, and possibly display timing as well, in one embodiment. A bit of flash memory may be built onto this backplane (to hold the counter value and a diversified key, if so desired. This would mean that all connections become part of a printed circuit, and the arrangement might be in the form of a small rectangle laid down in the inside of a card, to be covered by a transparent cover. Then the connections might only be to a battery and button.
  • a piezoelectric element may be used for power.
  • the customer would press on a printed circle, i.e., to press the element and generate electricity, avoiding button contacts. Also, pressing or bending energy might be used, if workable.
  • a thin RFID IC bonded onto a display backplane would allow the cryptography, accumulation, password setup, etc. all to be done on a not too heavily altered RFID chip.
  • Initializing the crypto key might be done via fuses, via RFID, or a capacitive feed scheme which could use pulse trains to set the keys up one bit at a time without needing full contact. This can be shared separately if need be. Other schemes can be used.
  • a variety of power sources may be used to power the button 121 .
  • photoelectric cells, electrets, and/or known battery arrangements may be used.
  • the device must be reliable during its life, even though it will typically live in a wallet or purse.
  • the user authentication device 120 may include a display that has 2 parts, i.e., a 2 digit field and a longer field (which might be 6 digits long, for example). Every time the customer presses the button, the 2 digit field increments and the longer field gets a set of what look like random numbers. No two card sequences are like.
  • an authenticating entity may wish to insure that a transaction amount is approved by the customer.
  • the customer may take the first few digits of the amount (the purchase amount) and use them as positions to report on the display.
  • the amount the purchase amount
  • the inventive device may largely eliminate phishing: there is no point in stealing things like card numbers or account numbers when the variable device is required to get money.
  • the inventive device may vastly reduce phone or net fraud. This will cut both issuer and merchant losses.
  • the inventive device may eliminate intra-family fraud so long as individual devices are given to each person and so long as the people don't give their patterns away.
  • the inventive device may make customer data cheaper to handle because less of it will be privacy sensitive. People don't mind when their phone numbers are given out most of the time.
  • the inventive device may cut fraud in ATMs and/or at merchants if the device is used to generate pseudo PINs which would authenticate transactions. Because the transmitted data is in effect encrypted, even cameras watching PIN pads will be useless in stealing such credentials. It is noted that most merchants have PIN pads already which could be used in implementation of the invention.
  • the device shows the customer that his credentials are being generated securely and shows that its issuer is doing something very tangible in protecting the customer's identity. The savings to merchants are sizeable and should in addition give some merchants good incentives to prefer these devices and to give incentives to customers to use them.
  • the customer for net use, i.e., a purchase over the Internet, the customer might give his username and password. Then, the customer gives the value of the low order digits. The authentication entity then determines what the ciphertext (0:2) should be and conveys such to the customer, telling customer “if this doesn't match your display, you are talking to a fraud site. Then, if ciphertext (0:3) is OK, the authentication entity may ask the customer to enter ciphertext (3:5) and check that it is also valid. For example as used in this example, 3:5 means the digits shown in positions 3, 4 and 5.
  • the customer might provide half of the displayed digits to an authentication entity. Based on these provided digits, the authentication entity can then (if needed) determine where the customer is in the progression of the token. The authentication entity can then generate displayed characters (corresponding to those displayed by the customer), and the authentication entity then provides at least a portion of such displayed characters back to the customer. For example, the authentication entity might provide a portion or all of the displayed characters back to the customer. In this manner, the authentication entity knows they are dealing with a particular customer and the customer knows they are dealing with a particular authentication entity. Variations of this embodiment are of course possible regarding what portion of a character displayed is provided by what entity, e.g., what characters are provided by the customer and what characters are provided by the authentication entity.
  • the two parties authenticating may of course perform any agreed upon transformation to the characters displayed on the token (or other device), i.e., such as providing select numbers in a particular order, or adding a 1 to each displayed number, for example, or any other suitable transformation. Accordingly, the providing of a select number of digits in a particular order is merely one transformation that might be performed.
  • the authentication entity might provide a portion or all of the displayed characters back to the customer (or a transform of the displayed characters), and in this manner, the customer knows they are dealing with a particular authentication entity.
  • the authentication entity might provide a portion or all of the next pattern, e.g., the next set of display characters, which may then be verified by the customer.
  • the next pattern may also of course be transformed in some manner.
  • the authentication entity (or the customer) may convey to the other a portion or all of the display characters (or their equivalent such as the authentication characters 196 ), some transform of the display characters, and/or a portion or all of the next set of display characters (which may also be transformed), for example.
  • the issuer might offer a direct validation service to merchants. The issuer could then do as much of the authentication processing as desired. Further, it would place the issuer in a position to check passwords or take a voice sample, or perform various other authentication, as may be desired. Further, the issuer might use ciphertext(3:5) instead of CVV2 in transaction information that was sent with the charge. It is noted the reported track 2 data may be used to capture two or so digits of low order counter in discretionary data fields.
  • CVV2 was a variable one and validate accordingly, i.e., either searching the next several counter values for the customer, or using the discretionary data fields to reduce the amount of crypto to be done, e.g. reduce the need to roll ahead in search of a match.
  • the card may be inserted, and read by the ATM.
  • the card would then be ejected and the customer enters the value of counter low digits, checks that the right ciphertext is displayed by the ATM (i.e., the display character sequence as described above), and only then enters her PIN and/or other ciphertext, as may be desired.
  • This processing would convey the customer had some reason to think the ATM was communicating with the issuer before giving his PIN.
  • the system uses different digits of ciphertext to authenticate to the customer that he is talking to the bank first, then to authenticate to the bank that the customer is who he claims to be. That is, the process checks that the card's identity is real. Tying the card to the customer requires asking for another password/PIN, or sampling voice, or the like. It might be that voice or a PIN recognition measures are required for higher value transactions, and not for low value ones.
  • the customer may be asked for the low digits of the counter and the ciphertext (at least one of the sets).
  • Either a Bank authentication service could be called with this information and the card number/customer name, or the low digits could be passed in discretionary characters in Track 2 of card image data.
  • CVV2 discretionary characters in Track 2 of card image data.
  • Merchants knowing the variable number matched would be assured it would be less likely chargebacks could occur because the authentication was stronger.
  • the invention would exist on every credit card, and the only area needing change would be the issuer backend, i.e., the routine that checks CVV2. Such backend would know or compute the diversified key on the card, and track and encrypt the card counter and verify the ciphertext. Accordingly, processing change would be negligible.
  • non-numeric indicia might be used along with, or in lieu of, the numerics described above, as may be desired. That is any symbol, graphic, picture, or other information representation, for example, might be used in lieu of, or along with, the numerics discussed above, as may be desired.
  • a constant value i.e., a constant: number, symbol, graphic, picture, or other information representation, for example
  • a variable value i.e., a constant: number, symbol, graphic, picture, or other information representation, for example
  • FIGS. 1-4 and 10 show embodiments of structure and system of the invention. Further, FIGS. 5-10 show various steps in accordance with one embodiment of the invention. It is appreciated that the systems and methods described herein may be implemented using a variety of technologies. Hereinafter, general aspects regarding possible implementation of the systems and methods of the invention will be described.
  • the system of the invention may be in the form of a “processing machine,” such as a general purpose computer, for example.
  • processing machine is to be understood to include at least one processor that uses at least one memory.
  • the at least one memory stores a set of instructions.
  • the instructions may be either permanently or temporarily stored in the memory or memories of the processing machine.
  • the processor executes the instructions that are stored in the memory or memories in order to process data.
  • the set of instructions may include various instructions that perform a particular task or tasks, such as those tasks described above in the flowcharts. Such a set of instructions for performing a particular task may be characterized as a program, software program, or simply software.
  • the processing machine executes the instructions that are stored in the memory or memories to process data.
  • This processing of data may be in response to commands by a user or users of the processing machine, in response to previous processing, in response to a request by another processing machine and/or any other input, for example.
  • the processing machine used to implement the invention may be a general purpose computer.
  • the processing machine described above may also utilize any of a wide variety of other technologies including a special purpose computer, a computer system including a microcomputer, mini-computer or mainframe for example, a programmed microprocessor, a micro-controller, a peripheral integrated circuit element, a CSIC (Customer Specific Integrated Circuit) or ASIC (Application Specific Integrated Circuit) or other integrated circuit, a logic circuit, a digital signal processor, a programmable logic device such as a FPGA, PLD, PLA or PAL, or any other device or arrangement of devices that is capable of implementing the steps of the process of the invention.
  • a special purpose computer a computer system including a microcomputer, mini-computer or mainframe for example, a programmed microprocessor, a micro-controller, a peripheral integrated circuit element, a CSIC (Customer Specific Integrated Circuit) or ASIC (Application Specific Integrated Circuit) or other integrated circuit, a logic circuit, a digital signal
  • each of the processors and/or the memories of the processing machine may be located in geographically distinct locations and connected so as to communicate in any suitable manner.
  • each of the processor and/or the memory may be composed of different physical pieces of equipment. Accordingly, it is not necessary that the processor be one single piece of equipment in one location and that the memory be another single piece of equipment in another location. That is, it is contemplated that the processor may be two pieces of equipment in two different physical locations. The two distinct pieces of equipment may be connected in any suitable manner. Additionally, the memory may include two or more portions of memory in two or more physical locations.
  • processing as described above is performed by various components and various memories.
  • the processing performed by two distinct components as described above may, in accordance with a further embodiment of the invention, be performed by a single component.
  • the processing performed by one distinct component as described above may be performed by two distinct components.
  • the memory storage performed by two distinct memory portions as described above may, in accordance with a further embodiment of the invention, be performed by a single memory portion.
  • the memory storage performed by one distinct memory portion as described above may be performed by two memory portions.
  • various technologies may be used to provide communication between the various processors and/or memories, as well as to allow the processors and/or the memories of the invention to communicate with any other entity; i.e., so as to obtain further instructions or to access and use remote memory stores, for example.
  • Such technologies used to provide such communication might include a network, the Internet, intranet, Extranet, LAN, an Ethernet, or any client server system that provides communication, for example.
  • Such communications technologies may use any suitable protocol such as TCP/IP, UDP, or OSI, for example.
  • the set of instructions may be in the form of a program or software.
  • the software may be in the form of system software or application software, for example.
  • the software might also be in the form of a collection of separate programs, a program module within a larger program, or a portion of a program module, for example
  • the software used might also include modular programming in the form of object oriented programming.
  • the software tells the processing machine what to do with the data being processed.
  • the instructions or set of instructions used in the implementation and operation of the invention may be in a suitable form such that the processing machine may read the instructions.
  • the instructions that form a program may be in the form of a suitable programming language, which is converted to machine language or object code to allow the processor or processors to read the instructions. That is, written lines of programming code or source code, in a particular programming language, are converted to machine language using a compiler, assembler or interpreter.
  • the machine language is binary coded machine instructions that are specific to a particular type of processing machine, i.e., to a particular type of computer, for example. The computer understands the machine language.
  • any suitable programming language may be used in accordance with the various embodiments of the invention.
  • the programming language used may include assembly language, Ada, APL, Basic, C, C++, COBOL, dBase, Forth, Fortran, Java, Modula-2, Pascal, Prolog, REXX, Visual Basic, and/or JavaScript, for example.
  • assembly language Ada
  • APL APL
  • Basic Basic
  • C C
  • C++ C++
  • COBOL COBOL
  • dBase Forth
  • Fortran Fortran
  • Java Modula-2
  • Pascal Pascal
  • Prolog Prolog
  • REXX REXX
  • Visual Basic Visual Basic
  • JavaScript JavaScript
  • instructions and/or data used in the practice of the invention may utilize any compression or encryption technique or algorithm, as may be desired.
  • An encryption module might be used to encrypt data.
  • files or other data may be decrypted using a suitable decryption module, for example.
  • the invention may illustratively be embodied in the form of a processing machine, including a computer or computer system, for example, that includes at least one memory.
  • the set of instructions i.e., the software for example, that enables the computer operating system to perform the operations described above may be contained on any of a wide variety of media or medium, as desired.
  • the data that is processed by the set of instructions might also be contained on any of a wide variety of media or medium. That is, the particular medium, i.e., the memory in the processing machine, utilized to hold the set of instructions and/or the data used in the invention may take on any of a variety of physical forms or transmissions, for example.
  • the medium may be in the form of paper, paper transparencies, a compact disk, a DVD, an integrated circuit, a hard disk, a floppy disk, an optical disk, a magnetic tape, a RAM, a ROM, a PROM, a EPROM, a wire, a cable, a fiber, communications channel, a satellite transmissions or other remote transmission, as well as any other medium or source of data that may be read by the processors of the invention.
  • the memory or memories used in the processing machine that implements the invention may be in any of a wide variety of forms to allow the memory to hold instructions, data, or other information, as is desired.
  • the memory might be in the form of a database to hold data.
  • the database might use any desired arrangement of files such as a flat file arrangement or a relational database arrangement, for example.
  • a user interface includes any hardware, software, or combination of hardware and software used by the processing machine that allows a user to interact with the processing machine.
  • a user interface may be in the form of a dialogue screen for example.
  • a user interface may also include any of a mouse, touch screen, keyboard, voice reader, voice recognizer, dialogue screen, menu box, list, checkbox, toggle switch, a pushbutton or any other device that allows a user to receive information regarding the operation of the processing machine as it processes a set of instructions and/or provide the processing machine with information.
  • the user interface is any device that provides communication between a user and a processing machine.
  • the information provided by the user to the processing machine through the user interface may be in the form of a command, a selection of data, or some other input, for example.
  • a user interface is utilized by the processing machine that performs a set of instructions such that the processing machine processes data for a user.
  • the user interface is typically used by the processing machine for interacting with a user either to convey information or receive information from the user.
  • the user interface of the invention might interact, i.e., convey and receive information, with another processing machine, rather than a human user. Accordingly, the other processing machine might be characterized as a user.
  • a user interface utilized in the system and method of the invention may interact partially with another processing machine or processing machines, while also interacting partially with a human user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides an authentication system and method. In particular, the invention provides a method for performing a financial authentication utilizing a token associated with a user, the method comprising the token generating a set of display characters that are viewable by the user, the token generating the display characters using logic; the user transforming a portion of the set of display characters using a transformation process, based on knowledge of the user, so as to form a display character sequence; the user outputting the display character sequence to an authentication entity; and the authentication entity authenticating the display character sequence using the logic and knowledge of the transformation.

Description

    CROSS REFERENCE TO PROVISIONAL APPLICATIONS
  • This application is a Continuation-in-Part (CIP) application of U.S. patent application Ser. No. 10/419,107 filed Apr. 21, 2003 (Attorney Docket No. 47004.000204), which is a Continuation-in-Part (CIP) application of U.S. patent application Ser. No. 10/105,471 filed Mar. 25, 2002, both of which are incorporated into the present application in their entirety.
  • The subject matter of this application is related to the subject matter of U.S. Provisional Application Ser. No. 60/646,622 filed Jan. 26, 2005 (Attorney Docket No. 47004.000322), assigned or under obligation of assignment to the same entity as this application, from which application priority is claimed for the present application. The subject matter of this application is also related to the subject matter of U.S. Provisional Application Ser. No. 60/661,488 filed Mar. 15, 2005 (Attorney Docket No. 47004.000322), assigned or under obligation of assignment to the same entity as this application, from which application priority is claimed for the present application. Provisional application U.S. Ser. No. 60/646,622 and Provisional application U.S. Ser. No. 60/661,488 are both incorporated herein by reference in their entirety.
  • BACKGROUND OF THE INVENTION
  • Authenticating people, particularly remotely, has been a difficult operation to make resistant to attack. Since single authenticating techniques are vulnerable to theft, it has become attractive to various groups to devise ways to do multi factor authentication, where more than one of (something you have, something you know, something you are) is used in demonstrating the identity of a person whose identity is to be established.
  • Typically, doing this has involved using relatively complex or expensive devices such as cards with keyboards on them (where you authenticate to the card and then use it), fingerprint readers, or digital certificates requiring public/private encryption to validate the presenter is in possession both of a password and of a private key.
  • All this complexity has delayed widespread use of such systems, since the cost of giving out hundreds of millions of copies of them has been kept high by the need to authenticate two or more things, and the cost of building the system components.
  • SUMMARY AND BRIEF DESCRIPTION OF THE INVENTION
  • The invention provides an authentication system and method. In particular, the invention provides a method for performing a financial authentication utilizing a token associated with a user, the method comprising the token generating a set of display characters that are viewable by the user, the token generating the display characters using logic; the user transforming a portion of the set of display characters using a transformation process, based on knowledge of the user, so as to form a display character sequence; the user outputting the display character sequence to an authentication entity; and the authentication entity authenticating the display character sequence using the logic and knowledge of the transformation.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention can be more fully understood by reading the following detailed description together with the accompanying drawings, in which any like reference indicators are used to designate like elements, and in which:
  • FIG. 1 is a diagram showing aspects of an encryption process in accordance with one embodiment of the invention;
  • FIG. 2 is a flowchart showing further aspects of the encryption process in accordance with one embodiment of the invention;
  • FIG. 3 is a block diagram showing an authentication system in accordance with one embodiment of the invention;
  • FIG. 4 is a block diagram showing further details of an authentication system, and in particular the authentication entity system, in accordance with one embodiment of the invention;
  • FIG. 5 is a diagram showing processing associated with display characters in accordance with one embodiment of the invention;
  • FIG. 6 is a high level flowchart showing an authentication process in accordance with one embodiment of the invention;
  • FIG. 7 is a flowchart showing further details of the “customer generates authentication information” step of FIG. 6 in accordance with one embodiment of the invention;
  • FIG. 8 is a flowchart showing in further detail the “authentication entity system authenticates the billing information, including authenticating the display character sequence” step of FIG. 6 in accordance with one embodiment of the invention;
  • FIG. 9 is a flowchart showing in further detail the “authenticator character generating portion generates an authorizing character sequence based on the authentication characters” step of FIG. 8 in accordance with one embodiment of the invention;
  • FIG. 10 is a flowchart showing in further detail the “display character sequence is compared to the authorizing character sequence” step of FIG. 8 in accordance with one embodiment of the invention; and
  • FIG. 11 is a diagram showing further aspects of an encryption process relating to a purchase amount in accordance with one embodiment of the invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Hereinafter, various aspects of embodiments of the invention will be described. As used herein, any term in the singular may be interpreted to be in the plural, and alternatively, any term in the plural may be interpreted to be in the singular.
  • What is proposed here is a system and method which provides a form of two factor authentication which resists theft of the authentication tokens even by someone who can intercept the authentication messages in total, in accordance with one embodiment of the invention. The invention can be supported using relatively very simple hardware.
  • One embodiment uses a token which displays numbers that change (either with time or with uses, but in ways that cannot be easily predicted by observation) but whose values can be tracked and predicted by an authenticating authority (who issued the tokens generally). In accordance with one embodiment of the invention, the token will display a set of numbers which will have their positions labeled (e.g., 1 through 6, for a 6 digit display). FIG. 1 is a diagram illustrating such a token 100.
  • In accordance with one embodiment of the invention, a customer will be told ahead of time, “choose three positions of the display 10, as shown in FIG. 1, you will select in order, and remember the positions and order you picked.” The customer authenticates by getting his token to display a new set of numbers (which should change so that their values are effectively unpredictable), and then to report the values in the three positions he chose and told the authenticating authority about earlier.
  • FIG. 1 shows the display of the token 100 in an “off” position. Once the customer activates the display in some manner, i.e., pushes a button, the token is turned on, and numbers are seen on the display. Thus, as shown in FIG. 1, suppose the display 10 reads: and the customer decided to report position 5, 1, and 4 in that order. The customer would then transmit the 5th, 1st, and 4th digits in order: 2 5 9
  • Note that this authenticates the customer as an individual since the customer demonstrates that he knows the pattern registered earlier, but also it shows the customer has the token he was given. Thus, at a stroke he has provided a two factor authenticator. Note too that someone who can see the digits sent cannot replay them usefully. That person does not know the pattern, nor does she have the token, and she must have both to use the token successfully.
  • In accordance with one embodiment of the invention, another set of labels may be provided under the display, like 01, 23; 45, 67, 89. In processing a transaction, the customer is asked, later in a transaction, to encode a few digits of the transaction amount as positions of the display, and then requested to transmit the digits. This too can be easily verified by a payment processor (who has the amount as part of a payment record), and it shows that someone with the token agreed to the payment amount. In effect, this is a signing by the customer (who would have authenticated as an individual moments before with the same token) of the transaction amount. Similarly, any external observer will be unable to deduce any of this from the digits transmitted. The customer may be told what the purchase amount is. Accordingly, for example, if the customer is told the purchase amount was $872.00, the customer would report the characters shown in the position five, position five and position two, i.e., if the display was labeled 0, 1-2, 3-4, 5-6, 7-8, 9.
  • In further illustration, FIG. 11 shows a token 30 so labeled. In this example, the displayed number is 5 3 7 9 2 1. Accordingly, with a purchase amount of $872, the customer would report the displayed numbers in the positions, 5, 5, 2, i.e., the customer would report the numbers 2 2 3. In this manner, an authentication entity can confirm that the customer indeed knows what the customer is agreeing to, e.g., a dollar amount. It is appreciated that such processing adds complexity, but may be desired in some circumstances, e.g., in high dollar transactions. To reduce the complexity, a prompt screen might be provided to the customer so as to take them through the process, e.g., a window on a web page.
  • It is appreciated that an alternative data manipulation that can be done by the user-customer could be used here instead of the pattern selection described above. That is, the customer does need to manipulate the displayed numbers in some manner known to him (and the authenticating authority) so as to generate an output from such manipulation. However, the selection scheme described above may be desirable since it appears easy to use and remember by the customer
  • In implementation of the invention, it is not needed that numbers be used on the display. That is, any of a wide variety of graphics, letters, symbols, glyphs, runes, images or other indicia, for example, might be used in lieu (or in combination) with numbers.
  • It should be appreciated that the various features of the present invention may be used in conjunction with other encryption technology and/or features. In particular, the various features of the present invention may be used in combination with any of the features described in U.S. patent application Ser. No. 10/419,107 filed Apr. 21, 2003 (attorney docket number 47004.000204), which is incorporated herein by reference in its entirety.
  • In explanation of further aspects, in accordance with one embodiment of the invention, the problem being addressed is in the area of authentication. Authentication of customers to a bank is vital since the entire business is involved with caring for other peoples' money and using it per their instructions. If the owners cannot be identified, their instructions cannot be followed and the business collapses. When trying to identify people over computer links, this is harder than otherwise. One of the major issues is that spyware and other man in the middle attacks on information passed for authentication are very common. By providing people with a token that can produce an effectively random number which an authority can compute as well, anytime it is needed, people might be able to prove clearly that they have the token. Unfortunately, theft of tokens (even from the mails) is also common. It is desirable in addition to know for high value transactions that one is dealing with the person who claims to be dealing with you rather than knowing only that whoever you are dealing with has the person's token. Moreover, while it is common practice just to ask for another password or PIN (personal identification number), these are all too easily intercepted. The proposed scheme here solves those problems.
  • Hereinafter, the invention will be described from a further perspective, in accordance with one embodiment. Given that two parties who must authenticate one to the other both have means to generate an effectively random number (which means it is computationally infeasible to compute the next such number from the prior ones without a secret shared by the two) which can nevertheless be generated by both and tracked so that the one doing the authentication can (1) figure out the value the other one has, (2) find some transformation of the number or part of it which can be easily done by hand, and (3) have both parties agree to this transform (which can be thought of as a simple encryption) ahead of time. Now when the one not doing the authentication needs to authenticate the other, make sure they have generated a “random” number and have the one being authenticated perform the agreed on operation and report the value thereof. This may be as simple as picking an order in which to report several of the digits of the random number, as described above. Then, the one doing the authentication performs the same transform on his copy of the random number and checks if the value is correct. Note that anyone observing the numbers picked will see only the random numbers, not the secret method by which they were produced, and thus will have nothing very useful in attempting a replay or PIN theft.
  • To explain further, the ideas of doing a second encryption, and that of permuting numbers or using a Caesar cipher, are old. However, the scheme here, because it is used with effectively random numbers, is much stronger than a permutation or Caesar cipher or other hand encryption method because of the absence of usable order in the material being encoded. An attacker must solve a cipher on a “plaintext” random number which in general is generated every time needed and used once. This makes it exceedingly difficult for a man in the middle to steal the person's authentication. Also, whatever token system is used to provide the pseudo random numbers and track them or synchronize them needs no additional complexity. This makes the scheme more cost effective than systems using conventional passwords or PINs, digital certificates, and other such complexities.
  • FIG. 2 is a flowchart in accordance with one embodiment of the invention. As shown, the present invention provides a novel way to authenticate a customer or other person.
  • The invention might be compared to a known one-time pad. One time pad cryptography is usually illustrated with the pad values being XORed with data. In effect, embodiments of the invention perform an encryption hand operation on display characters displayed by a token. As shown in the example of FIG. 2, if the “random number” choices are changed appropriately, we could produce 3 digit outputs from 000 to 999, i.e., the entire range possible. This means we may have no test possible to pick the correct key as an observer in the middle. This makes the operation the user undertakes (which might be the illustrated permutation or anything else convenient) far stronger than what the same operation on normal text might be. The user operation remains a simple one, but the fact that it operates on one time data which is effectively random makes it basically as strong as the randomness. Where the cipher and key are well chosen which may be used for computing the numbers to be synchronized the resulting ciphertext may be treated as random and the discussion above holds.
  • FIG. 3 is a block diagram showing an authentication system 100 in accordance with one embodiment of the invention. The authentication system 100 includes a user authentication device 120. The user authentication device 120 may be in the form of a token, for example. The user authentication device 120 provides the user with display characters (for example numbers) 192 (see FIG. 3) that are used by the user to effect an authentication, as discussed below.
  • As shown in FIG. 3, the user authentication device 120 includes a display character generating portion 124 and a display portion 130. The display portion 130 includes a plurality of display positions 138, i.e., display positions (131-136). Each display position 138 is a display, i.e., such as an LCD display, that displays a number, or any other character, so as to be visually observed by a user 110, in accordance with one embodiment of the invention.
  • The display character generating portion 124 generates the characters that are displayed in the display portion 130. In particular, the display character generating portion 124 uses predetermined logic (i.e., a suitable algorithm) to populate the display positions 138. This logic provides a predetermined progression of numbers, or other characters, that may be similarly generated by an authentication entity system 140.
  • In accordance with one embodiment of the invention, the user authentication device 120 has a button 121, which may be pressed by a user 110. Upon pressing the button 121, the display character generating portion 124 generates the characters that are displayed in the display portion 130. Accordingly, the user 110 interfaces with the user authentication device 120 using the button and visually, in accordance with one embodiment of the invention.
  • The user authentication device 120 further includes a device memory portion 126. The device memory portion 126 serves as a memory or database, as is needed to perform the various functions of the user authentication device 120.
  • As shown in FIG. 3, the authentication system 100 also includes an authentication entity system 140 and an illustrative merchant 180. Illustratively, the user 110 (using the user authentication device 120) interfaces with the merchant 180 so as effect a desired transaction. The transaction might be over the telephone, the Internet, or any other communication channel, as desired.
  • Accordingly, the systems and methods of embodiments of the invention may be used in any “transaction”, including a conveyance of information, in which authentication of a user is needed or desired. Such transaction might include a telephone transaction, Internet transaction (such as an Internet purchase), network transaction, infrared transaction, radio signal transaction, credit card transaction, debit card transaction, smart card transaction, ACH transaction, stock trade transaction, mutual fund transaction, swap, PAYPAL® transaction, BILL ME LATER® transaction, electronic funds transfer transaction, financial application transaction, an arrangement to set up payments to an entity, a verification, an ATM transaction, and/or a message, for example. For example, such a transaction might include a message from one human user to another human user, a human user communicating with an electronic device, and/or two electronic devices communicating with each other. The transaction may or may not be in a financial context, i.e., for example, the message might be authorizing the opening of a door or the transfer of a non-financial related message, for example.
  • Accordingly, FIG. 3 shows a communication channel 160 over which the transaction is performed. The communication channel 160 carries an authorization request 162. Subsequent to the request being processed by the authentication entity system 140, the communication channel 160 then carries an authorization 164, in the example of FIG. 3. However, it is of course appreciated that the authentication entity system 140 might alternatively not authorize the requested transaction. As shown in FIG. 3, the authorization request 162 and the provided authorization is passed through the merchant 180. However, in an alternative embodiment, the authorization request 162 and/or the authorization provided 164 might be communicated to the authentication entity system 140 in some other manner, such as by some third party, and not via the merchant 180. Further, it is appreciated that the user authentication device 120 need not take on the form of the device shown in FIGS. 1 and 3, for example. That is, for example, the user authentication device 120 might be in the form of a software program running on a computer, or in some other alternative form.
  • FIG. 4 is a block diagram showing further details of the authentication entity system 140. The authentication entity system 140 includes an input portion 142 and an entity memory portion 144. The input portion 142 interfaces with the communication channel 160 so as to communicate data, i.e., such as the authorization request 162 and the authorization provided 164 information. The entity memory portion 144 serves as a database to store various data associated with, and needed by, operation of the authentication entity system 140.
  • The authentication entity system 140 also includes an authenticating processing portion 150. The authenticating processing portion 150 performs the various processing of the authentication entity system 140. In particular, the authenticating processing portion 150 includes an authenticator character generating portion 152 and a comparison portion 154. The authenticator character generating portion 152 generates an authorizing character sequence 198 to be used to authenticate the transaction initiated by the user 110. In turn, the comparison portion 154 performs a comparison between the authorizing character sequence 198 (generated by the authenticator character generating portion 152) and the display character sequence 194 (provided by the user-customer).
  • FIG. 5 is a diagram showing further features in accordance with one embodiment of the invention. Specifically, FIG. 5 shows aspects of the generation and the manipulation of the display characters 192 (generated by the display character generating portion 124) and the authentication characters 196 (generated by the authenticator character generating portion 152). Both the portions (124, 152) use the same logic (i.e., random logic as described above) to generate sets of characters (192, 196) in some predetermined manner. That is, the display character generating portion 124 will generate the same characters as the authenticator character generating portion 152 in a progressive manner. As used herein, the generation of a new set of characters by the portions (124, 152) is characterized as generating the next “logic step”. To explain in other words, the display characters 192 associated with a particular logic step, will be the same as the authentication characters 196, if for the same logic step, in accordance with one embodiment of the invention. Thus, the particular logic step (that each of the display character generating portion 124 and the authenticator character generating portion 152 are at) will dictate the particular set of characters that are generated.
  • As described in detail herein, once the display characters 192 are generated on the user authentication device 120, the user observes only the particular display positions 138 that the user is assigned, i.e., the user might make this choice upon activation of the user authentication device 120. As described in the example above, the user might have picked the 1, 4 and 5 positions to be the selected positions (from which the user 110 actually uses the characters). The user 110 then orders the select display characters 192 in a predetermined manner. In particular, FIG. 1 described above shows an example of this ordering. Once the selected display characters are ordered, this results in a “display character sequence” 194, as used herein. It is this display character sequence 194 that is submitted to authenticate the desired transaction, in accordance with one embodiment of the invention in which ordering is used as the transformation to the display characters 192.
  • In a parallel manner to the user 110, the authentication entity system 140 generates authentication characters 196, selects particular authentication characters 196 as agreed upon with the customer, and then orders the selected authentication characters 196. In this manner, the authentication entity system 140 generates a sequence of characters (e.g. a number) that may be compared with the display character sequence 194 (submitted by the user/customer).
  • It is appreciated that the authentication entity system 140 may perform variations on the above processing methodology. That is, the authentication entity system 140 may not in fact generate all the authentication characters 196, but rather only the select authentication characters 196 that will indeed be used in the ordered set, which constitutes the authorizing character sequence 198. This approach might somewhat limit needed processing since the authentication entity system 140 is of course aware that only select characters in the authentication characters 196 will indeed be used. However, this approach would generally not be performed with the user authentication device 120, since the inclusion of all the display characters 192 (and subsequent disregarding of some of the display characters 192 by the user 110) is part of the encryption process.
  • In further explanation of the invention, FIG. 6 is a high level flowchart showing an authentication process in accordance with one embodiment of the invention. As shown in FIG. 6, the process starts in step 200. Then, in step 202 in this example, the customer initiates a transaction. In this example, the transaction is with a merchant. After step 202, the process passes to step 204.
  • In step 204, the merchant requests various information from the customer so as to process the transaction. Accordingly, in step 206, the customer enters item information, i.e., regarding the particular item that the customer is purchasing, and shipping information. It should of course be appreciated that the merchant may request, and the customer may enter, any of a variety of desired information. After step 206 of FIG. 6, the customer prepares billing information. Specifically, in step 210, the customer generates authentication information to accompany the customer's submission of other billing information. Further details of step 210 are described in conjunction with FIG. 7 below.
  • Then, in step 220 of FIG. 6, the customer enters the billing information including authentication information, i.e., including a display character sequence for use by an authentication entity system in authenticating the transaction. After step 220, the process passes to step 230 of FIG. 6.
  • In step 230, all the information (item, shipping, billing) that the customer has prepared is sent to the merchant. Then, in step 240, the merchant sends the authentication information on to the authentication entity system, i.e., for authentication of the transaction that the customer is requesting the merchant to process. Then in step 250, the authentication entity system authenticates the billing information, including authenticating the display character sequence that the customer has provided. Further details of step 250 are described below with reference to FIG. 8.
  • After step 250 of FIG. 6, the process passes to step 280. In step 280, the authentication entity system sends authorization, or alternatively denial, of the transaction back to the merchant. Then, the process passes to step 282. In step 282, the merchant authorizes the transaction if the authentication entity system authenticated the display character sequence. It is appreciated that other authentication processing may accompany the authentication of the customer's display character sequence, i.e., such as authentication of a personal identification number (PIN). That is, in general, the systems and methods of the invention as described herein may be used in conjunction with other security/authentication measures or technologies.
  • After step 282 of FIG. 6, the process passes to step 284. In step 284, the process of FIG. 6 ends.
  • FIG. 7 is a flowchart showing further details of the “customer generates authentication information” step 210 of FIG. 6 in accordance with one embodiment of the invention. The subprocess of FIG. 7 starts in step 210 and passes to step 212. In step 212, the customer pushes a button on the user authentication device, which the customer has been provided. In response to the customer pushing the button, or in some other manner interfacing with the user authentication device, in step 214, the user authentication device advances to a next number sequence based on logic contained in the user authentication device (i.e., the user authentication device 120 displays information associated with the next “logic step” as described above). This logic may be in the form of an algorithm that generates a plurality of display characters in some predetermined manner, i.e., in a manner that an authentication entity system 140 may perform a generation of the same numbers based on the same logic.
  • Accordingly, in step 215 of FIG. 7, the user authentication device displays a number sequence on the display portion, i.e., one number for each display position. However, it is of course appreciated that the invention is not limited to the use of numbers. That is, any suitable character or other indicia might be used in lieu of or in conjunction with numbers.
  • Then, in step 216, the customer recalls the particular positions that the user is assigned. That is, out of six display positions, the customer only uses three numbers (associated with three display positions) so as to generate a display character sequence. In step 216, the customer further reads the numbers from those particular assigned positions in a particular assigned order. Accordingly, in step 218, the customer now has a display character sequence to include in the billing information.
  • After step 218, the process passes to step 219 of FIG. 7. In step 219, the process returns to step 220 of FIG. 6.
  • FIG. 8 is a flowchart showing in further detail the “authentication entity system authenticates the billing information, including authenticating the display character sequence” step 250 of FIG. 6 in accordance with one embodiment of the invention. The subprocess of FIG. 8 starts in step 250 and passes to step 252.
  • In step 252 of FIG. 8, the authentication entity system inputs the billing information, including the display character sequence from the customer. Then, in step 253, the authenticator character generating portion (in the authentication entity system) advances to the next logic step, i.e., in parallel to the user authentication device 120. That is, the authenticator character generating portion generates authentication characters based on the same logic as is implemented in the user authentication device. It should be appreciated that some synchronization feature may be used to coordinate the particular step in logic, i.e., in generating the next logic step. After step 253 of FIG. 8, the process passes to step 254.
  • In step 254, the authenticator character generating portion in the authentication entity system generates an authorizing character sequence based on the authentication characters. Further details of step 254 are discussed below with reference to FIG. 9. Then, in step 256 of FIG. 8, the display character sequence is compared to the authorizing character sequence. Further details of step 256 are discussed below with reference to FIG. 10. After step 256, the process passes to step 258.
  • In step 258 of FIG. 8, based on a match or no match, the authentication entity system determines if authorization should be given. Then in step 259 of FIG. 8, the subprocess of FIG. 8 returns to step 280 of FIG. 6.
  • FIG. 9 is a flowchart showing in further detail the “authenticator character generating portion generates an authorizing character sequence based on the authentication characters” step 254 of FIG. 8 in accordance with one embodiment of the invention. In this illustrative subprocess, after starting in step 254 of FIG. 9, the subprocess passes to step 262. In step 262, the authenticator character generating portion retrieves information regarding particular fixed positions that the user is assigned. Then, the process passes to step 264.
  • In step 264, the authenticator character generating portion retrieves the authentication characters disposed in such particular fixed positions. This processing is in parallel to the selection of numbers (from the display positions) as is performed by the customer. The, in step 266, the authenticator character generating portion orders the retrieved authentication characters using an order that the user is assigned. As a result, the authenticator character generating portion generates an “authorizing character sequence”, which is to be compared with the “display character sequence” that is provided by the user. As shown in FIG. 9, other transformation processes might be used in lieu of ordering select characters. That is, any suitable transformation, e.g. such as ordering or adding a value of one, might be used to convert a plurality of selected characters (shown on the token display) to a display character sequence.
  • Thus, as otherwise noted herein, it is appreciated that some other transformation might be used in lieu of the ordering of the display characters 192. For example, numbers might be added, some mathematical transformation may be applied, and/or the same number might be used twice, for example, as well as other variations described herein.
  • After step 266 of FIG. 9, the process passes to step 268. In step 268, the subprocess of FIG. 9 returns to step 256 of FIG. 8.
  • FIG. 10 is a flowchart showing in further detail the “display character sequence is compared to the authorizing character sequence” step 256 of FIG. 8 in accordance with one embodiment of the invention. After starting in step 256 of FIG. 10, the subprocess passes to step 272.
  • In step 272, the authentication entity comparison portion compares: the authorizing character sequence versus the display character sequence (obtained from the customer). After step 272, the process passes to step 274. In step 274, the comparison portion considers any variation between the authorizing character sequence versus the display character sequence based on predetermined thresholds.
  • In other words, it might be the situation that the display character sequence does not exactly match the authorizing character sequence. However, if the variation is limited, then the variation might be acceptable so that the authentication entity system will still authenticate the transaction. The particulars of what is acceptable and what is not acceptable variation may be based on thresholds, as is desired.
  • After step 274 of FIG. 10, the process passes to step 276. In step 276, the comparison portion outputs data regarding match or no match back to the merchant. As a result, the merchant will process or not process the desired transaction. Then, in step 278 of FIG. 10, the process returns to step 258 of FIG. 8. Processing then continues as described above with reference to FIG. 8.
  • In summary, in accordance with one embodiment of the invention, the scheme described herein uses the idea of a remote token synchronized with or tracked with a central authentication database, and uses a cipher as the secret to authenticate the user. The use of the cipher, which may typically be relatively simple, together with the remote token system provides a novel combination in accordance with one embodiment of the invention.
  • In accordance with embodiments of the invention, the method described herein may be implemented in innumerable different ways, i.e., such as picking different simple ciphers. But there must be local and remote effectively random numbers, in accordance with one embodiment of the invention, so that a simple operation on the numbers can be computed by a person and used to authenticate that the person is the right person to be using the token, rather than simply confirming that the toke is correct.
  • In summary, the invention relates to the notion of using second encryption with a token that generates changing numbers, so that the second encryption embeds or combines additional information with the token's number, so that authentication depends on both. The additional information might be a pattern or other information remembered by an individual, some parameter (like amount) of a payment or transaction, or any other information it is desired to verify.
  • The invention further relates to the notion of combining information in such a way that someone who can figure what the token will be generating might use it to reconstruct some information remotely, with no fear of the information being intercepted by man in the middle attacks. For example, this functionality is discussed above in conjunction with using a purchase amount to generate a display character sequence, i.e., using the purchase amount and matching digits (of the purchase amount) with labels under the display positions.
  • As discussed above, the authentication entity system 140 authenticates a display character sequence that is provided by the customer. In accordance with one embodiment of the invention, the authentication entity system 140 does not allow multiple submissions of a display character sequence. To explain, the multiple submission checking portion 156 (of the authentication entity system 140) may perform a check on a newly submitted display character sequence. This check determines whether the particular display character sequence has been previously submitted, e.g., previously submitted in a particular period of time. If the multiple submission checking portion 156 determines that the particular display character sequence has been previously submitted, the authenticating processing portion 150 will not authenticate the display character sequence. For example, this might occur in the situation when a customer fails to press button 121 (on the user authentication device 120) to generate a new number sequence. That is, a repeat display character sequence (based on the repeat number sequence) will not be authenticated. The check for multiple display character sequences provides a further fraud prevention measure. To effect such checking, it should of course be appreciated that the authenticating processing portion 150 may be provided with the ability to keep track of which display character sequences have been observed.
  • As described above, in accordance with one embodiment of the invention, the customer pushes a button on the user authentication device 120 and a number sequence is displayed. From the number sequence, the customer selects characters to form the display character sequence. It is appreciated that if the number sequence is all fives, i.e., 5 5 5 5 5 5 (or even 2 2 2 2 4 4), then the particular order that the user has selected will be irrelevant. For this reason, the content of the number sequence displayed on the user authentication device 120 may want to be controlled, i.e., so as to avoid excessive repeat of numbers or other characters.
  • In accordance with a further aspect of the invention, it is appreciated that it may be needed to synchronize the user authentication device 120 with the authenticating processing portion 150. For example, it might be the situation that the user authentication device 120 has been exposed to multiple presses of the button (e.g., by a child). If the authenticating processing portion 150 receives a display character sequence that does not match with the next generated authorizing character sequence, the authenticating processing portion 150 may “run ahead.” That is, the authenticating processing portion 150 may run ahead with the authorizing character sequences assuming that there have been presses of the button 121 which were not submitted to the authentication entity system 140. The authenticating processing portion 150 may run ahead some predetermined number of times, until it finds a match, or alternately it reaches the predetermined number of times and concludes the display character sequence should not be authenticated.
  • Other approaches may be used to synchronize the user authentication device 120 to the authenticating processing portion 150. For example, all the display characters (displayed on the user authentication device 120) may be provided to the authenticating processing portion 150 (in the order that the characters are displayed) so as to perform synchronization. That is, given all the display characters in the displayed order, the authenticating processing portion 150 can then determine the correct point in the progression of the authentication characters.
  • Alternatively, the customer may provide two sets of display characters or two sets of display character sequences. These two sets, for example, might then be used by the authenticating processing portion 150 to synchronize with the user authentication device 120. i.e., based on the two sets of display characters, the authenticating processing portion 150 could determine where in the progression the user authentication device 120 is disposed.
  • In accordance with one embodiment of the invention, the user authentication device 120 may be used in multiple manners. For example, a customer may use the authentication device 120 to generate the display character sequence as described above, i.e., by selecting the display characters in a particular order. Such use may be implemented for Internet transactions, for example. However, in one embodiment, the same user authentication device 120 may also be used by submitting all the display characters to the merchant (and in turn the authenticating processing portion 150). A higher exchange rate may be applied to the second use as compared with the exchange rate applied to the first use. For example, such differential in exchange rate might be applied since the second use bears higher risk than the first use. Illustratively, the second use might occur in a situation in which the user authentication device 120 is used in a restaurant, and a person other than the customer is effecting the transaction.
  • In accordance with a further embodiment of the invention, a single token may be given to a family, or provided to be used in some other situation in which multiple persons will use the same token, i.e., the same user authentication device 120. In this situation, the user authentication device 120 will proceed through a progression of display characters, i.e., upon presses of the button 121. However, different users of the user authentication device 120 will be assigned different display positions to read characters, as well as a different order in which to place those observed characters. Accordingly, for example, if a brother were provided the display character sequence of FIG. 1, the brother will give the 2 5 9 number as shown in FIG. 1. However, if the sister were given the same 5 3 7 9 2 1 display number, the sister might be assigned [position 5] [position 4] [position 1], i.e., and thus her display character sequence would be 2 9 5. Such embodiment allows different persons to collectively use the same user authentication device 120, while documenting which person used the user authentication device 120 for which transaction. In other words, each persons might be assigned there own display character sequence. Alternatively, it is of course appreciated that multiple tokens may be used in a single household.
  • Further, in accordance with one embodiment of the invention, the same person might use the same user authentication device 120, but be assigned different display character sequences for different uses of the user authentication device 120. For example, given a display number of 5 3 7 9 2 1, the single user may be assigned ([position 5] [position 4] [position 1] (display character sequence would be 2 9 5)) for effecting financial transaction versus ([position 5][position 1] [position 4] (display character sequence would be 2 5 6)) for opening their garage door.
  • Relatedly, it is of course appreciated that the systems and methods of the invention as described herein may be used for any of a variety of situations that an authentication procedure is required. For example, the invention may be used for effecting financial transactions, accessing information, opening doors, controlling access to devices (e.g. access to a computer) and/or other situations where an authentication procedure is needed. In particular the invention may be used to prevent fraud in high risk and/or high value transactions, e.g., Internet, telephone and ATM transactions. It is also to be appreciated that the reduced risk of fraud associated with using the invention might typically result in a lower interchange fee, as compared to financial transactions using other known authentication methods.
  • Further, it is appreciated that the authentication device 120 may take any of a variety of forms and/or be combined with other devices. For example, the user authentication device 120 may be used or combined with a cellular phone, a PDA, an RFID device, and/or other devices. For example, it should be appreciated that the display character sequence, as described herein, may be used in the place of a traditional PIN (personal identification number). Accordingly, the display character sequence might be used in an ATM transaction. Such might be used to prevent ATM Fraud.
  • Hereinafter, various embodiments and aspects of embodiments will be described.
  • In one embodiment, the invention herein described is a method by which token authentication can be incorporated in payment systems with very minor changes at issuer sites and using mainly existing merchant facilities. The method may use a token which will generate a display of numbers which changes either with time or with uses—and whose values are unpredictable to the external observer who has not complete information about the internal (hidden) mechanisms, i.e., processing.
  • One aspect of the invention is the use of the display of such a token or the use of a function or selection from that display (the selection or function being done by the customer as something he remembers) as an authenticator reported instead of the existing CVV2 or CVC2 (or equivalent for other card brands) card authenticator string. The CVV2 field is normally printed on the back of payment cards and is often asked for in phone or net transactions. Its value is checked mainly by the card issuer. The checking routine described herein can easily be adapted to check the correctness of the token-derived numbers for that particular token. Accordingly, this field is already present, it is already handled by payment networks. Thus, the use of the display character sequence (in lieu of the CVV2 or CVC2) presents few problems either for merchant expense or network changes and only very minor expense for the issuer.
  • As noted above, a further aspect relating to one embodiment of the invention is the use of a token display in place of PIN values. Facilities for entering PIN values already are widespread anywhere payment cards exist, and a replacement for a PIN value where the replacement changes (and especially one which depends on the token the customer has and on the selection pattern he knows) gives a much stronger authentication of the customer than a fixed PIN. Using this replacement may require no new network or merchant changes, and as PINs are checked by issuer only, the changes to issuer system would be basically limited to the PIN validation routines, which are well known and can be readily added to, i.e., so that issuer would validate the display character sequence, as opposed to a PIN.
  • Accordingly, in summary, it is noted that the display from a token with a display of variable numbers, or a function or permutation or selection from that display, may be used as an authenticator instead of CVV2 or CVC2 in credit card processing. Further, the display from such a card, or a permutation or selection from such a display, might be used instead of a PIN in card transactions or the logical equivalent thereof.
  • As described above, when a customer pushes the button on the token, e.g., the button 121 on the user authentication device 120, the display will show some numbers. In one embodiment, two digits display the least significant digits of an internal counter and 3 to 6 digits (preferably 6) display part of the result of encrypting the internal counter using an encryption key which is hidden within the card, and which may different for every card, i.e., the key should be different enough that anyone analyzing the innards of a card cannot compute the key for a different card even though he may know the complete keys of several other cards. Values may be supplied for these “diversified keys”. In one embodiment, the encryption algorithm used may be a “strong” crypto algorithm, as strong as triple DES or better, but may depend on the particular use.
  • In one embodiment, when the button 121 is pressed, the idea is that the internal counter increments, and the Bank tracks its value, with the aid of the 2 digit low order display. It may be acceptable if the display is in octal radix instead of decimal if cost effective. The display needs to be visible either while the button is pressed, or for an interval after the button is pressed, so that the customer has at least 30 seconds (and preferably longer) to refer to it as he may need to compare it to other displays or transcribe it or recite it over the phone. The button must of course be very well debounced, and could well be used to e.g. drive a one-shot multivibrator so that it could be impossible to increment the counter more than once a minute. Something may be provided to ensure that the counter will increment by one only and not by large counts, i.e., even if the button is electrically noisy.
  • In one embodiment, the device may live for the 2-3 years that a credit card is issued for. Thus the power supply must suffice for this and for the expected number of uses the device will have. It may be preferable, in particular from a marketing perspective to have the device housed in a credit card. As noted herein, the incorporation of RFID functions may also be used.
  • In accordance with one embodiment of the invention, the invention authenticates a bank to a customers. On web pages we will want to assure customers they are talking to the real bank. Therefore we can ask them for the 2 digit counter display they see on pushing their button, and using our tracking data predict the internal counter value. By encrypting that with the card's key (we may have to ask for customer name or account number too), we can predict the display and tell the customer “your display will read nnnnnnnn if you are talking to the real bank. If not, hang up immediately and give no further information.”
  • In one embodiment, the token is authenticated to the bank. In this aspect of use of the inventive token, the bank asks a customer to push the button and read the display. The process includes using the 2 digit display (which may be positioned alongside the display characters) to help determine what the counter is and compute the display and see if they match. If they don't, it is possible to try to assume the counter might be 100 or 200 or more. Accordingly, a few more encryptions may be attempted to see if the token value provided by the customer is indeed OK. Accordingly, a 2 digit display may be used in addition to the display of FIG. 1 so as to assist in determining where the customer is disposed in the progression of the token displays, i.e., if the customer's kids have been playing with the token button.
  • In accordance with a further aspect of the invention, a process may authenticate the customer to the bank. As described above, each customer is requested to pick an order in which to report digits of the display. We can have the digits numbered in print on the cards to facilitate this. Then the customer pushes his button, reports digits in the order he said he would use. Thus if the display shows: and the customer said he would report digits in order 5, 1, 6, 3 (which he has to remember), he tells us the “77” part (if it is agreed upon for him to do so) and reports 3, 5, 9, 1 (the 5th, 1st, 6th, and 3rd digits of the random part). This relies on the token AND the customer memory. Also anyone in the middle who might be watching or recording what keys are pressed (remember lots of customer PCs have key loggers running) gets only random digits. Thus it doesn't matter if someone tries to record what the customer typed: it will change every time. Notice too that if the customer authenticates this way, it shows he has the token AND knows the pattern all at one go. The number of combinations is 6*5*4*3=360, high enough to cut accidental matches decently. We could ask for more than 4 digits if a higher number of combinations were required.
  • As also described above, it may be that we will want to end any web transactions by authenticating a second time, so that a thief who broke in and tried to use the credentials later, i.e., for a different transaction, would be detected.
  • In use of the described device for credit card transactions, instead of web, the customer may simply report the value of the display (or possibly the first several digits of the display) when asked for CVV2. It is noted that CVV2 reports may be 5 or more digits long, so the counter value AND some ciphertext could be reported. Alternatively the first part of the ciphertext could be reported for CVV2 if no more than 3 digits were accepted. At the back end, we would assume the counter incremented by 1 and compare, repeating for higher counter values till a comparison matched or we gave up, i.e., we would roll the counter ahead until we identified a match. In accordance with one embodiment of the invention, the back end has to track the counter in all cases. We expect that merchants will quickly start accepting CVV2, and accepting longer CVV2, to handle these devices since the quality of identification will be much higher than otherwise on phone or net orders, and they may eliminate substantial monies in fraud losses for merchants per year.
  • As described above, the user authentication device 121, e.g., a token, of the invention may be in a variety of forms. Also, the user authentication device 120 may be used in conjunction with a variety of features, as described below.
  • Optical light emitting devices (OLED) generally need to be fabricated on thin substrates with some electronics to control current flow to the light emitting polymers. It might be sensible to think of building a backplane for such devices (which are very thin and flexible) on which you also etch transistors and the like to perform the counting, debouncing, crypto, and possibly display timing as well, in one embodiment. A bit of flash memory may be built onto this backplane (to hold the counter value and a diversified key, if so desired. This would mean that all connections become part of a printed circuit, and the arrangement might be in the form of a small rectangle laid down in the inside of a card, to be covered by a transparent cover. Then the connections might only be to a battery and button.
  • In accordance with one embodiment of the invention, a piezoelectric element may be used for power. In such an arrangement, the customer would press on a printed circle, i.e., to press the element and generate electricity, avoiding button contacts. Also, pressing or bending energy might be used, if workable.
  • In accordance with one embodiment of the invention, a thin RFID IC bonded onto a display backplane would allow the cryptography, accumulation, password setup, etc. all to be done on a not too heavily altered RFID chip.
  • Initializing the crypto key might be done via fuses, via RFID, or a capacitive feed scheme which could use pulse trains to set the keys up one bit at a time without needing full contact. This can be shared separately if need be. Other schemes can be used.
  • A variety of power sources may be used to power the button 121. For example, photoelectric cells, electrets, and/or known battery arrangements may be used.
  • It is noted that the device must be reliable during its life, even though it will typically live in a wallet or purse.
  • In accordance with one embodiment of the invention, the user authentication device 120 may include a display that has 2 parts, i.e., a 2 digit field and a longer field (which might be 6 digits long, for example). Every time the customer presses the button, the 2 digit field increments and the longer field gets a set of what look like random numbers. No two card sequences are like.
  • In accordance with one aspect of the invention described above, an authenticating entity may wish to insure that a transaction amount is approved by the customer. The customer may take the first few digits of the amount (the purchase amount) and use them as positions to report on the display. As described above we might have display digits representing 2 digits each and have the customer enter the displayed numbers at those positions. What gets actually transmitted is a few random digits, but they can be checked against the amount as well as the device identity, proving that someone with the same device who authenticated moments before sent an acceptance for the amount of the transaction.
  • The systems and methods of the invention provide a wide variety of advantages. In accord with some embodiments, the inventive device may largely eliminate phishing: there is no point in stealing things like card numbers or account numbers when the variable device is required to get money. In accord with some embodiments, the inventive device may vastly reduce phone or net fraud. This will cut both issuer and merchant losses. In accord with some embodiments, the inventive device may eliminate intra-family fraud so long as individual devices are given to each person and so long as the people don't give their patterns away. In accord with some embodiments, the inventive device may make customer data cheaper to handle because less of it will be privacy sensitive. People don't mind when their phone numbers are given out most of the time. If their card number can't be used to rob them or damage their credit, they won't care if it is given out either. In accord with some embodiments, the inventive device may cut fraud in ATMs and/or at merchants if the device is used to generate pseudo PINs which would authenticate transactions. Because the transmitted data is in effect encrypted, even cameras watching PIN pads will be useless in stealing such credentials. It is noted that most merchants have PIN pads already which could be used in implementation of the invention. In addition, the device shows the customer that his credentials are being generated securely and shows that its issuer is doing something very tangible in protecting the customer's identity. The savings to merchants are sizeable and should in addition give some merchants good incentives to prefer these devices and to give incentives to customers to use them.
  • Further examples of use of the user authentication device 120, in accordance with embodiments of the invention, are set forth below.
  • In accordance with one embodiment of the invention, for net use, i.e., a purchase over the Internet, the customer might give his username and password. Then, the customer gives the value of the low order digits. The authentication entity then determines what the ciphertext (0:2) should be and conveys such to the customer, telling customer “if this doesn't match your display, you are talking to a fraud site. Then, if ciphertext (0:3) is OK, the authentication entity may ask the customer to enter ciphertext (3:5) and check that it is also valid. For example as used in this example, 3:5 means the digits shown in positions 3, 4 and 5.
  • To explain further, in an embodiment, the customer might provide half of the displayed digits to an authentication entity. Based on these provided digits, the authentication entity can then (if needed) determine where the customer is in the progression of the token. The authentication entity can then generate displayed characters (corresponding to those displayed by the customer), and the authentication entity then provides at least a portion of such displayed characters back to the customer. For example, the authentication entity might provide a portion or all of the displayed characters back to the customer. In this manner, the authentication entity knows they are dealing with a particular customer and the customer knows they are dealing with a particular authentication entity. Variations of this embodiment are of course possible regarding what portion of a character displayed is provided by what entity, e.g., what characters are provided by the customer and what characters are provided by the authentication entity.
  • Further, the two parties authenticating may of course perform any agreed upon transformation to the characters displayed on the token (or other device), i.e., such as providing select numbers in a particular order, or adding a 1 to each displayed number, for example, or any other suitable transformation. Accordingly, the providing of a select number of digits in a particular order is merely one transformation that might be performed.
  • As noted above, the authentication entity might provide a portion or all of the displayed characters back to the customer (or a transform of the displayed characters), and in this manner, the customer knows they are dealing with a particular authentication entity. Alternatively, or in addition to, the authentication entity might provide a portion or all of the next pattern, e.g., the next set of display characters, which may then be verified by the customer. The next pattern may also of course be transformed in some manner. Thus, in some agreed upon manner to authenticate, the authentication entity (or the customer) may convey to the other a portion or all of the display characters (or their equivalent such as the authentication characters 196), some transform of the display characters, and/or a portion or all of the next set of display characters (which may also be transformed), for example.
  • In accordance with one aspect of the invention relating to use with credit card transactions, the issuer might offer a direct validation service to merchants. The issuer could then do as much of the authentication processing as desired. Further, it would place the issuer in a position to check passwords or take a voice sample, or perform various other authentication, as may be desired. Further, the issuer might use ciphertext(3:5) instead of CVV2 in transaction information that was sent with the charge. It is noted the reported track 2 data may be used to capture two or so digits of low order counter in discretionary data fields. As issuer, we would recognize that the presented CVV2 was a variable one and validate accordingly, i.e., either searching the next several counter values for the customer, or using the discretionary data fields to reduce the amount of crypto to be done, e.g. reduce the need to roll ahead in search of a match.
  • In accordance with one embodiment of the invention, for ATM processing, the card may be inserted, and read by the ATM. The card would then be ejected and the customer enters the value of counter low digits, checks that the right ciphertext is displayed by the ATM (i.e., the display character sequence as described above), and only then enters her PIN and/or other ciphertext, as may be desired. This processing would convey the customer had some reason to think the ATM was communicating with the issuer before giving his PIN.
  • In accordance with one embodiment of the invention, the system uses different digits of ciphertext to authenticate to the customer that he is talking to the bank first, then to authenticate to the bank that the customer is who he claims to be. That is, the process checks that the card's identity is real. Tying the card to the customer requires asking for another password/PIN, or sampling voice, or the like. It might be that voice or a PIN recognition measures are required for higher value transactions, and not for low value ones.
  • For phone orders, the customer may be asked for the low digits of the counter and the ciphertext (at least one of the sets). Either a Bank authentication service could be called with this information and the card number/customer name, or the low digits could be passed in discretionary characters in Track 2 of card image data. (For time based card displays some of the ciphertext could be used as CVV2 not needing any additional data passed back.) Merchants knowing the variable number matched would be assured it would be less likely chargebacks could occur because the authentication was stronger. In one embodiment, the invention would exist on every credit card, and the only area needing change would be the issuer backend, i.e., the routine that checks CVV2. Such backend would know or compute the diversified key on the card, and track and encrypt the card counter and verify the ciphertext. Accordingly, processing change would be negligible.
  • In accordance with embodiments of the invention, it is appreciated that non-numeric indicia might be used along with, or in lieu of, the numerics described above, as may be desired. That is any symbol, graphic, picture, or other information representation, for example, might be used in lieu of, or along with, the numerics discussed above, as may be desired.
  • Further, it is appreciated that a constant value (i.e., a constant: number, symbol, graphic, picture, or other information representation, for example) might be used along with a variable value, or a set of variable values, which are described above.
  • As described above, FIGS. 1-4 and 10 show embodiments of structure and system of the invention. Further, FIGS. 5-10 show various steps in accordance with one embodiment of the invention. It is appreciated that the systems and methods described herein may be implemented using a variety of technologies. Hereinafter, general aspects regarding possible implementation of the systems and methods of the invention will be described.
  • It is understood that the system of the invention, and portions of the system of the invention, may be in the form of a “processing machine,” such as a general purpose computer, for example. As used herein, the term “processing machine” is to be understood to include at least one processor that uses at least one memory. The at least one memory stores a set of instructions. The instructions may be either permanently or temporarily stored in the memory or memories of the processing machine. The processor executes the instructions that are stored in the memory or memories in order to process data. The set of instructions may include various instructions that perform a particular task or tasks, such as those tasks described above in the flowcharts. Such a set of instructions for performing a particular task may be characterized as a program, software program, or simply software.
  • As noted above, the processing machine executes the instructions that are stored in the memory or memories to process data. This processing of data may be in response to commands by a user or users of the processing machine, in response to previous processing, in response to a request by another processing machine and/or any other input, for example.
  • As noted above, the processing machine used to implement the invention may be a general purpose computer. However, the processing machine described above may also utilize any of a wide variety of other technologies including a special purpose computer, a computer system including a microcomputer, mini-computer or mainframe for example, a programmed microprocessor, a micro-controller, a peripheral integrated circuit element, a CSIC (Customer Specific Integrated Circuit) or ASIC (Application Specific Integrated Circuit) or other integrated circuit, a logic circuit, a digital signal processor, a programmable logic device such as a FPGA, PLD, PLA or PAL, or any other device or arrangement of devices that is capable of implementing the steps of the process of the invention.
  • It is appreciated that in order to practice the method of the invention as described above, it is not necessary that the processors and/or the memories of the processing machine be physically located in the same geographical place. That is, each of the processors and the memories used in the invention may be located in geographically distinct locations and connected so as to communicate in any suitable manner. Additionally, it is appreciated that each of the processor and/or the memory may be composed of different physical pieces of equipment. Accordingly, it is not necessary that the processor be one single piece of equipment in one location and that the memory be another single piece of equipment in another location. That is, it is contemplated that the processor may be two pieces of equipment in two different physical locations. The two distinct pieces of equipment may be connected in any suitable manner. Additionally, the memory may include two or more portions of memory in two or more physical locations.
  • To explain further, processing as described above is performed by various components and various memories. However, it is appreciated that the processing performed by two distinct components as described above may, in accordance with a further embodiment of the invention, be performed by a single component. Further, the processing performed by one distinct component as described above may be performed by two distinct components. In a similar manner, the memory storage performed by two distinct memory portions as described above may, in accordance with a further embodiment of the invention, be performed by a single memory portion. Further, the memory storage performed by one distinct memory portion as described above may be performed by two memory portions.
  • Further, various technologies may be used to provide communication between the various processors and/or memories, as well as to allow the processors and/or the memories of the invention to communicate with any other entity; i.e., so as to obtain further instructions or to access and use remote memory stores, for example. Such technologies used to provide such communication might include a network, the Internet, intranet, Extranet, LAN, an Ethernet, or any client server system that provides communication, for example. Such communications technologies may use any suitable protocol such as TCP/IP, UDP, or OSI, for example.
  • As described above, a set of instructions is used in the processing of the invention. The set of instructions may be in the form of a program or software. The software may be in the form of system software or application software, for example. The software might also be in the form of a collection of separate programs, a program module within a larger program, or a portion of a program module, for example The software used might also include modular programming in the form of object oriented programming. The software tells the processing machine what to do with the data being processed.
  • Further, it is appreciated that the instructions or set of instructions used in the implementation and operation of the invention may be in a suitable form such that the processing machine may read the instructions. For example, the instructions that form a program may be in the form of a suitable programming language, which is converted to machine language or object code to allow the processor or processors to read the instructions. That is, written lines of programming code or source code, in a particular programming language, are converted to machine language using a compiler, assembler or interpreter. The machine language is binary coded machine instructions that are specific to a particular type of processing machine, i.e., to a particular type of computer, for example. The computer understands the machine language.
  • Any suitable programming language may be used in accordance with the various embodiments of the invention. Illustratively, the programming language used may include assembly language, Ada, APL, Basic, C, C++, COBOL, dBase, Forth, Fortran, Java, Modula-2, Pascal, Prolog, REXX, Visual Basic, and/or JavaScript, for example. Further, it is not necessary that a single type of instructions or single programming language be utilized in conjunction with the operation of the system and method of the invention. Rather, any number of different programming languages may be utilized as is necessary or desirable.
  • Also, the instructions and/or data used in the practice of the invention may utilize any compression or encryption technique or algorithm, as may be desired. An encryption module might be used to encrypt data. Further, files or other data may be decrypted using a suitable decryption module, for example.
  • As described above, the invention may illustratively be embodied in the form of a processing machine, including a computer or computer system, for example, that includes at least one memory. It is to be appreciated that the set of instructions, i.e., the software for example, that enables the computer operating system to perform the operations described above may be contained on any of a wide variety of media or medium, as desired. Further, the data that is processed by the set of instructions might also be contained on any of a wide variety of media or medium. That is, the particular medium, i.e., the memory in the processing machine, utilized to hold the set of instructions and/or the data used in the invention may take on any of a variety of physical forms or transmissions, for example. Illustratively, the medium may be in the form of paper, paper transparencies, a compact disk, a DVD, an integrated circuit, a hard disk, a floppy disk, an optical disk, a magnetic tape, a RAM, a ROM, a PROM, a EPROM, a wire, a cable, a fiber, communications channel, a satellite transmissions or other remote transmission, as well as any other medium or source of data that may be read by the processors of the invention.
  • Further, the memory or memories used in the processing machine that implements the invention may be in any of a wide variety of forms to allow the memory to hold instructions, data, or other information, as is desired. Thus, the memory might be in the form of a database to hold data. The database might use any desired arrangement of files such as a flat file arrangement or a relational database arrangement, for example.
  • In the system and method of the invention, a variety of “user interfaces” may be utilized to allow a user to interface with the processing machine or machines that are used to implement the invention. As used herein, a user interface includes any hardware, software, or combination of hardware and software used by the processing machine that allows a user to interact with the processing machine. A user interface may be in the form of a dialogue screen for example. A user interface may also include any of a mouse, touch screen, keyboard, voice reader, voice recognizer, dialogue screen, menu box, list, checkbox, toggle switch, a pushbutton or any other device that allows a user to receive information regarding the operation of the processing machine as it processes a set of instructions and/or provide the processing machine with information. Accordingly, the user interface is any device that provides communication between a user and a processing machine. The information provided by the user to the processing machine through the user interface may be in the form of a command, a selection of data, or some other input, for example.
  • As discussed above, a user interface is utilized by the processing machine that performs a set of instructions such that the processing machine processes data for a user. The user interface is typically used by the processing machine for interacting with a user either to convey information or receive information from the user. However, it should be appreciated that in accordance with some embodiments of the system and method of the invention, it is not necessary that a human user actually interact with a user interface used by the processing machine of the invention. Rather, it is contemplated that the user interface of the invention might interact, i.e., convey and receive information, with another processing machine, rather than a human user. Accordingly, the other processing machine might be characterized as a user. Further, it is contemplated that a user interface utilized in the system and method of the invention may interact partially with another processing machine or processing machines, while also interacting partially with a human user.
  • It will be readily understood by those persons skilled in the art that the present invention is susceptible to broad utility and application. Many embodiments and adaptations of the present invention other than those herein described, as well as many variations, modifications and equivalent arrangements, will be apparent from or reasonably suggested by the present invention and foregoing description thereof, without departing from the substance or scope of the invention.
  • Accordingly, while the present invention has been described here in detail in relation to its exemplary embodiments, it is to be understood that this disclosure is only illustrative and exemplary of the present invention and is made to provide an enabling disclosure of the invention. Accordingly, the foregoing disclosure is not intended to be construed or to limit the present invention or otherwise to exclude any other such embodiments, adaptations, variations, modifications or equivalent arrangements.

Claims (17)

1. A system for processing authentication information associated with a transaction effected by a user, the system comprising:
a user authentication device comprising:
a display comprising a plurality of display positions; and
a user authentication device computer processor generating a display character for each display position based on logic and a predetermined progression, and outputting the display characters to the display positions so as to be readable by the user; and
an authentication entity system comprising:
an input portion that receives an input character sequence consisting of fewer than all of the display characters displayed on the user authentication device; and
an authentication system computer processor that:
generates a set of authenticating characters based on the logic and the predetermined progression and uses a stored user-selected pattern to select fewer than all of the authenticating characters as an authorizing character sequence, the stored user-selected pattern specifying an order of the authentication characters in the authentication character sequence relative to the display positions;
compares the authorizing character sequence to the input character sequence; and
authenticates the transaction based on the comparison.
2. (canceled)
3. The authentication system of claim 1, wherein the logic further comprises a transformation of data.
4-5. (canceled)
6. The authentication system of claim 1, wherein the user authentication device is associated with credit card user; and the authentication entity system being maintained by a bank.
7. The authentication system of claim 6, wherein the logic uses an algorithm to generate the plurality of display characters, the algorithm generating the plurality of display characters in a predetermined manner known to the authentication entity system.
8. The authentication system of claim 1, wherein the user authentication device further includes a display button, and the user authentication device operable such that pressing of the display button by the user results in the display characters being displayed in the respective display positions.
9. The authentication system of claim 1, wherein the communication channel is one selected from the group consisting of a telephone line channel, radio signal, infrared and network.
10-11. (canceled)
12. The authentication system of claim 1, wherein each display character is a number.
13. The authentication system of claim 1, wherein the user authentication device is in the form of a handheld token.
14. The authentication system of claim 1, wherein the user authentication device is in the form of a program running on a computer, the computer is connected to a network.
15-38. (canceled)
39. The authentication system of claim 1, wherein the predetermined transformation includes adding a value of 1 (one) to select characters in the display portion.
40-43. (canceled)
44. An authentication system maintained by an authentication entity that processes authentication information associated with a transaction effected by a user, the authentication system comprising:
an input portion that receives an input character sequence from a customer consisting of fewer than all of the display characters displayed by a user authentication device associated with the customer using a plurality of display positions;
a processing portion comprising at least one computer processor that generates a set of authenticating characters based on logic and users a stored user-selected pattern to select fewer than all of the authenticating characters as an authorizing character sequence, the stored user-selected pattern specifying an order of the authenticating characters in the authenticating character sequence relative to the display positions; and
a comparison portion that compares the authorizing character sequence to the input character sequence and authenticates the transaction based on the comparison;
wherein the display characters and the authenticating characters are generated using the same logic.
45. (canceled)
US11/137,409 2002-03-25 2005-05-26 Systems and methods for multifactor authentication Abandoned US20180165441A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US11/137,409 US20180165441A1 (en) 2002-03-25 2005-05-26 Systems and methods for multifactor authentication
US11/567,903 US20170103395A1 (en) 2002-03-25 2006-12-07 Authentication systems and methods using human readable media
US13/621,995 US10726417B1 (en) 2002-03-25 2012-09-18 Systems and methods for multifactor authentication

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US10/105,471 US20030182241A1 (en) 2002-03-25 2002-03-25 Time variable financial authentication apparatus
US10/419,107 US7899753B1 (en) 2002-03-25 2003-04-21 Systems and methods for time variable financial authentication
US64662205P 2005-01-26 2005-01-26
US66148805P 2005-03-15 2005-03-15
US11/137,409 US20180165441A1 (en) 2002-03-25 2005-05-26 Systems and methods for multifactor authentication

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/419,107 Continuation-In-Part US7899753B1 (en) 2002-03-25 2003-04-21 Systems and methods for time variable financial authentication

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US11/567,903 Continuation-In-Part US20170103395A1 (en) 2002-03-25 2006-12-07 Authentication systems and methods using human readable media
US13/621,995 Continuation US10726417B1 (en) 2002-03-25 2012-09-18 Systems and methods for multifactor authentication

Publications (1)

Publication Number Publication Date
US20180165441A1 true US20180165441A1 (en) 2018-06-14

Family

ID=62489526

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/137,409 Abandoned US20180165441A1 (en) 2002-03-25 2005-05-26 Systems and methods for multifactor authentication
US13/621,995 Active 2028-02-23 US10726417B1 (en) 2002-03-25 2012-09-18 Systems and methods for multifactor authentication

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/621,995 Active 2028-02-23 US10726417B1 (en) 2002-03-25 2012-09-18 Systems and methods for multifactor authentication

Country Status (1)

Country Link
US (2) US20180165441A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10587582B2 (en) * 2017-05-15 2020-03-10 Vmware, Inc Certificate pinning by a tunnel endpoint
US11184336B2 (en) 2016-06-29 2021-11-23 Airwatch Llc Public key pinning for private networks
US11341226B2 (en) * 2020-03-24 2022-05-24 Real Locks & Security Co., Ltd. Combination lock system and method of operating the same
US20220337393A1 (en) * 2019-09-19 2022-10-20 Visa International Service Association System and method for using dynamic tag content
US11921683B2 (en) * 2020-06-08 2024-03-05 Paypal, Inc. Use of time to live value during database compaction

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11868534B1 (en) * 2022-07-22 2024-01-09 Avaya Management L.P. Enhanced security for visually impaired users of touchscreen interfaces using false entry notifications for user input

Family Cites Families (774)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2005003A (en) 1934-08-16 1935-06-18 Louis J Patton Wheel holder
CH227464A (en) 1942-01-29 1943-06-15 Patelhold Patentverwertung Method for the transmission of messages which are disguised with the aid of control signals.
JPS4812379B1 (en) 1968-12-16 1973-04-20
US3634669A (en) 1969-07-16 1972-01-11 Aero Flow Dynamics Inc Analog computation of insurance and investment quantities
US3705385A (en) 1969-12-10 1972-12-05 Northern Illinois Gas Co Remote meter reading system
JPS49100914A (en) 1973-01-12 1974-09-24
US3946206A (en) 1974-08-21 1976-03-23 R. D. Products, Inc. Magnetic-type information card and method and apparatus for encoding and reading
SE399602B (en) 1974-10-25 1978-02-20 Id Kort Ab IDENTITY, COMPETENCE OR CONTROL ACTION
US3938090A (en) 1975-02-13 1976-02-10 Bell Telephone Laboratories, Incorporated Terminal apparatus
US4255811A (en) 1975-03-25 1981-03-10 International Business Machines Corporation Key controlled block cipher cryptographic system
US4013962A (en) 1975-08-14 1977-03-22 Motorola, Inc. Improved receiver selecting (voting) system
US4316055A (en) 1976-12-30 1982-02-16 International Business Machines Corporation Stream/block cipher crytographic system
US4123747A (en) 1977-05-20 1978-10-31 International Business Machines Corporation Identity verification method and apparatus
US4200770A (en) 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US4160120A (en) 1977-11-17 1979-07-03 Burroughs Corporation Link encryption device
US4405829A (en) 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4249180A (en) 1978-09-20 1981-02-03 Northern Telecom Limited Past dependent microcomputer cipher apparatus
US4302810A (en) 1979-12-28 1981-11-24 International Business Machines Corporation Method and apparatus for secure message transmission for use in electronic funds transfer systems
FR2474270A1 (en) 1980-01-21 1981-07-24 Radiotechnique Compelec METHOD AND DEVICE FOR SIMULTANEOUSLY ASSEMBLING COMPONENTS ON A SUPPORT
US4529870A (en) 1980-03-10 1985-07-16 David Chaum Cryptographic identification, financial transaction, and credential device
SE425704B (en) 1981-03-18 1982-10-25 Loefberg Bo DATABERARE
EP0076255A1 (en) 1981-04-07 1983-04-13 BENTON, William M. Transaction verification system using optical data communication link
US4471164A (en) 1981-10-13 1984-09-11 At&T Bell Laboratories Stream cipher operation using public key cryptosystem
US4453074A (en) 1981-10-19 1984-06-05 American Express Company Protection system for intelligent cards
US4663500A (en) 1982-02-22 1987-05-05 Nec Corporation Cryptographic system
US4723246A (en) 1982-05-11 1988-02-02 Tandem Computers Incorporated Integrated scrambler-encoder using PN sequence generator
US4454414A (en) 1982-06-16 1984-06-12 Vericard Corporation Funds transfer system using optically coupled, portable modules
US4545838A (en) 1983-02-07 1985-10-08 Sealtran Corp. Lamination product and method employing temporary transfer film
US5253294A (en) 1983-02-22 1993-10-12 At&T Bell Laboratories Secure transmission system
GB2146815A (en) 1983-09-17 1985-04-24 Ibm Electronic fund transfer systems
US4650981A (en) 1984-01-26 1987-03-17 Foletta Wayne S Credit card with active electronics
US4575621A (en) 1984-03-07 1986-03-11 Corpra Research, Inc. Portable electronic transaction device and system therefor
US4754418A (en) 1984-03-27 1988-06-28 Casio Computer Co., Ltd. Combined electronic calculator and credit card
US5173851A (en) 1984-07-18 1992-12-22 Catalina Marketing International, Inc. Method and apparatus for dispensing discount coupons in response to the purchase of one or more products
US4746787A (en) 1984-07-20 1988-05-24 Oki Electric Industry Co., Ltd. IC card with display and card recording and reading device
US4747139A (en) 1984-08-27 1988-05-24 Taaffe James L Software security method and systems
JPH0670818B2 (en) 1984-09-07 1994-09-07 カシオ計算機株式会社 Verification card and its authentication method
US4614861A (en) 1984-11-15 1986-09-30 Intellicard International, Inc. Unitary, self-contained card verification and validation system and method
US4882675A (en) 1984-11-26 1989-11-21 Steven Nichtberger Paperless system for distributing, redeeming and clearing merchandise coupons
US5367572A (en) 1984-11-30 1994-11-22 Weiss Kenneth P Method and apparatus for personal identification
US4634845A (en) 1984-12-24 1987-01-06 Ncr Corporation Portable personal terminal for use in a system for handling transactions
US4689478A (en) 1984-12-24 1987-08-25 Ncr Corporation System for handling transactions including a portable personal terminal
US4605844A (en) 1985-02-11 1986-08-12 At&T Technologies, Inc. Computerized transaction card with inductive data transfer
US4766539A (en) 1985-03-08 1988-08-23 Fox Henry L Method of determining the premium for and writing a policy insuring against specified weather conditions
GB8509135D0 (en) 1985-04-10 1985-05-15 Gen Electric Co Plc Transaction system
US4701601A (en) 1985-04-26 1987-10-20 Visa International Service Association Transaction card with magnetic stripe emulator
US5365575A (en) 1985-07-10 1994-11-15 First Data Resources Inc. Telephonic-interface lottery system
US5218631A (en) 1985-07-10 1993-06-08 First Data Resources Inc. Telephonic-interface game control system
US5349633A (en) 1985-07-10 1994-09-20 First Data Resources Inc. Telephonic-interface game control system
US5835576A (en) 1985-07-10 1998-11-10 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface lottery device
US5018196A (en) 1985-09-04 1991-05-21 Hitachi, Ltd. Method for electronic transaction with digital signature
US4831242A (en) 1985-09-12 1989-05-16 Bally Manufacturing Corporation Control system for health club facilities and equipment
US4700055A (en) 1985-10-15 1987-10-13 Kashkashian Jr Arsen Multiple credit card system
US4752676A (en) 1985-12-12 1988-06-21 Common Bond Associates Reliable secure, updatable "cash" card system
JPH0743748B2 (en) 1986-02-17 1995-05-15 株式会社オークネット Information transmission processing method of auction information transmission processing system
US4831526A (en) 1986-04-22 1989-05-16 The Chubb Corporation Computerized insurance premium quote request and policy issuance system
US4766293A (en) 1986-06-26 1988-08-23 Visa International Service Association Portable financial transaction card capable of authorizing a transaction in foreign currencies
US5319710A (en) 1986-08-22 1994-06-07 Tandem Computers Incorporated Method and means for combining and managing personal verification and message authentication encrytions for network transmission
US4750119A (en) 1986-10-10 1988-06-07 Tradevest, Inc. Purchasing system with rebate feature
NL8602847A (en) 1986-11-11 1988-06-01 Philips Nv METHOD FOR Ciphering / Deciphering and Device for Carrying Out the Method
US4908521A (en) 1987-01-06 1990-03-13 Visa International Service Association Transaction approval system
US4822985A (en) 1987-01-06 1989-04-18 Visa International Service Association Transaction approval system
US4870259A (en) 1987-01-06 1989-09-26 Visa International Service Association Transaction approval system
US4943707A (en) 1987-01-06 1990-07-24 Visa International Service Association Transaction approval system
JPS63231692A (en) 1987-03-20 1988-09-27 Mitsubishi Electric Corp Confidential code writing device
US5852811A (en) 1987-04-15 1998-12-22 Proprietary Financial Products, Inc. Method for managing financial accounts by a preferred allocation of funds among accounts
US4953085A (en) 1987-04-15 1990-08-28 Proprietary Financial Products, Inc. System for the operation of a financial account
US5644727A (en) 1987-04-15 1997-07-01 Proprietary Financial Products, Inc. System for the operation and management of one or more financial accounts through the use of a digital communication and computation system for exchange, investment and borrowing
DE3852907T2 (en) 1987-05-09 1995-05-24 Semiconductor Energy Lab Card with a data storage made of ferroelectric liquid crystals.
US4868376A (en) 1987-05-15 1989-09-19 Smartcard International Inc. Intelligent portable interactive personal data system
GB8712057D0 (en) 1987-05-21 1987-06-24 British Petroleum Co Plc Optical modulators
US4897533A (en) 1987-07-07 1990-01-30 National Business Systems, Inc. Credit card and method of making the same
US6195644B1 (en) 1987-07-08 2001-02-27 Stuart S. Bowie Computer program and system for credit card companies for recording and processing bonus credits issued to card users
US4968873A (en) 1987-09-08 1990-11-06 Juergen Dethloff Smart card issuing and receiving apparatus
US5025372A (en) 1987-09-17 1991-06-18 Meridian Enterprises, Inc. System and method for administration of incentive award program through use of credit
US4868877A (en) 1988-02-12 1989-09-19 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5005200A (en) 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
FR2627610B1 (en) 1988-02-22 1991-04-05 Cga Hbs FEEDING SYSTEM FOR TRANSPORT USERS
US4980913A (en) 1988-04-19 1990-12-25 Vindicator Corporation Security system network
US5001755A (en) 1988-04-19 1991-03-19 Vindicator Corporation Security system network
US4975840A (en) 1988-06-17 1990-12-04 Lincoln National Risk Management, Inc. Method and apparatus for evaluating a potentially insurable risk
US4961142A (en) 1988-06-29 1990-10-02 Mastercard International, Inc. Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer
JP2693514B2 (en) 1988-08-31 1997-12-24 株式会社東芝 Information recording medium
US4906826A (en) 1988-09-19 1990-03-06 Visa International Service Association Usage promotion method for payment card transaction system
US5016274A (en) 1988-11-08 1991-05-14 Silvio Micali On-line/off-line digital signing
US4984272A (en) 1988-11-30 1991-01-08 At&T Bell Laboratories Secure file handling in a computer operating system
US5202826A (en) 1989-01-27 1993-04-13 Mccarthy Patrick D Centralized consumer cash value accumulation system for multiple merchants
US5117355A (en) 1989-01-27 1992-05-26 Mccarthy Patrick D Centralized consumer cash valve accumulation system for multiple merchants
US5202286A (en) 1989-02-27 1993-04-13 Mitsubishi Denki Kabushiki Kaisha Method of forming three-dimensional features on substrates with adjacent insulating films
US4965568A (en) 1989-03-01 1990-10-23 Atalla Martin M Multilevel security apparatus and method with personal key
DE3906349A1 (en) 1989-03-01 1990-09-13 Hartmut Hennige METHOD AND DEVICE FOR SIMPLIFYING THE USE OF A VARIETY OF CREDIT CARDS AND THE LIKE
US4992940A (en) 1989-03-13 1991-02-12 H-Renee, Incorporated System and method for automated selection of equipment for purchase through input of user desired specifications
US4978401A (en) 1989-03-14 1990-12-18 Bostec Systems, Inc. Card assembly method
US5080748A (en) 1989-03-14 1992-01-14 Bostec Systems, Inc. Card assembly apparatus
DE68926446T2 (en) 1989-03-14 1996-12-05 Ibm Electronic document approval system
GB2229845B (en) 1989-04-01 1993-08-04 Avery Ltd W & T Transaction system
GB8909011D0 (en) 1989-04-20 1989-06-07 Friend Richard H Electroluminescent devices
US5649114A (en) 1989-05-01 1997-07-15 Credit Verification Corporation Method and system for selective incentive point-of-sale marketing in response to customer shopping histories
US5201010A (en) 1989-05-01 1993-04-06 Credit Verification Corporation Method and system for building a database and performing marketing based upon prior shopping history
US5621812A (en) 1989-05-01 1997-04-15 Credit Verification Corporation Method and system for building a database for use with selective incentive marketing in response to customer shopping histories
US5644723A (en) 1989-05-01 1997-07-01 Credit Verification Corporation Method and system for selective incentive point-of-sale marketing in response to customer shopping histories
FR2646966B1 (en) 1989-05-10 1996-02-02 Elf Aquitaine METHOD OF QUICK AND UNIFORM HEATING OF A MULTI-LAYER ASSEMBLY COMPRISING AT LEAST ONE THIN LAYER BASED ON A MACROMOLECULAR MATERIAL WITH INTERCALLED ION CONDUCTION BETWEEN TWO STRUCTURES WITH HIGH ELECTRON CONDUCTION
US5212792A (en) 1989-06-01 1993-05-18 Hewlett-Packard Company Method and apparatus for controlling execution of tools in a computer-aided software engineering system
US6003762A (en) 1989-09-06 1999-12-21 Fujitsu Limited Transaction terminal for an electronic cashless system
ZA907106B (en) 1989-10-06 1991-09-25 Net 1 Products Pty Ltd Funds transfer system
US5095194A (en) 1989-10-12 1992-03-10 Joseph Barbanell Holographic credit card with automatical authentication and verification
US5339239A (en) 1989-10-13 1994-08-16 Mitsubishi Plastics Industries Limited Information collecting and/or service furnishing systems by which a user can request information from a central data base using a portable personal terminal and an access terminal
US6045042A (en) 1989-10-24 2000-04-04 Mitsubishi Denki Kabushiki Kaisha Non-contact IC card having multiple receivers with different signal detection threshholds for minimizing current consumption
DE69127560T2 (en) 1990-01-30 1998-04-23 Toshiba Kawasaki Kk Mutual recognition system
US5192947A (en) 1990-02-02 1993-03-09 Simon Neustein Credit card pager apparatus
US5054067A (en) 1990-02-21 1991-10-01 General Instrument Corporation Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator
US5495981A (en) 1994-02-04 1996-03-05 Warther; Richard O. Transaction card mailer and method of making
US5049728A (en) 1990-04-04 1991-09-17 Rovin George H IC card system with removable IC modules
US5623547A (en) 1990-04-12 1997-04-22 Jonhig Limited Value transfer system
US5617474A (en) 1990-05-08 1997-04-01 The Goeken Group Corporation Telephone handset having a latch-receiving opening in an enlarged inlet opening of a card-receiving slot
JPH0424889A (en) 1990-05-21 1992-01-28 Toshiba Corp IC card with personal authentication function
US5072380A (en) 1990-06-12 1991-12-10 Exxon Research And Engineering Company Automatic vehicle recognition and customer billing system
US5287269A (en) 1990-07-09 1994-02-15 Boardwalk/Starcity Corporation Apparatus and method for accessing events, areas and activities
GB9018698D0 (en) 1990-08-24 1990-10-10 Lynxvale Ltd Semiconductive copolymers for use in electroluminescent devices
US6539363B1 (en) 1990-08-30 2003-03-25 Ncr Corporation Write input credit transaction apparatus and method with paperless merchant credit card processing
US5163098A (en) 1990-09-06 1992-11-10 Dahbura Abbud S System for preventing fraudulent use of credit card
US5196840A (en) 1990-11-05 1993-03-23 International Business Machines Corporation Secure communications system for remotely located computers
WO1992015968A1 (en) 1991-03-05 1992-09-17 The Gift Certificate Center, Inc. Method and apparatus for generating gift certificates
US5206803A (en) 1991-03-15 1993-04-27 Vitagliano Francis M System for enhanced management of pension-backed credit
US5257486A (en) 1991-04-23 1993-11-02 Adhesives Technology Corporation 1987 Nozzle for injecting a sealant into a crack
EP0511420B1 (en) 1991-04-29 1995-10-18 Omnisec Ag A cryptographic system based on information difference
US5832457A (en) 1991-05-06 1998-11-03 Catalina Marketing International, Inc. Method and apparatus for selective distribution of discount coupons based on prior customer behavior
US5383113A (en) 1991-07-25 1995-01-17 Checkfree Corporation System and method for electronically providing customer services including payment of bills, financial analysis and loans
US5231668A (en) 1991-07-26 1993-07-27 The United States Of America, As Represented By The Secretary Of Commerce Digital signature algorithm
US5305456A (en) 1991-10-11 1994-04-19 Security Integration, Inc. Apparatus and method for computer system integrated security
CA2076433C (en) 1991-10-31 1998-08-18 Brenda B. Amarant Monitoring of charges debited to an account having an assigned limit
US5466920A (en) 1991-11-08 1995-11-14 Microbilt Corporation Real time decoding for card transaction terminal
US5453601A (en) 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5955961A (en) 1991-12-09 1999-09-21 Wallerstein; Robert S. Programmable transaction card
US5585787A (en) 1991-12-09 1996-12-17 Wallerstein; Robert S. Programmable credit card
US6009415A (en) 1991-12-16 1999-12-28 The Harrison Company, Llc Data processing technique for scoring bank customer relationships and awarding incentive rewards
US5297026A (en) 1992-01-03 1994-03-22 Frank Hoffman System for promoting account activity
US5334823A (en) 1992-01-10 1994-08-02 National Bancard Corporation Systems and methods for operating data card terminals for transaction chargeback protection
US5428210A (en) 1992-01-10 1995-06-27 National Bancard Corporation Data card terminal with embossed character reader and signature capture
US5341428A (en) 1992-01-30 1994-08-23 Gbs Systems Corporation Multiple cross-check document verification system
US5359183A (en) 1992-04-06 1994-10-25 Rafael Skodlar Payment card with display
US6292786B1 (en) 1992-05-19 2001-09-18 Incentech, Inc. Method and system for generating incentives based on substantially real-time product purchase information
US5970479A (en) 1992-05-29 1999-10-19 Swychco Infrastructure Services Pty. Ltd. Methods and apparatus relating to the formulation and trading of risk management contracts
US6134536A (en) 1992-05-29 2000-10-17 Swychco Infrastructure Services Pty Ltd. Methods and apparatus relating to the formulation and trading of risk management contracts
GB9215929D0 (en) 1992-07-27 1992-09-09 Cambridge Display Tech Ltd Electroluminescent devices
US5326959A (en) 1992-08-04 1994-07-05 Perazza Justin J Automated customer initiated entry remittance processing system
US6076068A (en) 1992-09-17 2000-06-13 Ad Response Micromarketing Corporation Coupon delivery system
US5479494A (en) 1992-10-05 1995-12-26 At&T Corp. Virtual calling card system
US5504677A (en) 1992-10-15 1996-04-02 Pollin; Robert E. Automated payment system
WO1994009439A1 (en) 1992-10-22 1994-04-28 American Express Travel Related Services Company, Inc. Automated billing consolidation system and method
ATE237854T1 (en) 1992-10-26 2003-05-15 Intellect Australia Pty Ltd HOST-USER TRANSACTION SYSTEM
US5267314A (en) 1992-11-17 1993-11-30 Leon Stambler Secure transaction system and method utilized therein
US5350906A (en) 1992-11-25 1994-09-27 Brody Bill E Currency transfer system and method using fixed limit cards
US5326960A (en) 1992-11-25 1994-07-05 Tannenbaum David H Currency transfer system and method
GB9226475D0 (en) 1992-12-18 1993-02-10 Cambridge Display Tech Ltd Chromophoric polymeric compositions
US5450479A (en) 1992-12-30 1995-09-12 At&T Corp. Method and apparatus for facilitating the making of card calls
US5351187A (en) 1992-12-30 1994-09-27 At/Comm Incorporated Automatic debiting parking meter system
US5382784A (en) 1993-02-08 1995-01-17 Indala Corporation Hand-held dual technology identification tag reading head
GB2275654B (en) 1993-03-04 1996-11-13 Landis & Gyr Energy Management Smart card
US5311594A (en) 1993-03-26 1994-05-10 At&T Bell Laboratories Fraud protection for card transactions
US5466919A (en) 1993-04-02 1995-11-14 Hovakimian; Henry Credit/charge card system enabling purchasers to contribute to selected charities
WO1994029112A1 (en) 1993-06-11 1994-12-22 Moore Business Forms, Inc. Magnetic card tickets for events
US5424524A (en) 1993-06-24 1995-06-13 Ruppert; Jonathan P. Personal scanner/computer for displaying shopping lists and scanning barcodes to aid shoppers
US5794207A (en) 1996-09-04 1998-08-11 Walker Asset Management Limited Partnership Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers
FR2707408B1 (en) 1993-07-09 1995-08-18 Cga Hbs Method for the fast and secure transmission of data contained in a smart card during a remote transaction.
JP3053527B2 (en) 1993-07-30 2000-06-19 インターナショナル・ビジネス・マシーンズ・コーポレイション Method and apparatus for validating a password, method and apparatus for generating and preliminary validating a password, method and apparatus for controlling access to resources using an authentication code
US5477215A (en) 1993-08-02 1995-12-19 At&T Corp. Arrangement for simultaneously interrogating a plurality of portable radio frequency communication devices
US5500890A (en) 1993-08-19 1996-03-19 Exxon Research And Engineering Company Point-of-sale system using multi-threaded transactions and interleaved file transfer
US5450491A (en) 1993-08-26 1995-09-12 At&T Corp. Authenticator card and system
EP0715740B1 (en) 1993-08-27 2001-07-04 Affinity Technology, Inc. Closed loop financial transaction method and apparatus
US5649118A (en) 1993-08-27 1997-07-15 Lucent Technologies Inc. Smart card with multiple charge accounts and product item tables designating the account to debit
US5940811A (en) 1993-08-27 1999-08-17 Affinity Technology Group, Inc. Closed loop financial transaction method and apparatus
US5544246A (en) 1993-09-17 1996-08-06 At&T Corp. Smartcard adapted for a plurality of service providers and for remote installation of same
US5608785A (en) 1993-09-23 1997-03-04 Lucent Technologies Inc. Method and apparatus for telephone prize opportunities
US5477038A (en) 1993-10-25 1995-12-19 Visa International Method and apparatus for distributing currency
USRE36365E (en) 1993-10-25 1999-11-02 Visa International Service Association Method and apparatus for distributing currency
EP0725953B1 (en) 1993-10-26 1998-07-29 Radisson Hotels Internationals Inc. System and method for awarding credits to persons who book travel-related reservations
US5465206B1 (en) 1993-11-01 1998-04-21 Visa Int Service Ass Electronic bill pay system
US5920847A (en) 1993-11-01 1999-07-06 Visa International Service Association Electronic bill pay system
US5644778A (en) 1993-11-02 1997-07-01 Athena Of North America, Inc. Medical transaction system
US5397881A (en) 1993-11-22 1995-03-14 Mannik; Kallis H. Third millenium credit card with magnetically onto it written multiple validity dates, from which is one single day as the credit card's validity day selected day after day by the legitimate card owner
JP3305843B2 (en) 1993-12-20 2002-07-24 株式会社東芝 Semiconductor device
US5530232A (en) 1993-12-22 1996-06-25 Datamark Services, Inc. Multi-application data card
US5578808A (en) 1993-12-22 1996-11-26 Datamark Services, Inc. Data card that can be used for transactions involving separate card issuers
CA2136038A1 (en) 1993-12-28 1995-06-29 Marilyn A. Holda-Fleck System and method to automatically provide an electronic consumer rebate
CA2182596C (en) 1994-02-04 2004-04-20 James E. Biorge Method and system for allocating and redeeming incentive credits between a portable device and a base device
USH1794H (en) 1994-02-08 1999-04-06 At&T Corp. Secure money transfer techniques using hierarchical arrangement of smart cards
US5521363A (en) 1994-02-16 1996-05-28 Tannenbaum; David H. System and method for tracking memory card transactions
US6069968A (en) 1994-03-11 2000-05-30 Shaw; Venson M. Electronic transaction system for banking, security, and/or charge card
US5471669A (en) 1994-03-17 1995-11-28 Alchemist And Company, Inc. Coupon savings account system
WO1995027945A1 (en) 1994-04-06 1995-10-19 Morgan Stanley Group Inc. Data processing system and method for financial debt instruments
JP3600266B2 (en) 1994-04-08 2004-12-15 株式会社ルネサステクノロジ Contactless IC card interface device and communication system using the same
US5537314A (en) 1994-04-18 1996-07-16 First Marketrust Intl. Referral recognition system for an incentive award program
US6625581B1 (en) 1994-04-22 2003-09-23 Ipf, Inc. Method of and system for enabling the access of consumer product related information and the purchase of consumer products at points of consumer presence on the world wide web (www) at which consumer product information request (cpir) enabling servlet tags are embedded within html-encoded documents
US5799087A (en) 1994-04-28 1998-08-25 Citibank, N.A. Electronic-monetary system
GB9408588D0 (en) 1994-04-29 1994-06-22 Disys Corp Passive transponder
WO1995030966A1 (en) 1994-05-05 1995-11-16 Grumman Aerospace Corporation Method and apparatus for locating and identifying an object of interest in a complex image
US5477040A (en) 1994-05-23 1995-12-19 Lalonde; Michael G. Structure for a method of facilitating charge transactions
US6996542B1 (en) 1994-06-03 2006-02-07 Midwest Payment Systems System and method for paying bills and other obligations including selective payor and payee controls
US5649117A (en) 1994-06-03 1997-07-15 Midwest Payment Systems System and method for paying bills and other obligations including selective payor and payee controls
US5511114A (en) 1994-06-06 1996-04-23 Call Processing, Inc. Telephone pre-paid calling card system and method
US5577109A (en) 1994-06-06 1996-11-19 Call Processing, Inc. Pre-paid card system and method
US5459306A (en) 1994-06-15 1995-10-17 Blockbuster Entertainment Corporation Method and system for delivering on demand, individually targeted promotions
US5590038A (en) 1994-06-20 1996-12-31 Pitroda; Satyan G. Universal electronic transaction card including receipt storage and system and methods of conducting electronic transactions
US5513102A (en) 1994-06-28 1996-04-30 Auriemma Consulting Group, Inc. Data processing methods of implementing an award to an authorized user of a credit card
US5583933A (en) 1994-08-05 1996-12-10 Mark; Andrew R. Method and apparatus for the secure communication of data
US5642279A (en) 1994-08-09 1997-06-24 New England Audio Company Technique for utilizing a computer system to provide price protection to retail customers
US5637845A (en) 1994-12-12 1997-06-10 Usa Technologies, Inc. Credit and bank issued debit card operated system and method for controlling a prepaid card encoding/dispensing machine
US5544086A (en) 1994-09-30 1996-08-06 Electronic Payment Services, Inc. Information consolidation within a transaction network
JPH08123919A (en) 1994-10-28 1996-05-17 Mitsubishi Electric Corp Non-contact IC card system and communication method thereof
US5581064A (en) 1994-11-01 1996-12-03 Pennsylvania Food Merchants Association Automated coupon processing system employing coupon with identifying code and chosen second identifying code uniquely identifying the coupon
US5613012A (en) 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
US7248719B2 (en) 1994-11-28 2007-07-24 Indivos Corporation Tokenless electronic transaction system
US5615277A (en) 1994-11-28 1997-03-25 Hoffman; Ned Tokenless security system for authorizing access to a secured computer system
US6366682B1 (en) 1994-11-28 2002-04-02 Indivos Corporation Tokenless electronic transaction system
US5870723A (en) 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system
US5805719A (en) 1994-11-28 1998-09-08 Smarttouch Tokenless identification of individuals
US5664110A (en) 1994-12-08 1997-09-02 Highpoint Systems, Inc. Remote ordering system
US5705798A (en) 1994-12-16 1998-01-06 Mastercard International Inc. System and method for processing a customized financial transaction card
US5857079A (en) 1994-12-23 1999-01-05 Lucent Technologies Inc. Smart card for automatic financial records
US5745706A (en) 1994-12-30 1998-04-28 Wolfberg; Larry Computer system and related equipment for spending and investment account management
US5742775A (en) 1995-01-18 1998-04-21 King; Douglas L. Method and apparatus of creating financial instrument and administering an adjustable rate loan system
JPH08214281A (en) 1995-02-06 1996-08-20 Sony Corp Charging method and system
US5604542A (en) 1995-02-08 1997-02-18 Intel Corporation Using the vertical blanking interval for transporting electronic coupons
US5530235A (en) 1995-02-16 1996-06-25 Xerox Corporation Interactive contents revealing storage device
US5482139A (en) 1995-02-16 1996-01-09 M.A. Rivalto Inc. Automated drive-up vending facility
US6058378A (en) 1995-02-22 2000-05-02 Citibank, N.A. Electronic delivery system and method for integrating global financial services
US5689650A (en) 1995-02-23 1997-11-18 Mcclelland; Glenn B. Community reinvestment act network
US5696907A (en) 1995-02-27 1997-12-09 General Electric Company System and method for performing risk and credit analysis of financial service applications
US5689100A (en) 1995-03-21 1997-11-18 Martiz, Inc. Debit card system and method for implementing incentive award program
US5715399A (en) 1995-03-30 1998-02-03 Amazon.Com, Inc. Secure method and system for communicating a list of credit card numbers over a non-secure network
US6002383A (en) 1995-03-30 1999-12-14 Dai Nippon Printing Co., Ltd. Polymer dispersed liquid crystal (PDLC) film using heat or an electric field to change state and the other to change back
US5677955A (en) 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
US6321208B1 (en) 1995-04-19 2001-11-20 Brightstreet.Com, Inc. Method and system for electronic distribution of product redemption coupons
US5926800A (en) 1995-04-24 1999-07-20 Minerva, L.P. System and method for providing a line of credit secured by an assignment of a life insurance policy
CA2413051C (en) 1995-04-24 2006-10-31 United Video Properties, Inc. Electronic television program guide schedule system and method with remote product ordering
JP3047092B2 (en) 1995-05-02 2000-05-29 日本信販株式会社 Credit card system and method of using credit card using the system
US5734838A (en) 1995-05-04 1998-03-31 American Savings Bank, F.A. Database computer architecture for managing an incentive award program and checking float of funds at time of purchase
US5920844A (en) 1995-05-15 1999-07-06 Ricoh Company, Ltd. Information display method
US5708422A (en) 1995-05-31 1998-01-13 At&T Transaction authorization and alert system
US5684291A (en) 1995-06-01 1997-11-04 American Express Trs Refundable prepaid telephone card
US5727153A (en) 1995-06-06 1998-03-10 Powell; Ken R. Retail store having a system of receiving electronic coupon information from a portable card and sending the received coupon information to other portable cards
US5749075A (en) 1995-06-06 1998-05-05 Interactive Media Works, L.L.C. Method for providing prepaid internet access and/or long distance calling including the distribution of specialized calling cards
US5835061A (en) 1995-06-06 1998-11-10 Wayport, Inc. Method and apparatus for geographic-based communications service
US5692132A (en) 1995-06-07 1997-11-25 Mastercard International, Inc. System and method for conducting cashless transactions on a computer network
AU6380496A (en) 1995-06-07 1996-12-30 E-Comm Incorporated Handheld remote computer control and methods for secured int eractive real-time telecommunications
US5866889A (en) 1995-06-07 1999-02-02 Citibank, N.A. Integrated full service consumer banking system and system and method for opening an account
US5740549A (en) 1995-06-12 1998-04-14 Pointcast, Inc. Information and advertising distribution system and method
US5710886A (en) 1995-06-16 1998-01-20 Sellectsoft, L.C. Electric couponing method and apparatus
US5742845A (en) 1995-06-22 1998-04-21 Datascape, Inc. System for extending present open network communication protocols to communicate with non-standard I/O devices directly coupled to an open network
US5677521A (en) 1995-06-29 1997-10-14 Garrou; Elizabeth B. Personal identification and credit information system and method of performing transaction
US5790677A (en) 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
US5703344A (en) 1995-06-30 1997-12-30 Visa International Service Association Electronic funds confirmation at point of transaction
US6115458A (en) 1995-07-14 2000-09-05 American Express Travel Related Services Company, Inc. Method and apparatus for summaries of prepaid instrument transaction activity
US5745049A (en) 1995-07-20 1998-04-28 Yokogawa Electric Corporation Wireless equipment diagnosis system
US6223168B1 (en) 1995-07-25 2001-04-24 Bottomline Technologies, Inc. Automatic remittance delivery system
US6345766B1 (en) 1995-08-02 2002-02-12 American Express Travel Related Services Methods and apparatus for providing a prepaid, remote memory customer account for the visually impaired
US5832090A (en) 1995-08-10 1998-11-03 Hid Corporation Radio frequency transponder stored value system employing a secure encryption protocol
US5857175A (en) 1995-08-11 1999-01-05 Micro Enhancement International System and method for offering targeted discounts to customers
US5852812A (en) 1995-08-23 1998-12-22 Microsoft Corporation Billing system for a network
US5657390A (en) 1995-08-25 1997-08-12 Netscape Communications Corporation Secure socket layer application program apparatus and method
JPH0962808A (en) 1995-08-25 1997-03-07 Mitsubishi Electric Corp Contactless IC card and contactless IC card system
US5878141A (en) 1995-08-25 1999-03-02 Microsoft Corporation Computerized purchasing system and method for mediating purchase transactions over an interactive network
US5710887A (en) 1995-08-29 1998-01-20 Broadvision Computer system and method for electronic commerce
US5864609A (en) 1995-09-11 1999-01-26 At&T Corp. Method for establishing customized billing arrangements for a calling card in a telecommunications network
US5621787A (en) 1995-09-13 1997-04-15 Bell Atlantic Network Services, Inc. Prepaid cash card
US5721781A (en) 1995-09-13 1998-02-24 Microsoft Corporation Authentication system and method for smart card transactions
US5724423A (en) 1995-09-18 1998-03-03 Telefonaktiebolaget Lm Ericsson Method and apparatus for user authentication
US5859419A (en) 1995-09-28 1999-01-12 Sol H. Wynn Programmable multiple company credit card system
US6138917A (en) 1995-10-02 2000-10-31 International Card Technology Multiple magnetic stripe transaction cards and systems for the utilization thereof
US5883377A (en) 1995-11-20 1999-03-16 International Card Technologies, Inc. Multiple magnetic stripe transaction cards and systems for the utilization thereof
US5984191A (en) 1995-11-20 1999-11-16 International Card Technology Multiple magnetic stripe transaction cards and systems for the utilization thereof
US5774670A (en) 1995-10-06 1998-06-30 Netscape Communications Corporation Persistent client state in a hypertext transfer protocol based client-server system
US5765141A (en) 1995-10-06 1998-06-09 Spector; Donald Computerized merchandising system
US5806042A (en) 1995-10-11 1998-09-08 Kelly; William Franklin System for designing and implementing bank owned life insurance (BOLI) with a reinsurance option
US6036099A (en) 1995-10-17 2000-03-14 Leighton; Keith Hot lamination process for the manufacture of a combination contact/contactless smart card and product resulting therefrom
DE19539355A1 (en) 1995-10-23 1997-04-24 Giesecke & Devrient Gmbh Method for checking the authenticity of a data carrier
US5699528A (en) 1995-10-31 1997-12-16 Mastercard International, Inc. System and method for bill delivery and payment over a communications network
US5764770A (en) 1995-11-07 1998-06-09 Trimble Navigation Limited Image authentication patterning
US6186793B1 (en) 1995-11-07 2001-02-13 Randall E. Brubaker Process to convert cost and location of a number of actual contingent events within a region into a three dimensional surface over a map that provides for every location within the region its own estimate of expected cost for future contingent events
US5832211A (en) 1995-11-13 1998-11-03 International Business Machines Corporation Propagating plain-text passwords from a main registry to a plurality of foreign registries
US5838903A (en) 1995-11-13 1998-11-17 International Business Machines Corporation Configurable password integrity servers for use in a shared resource environment
US5862323A (en) 1995-11-13 1999-01-19 International Business Machines Corporation Retrieving plain-text passwords from a main registry by a plurality of foreign registries
US5787404A (en) 1995-11-21 1998-07-28 Fernandez-Holmann; Ernesto Credit-card based retirement fund system and method
CH690048A5 (en) 1995-11-28 2000-03-31 C Sam S A En Formation C O Jue Safety device controlling access to a computer or a network terminal.
US5706452A (en) 1995-12-06 1998-01-06 Ivanov; Vladimir I. Method and apparatus for structuring and managing the participatory evaluation of documents by a plurality of reviewers
US5809478A (en) 1995-12-08 1998-09-15 Allstate Insurance Company Method for accessing and evaluating information for processing an application for insurance
US5907142A (en) 1995-12-12 1999-05-25 Kelsey; Craig E. Fraud resistant personally activated transaction card
US5774870A (en) 1995-12-14 1998-06-30 Netcentives, Inc. Fully integrated, on-line interactive frequency and award redemption program
US6016482A (en) 1996-01-11 2000-01-18 Merrill Lynch & Co., Inc. Enhanced collateralized funding processor
US6141666A (en) 1996-01-22 2000-10-31 Internet Consultants Llc Method and system for customizing marketing services on networks communicating with hypertext tagging conventions
US5777903A (en) 1996-01-22 1998-07-07 Motorola, Inc. Solar cell powered smart card with integrated display and interface keypad
US5777305A (en) 1996-01-24 1998-07-07 Incomm Package assembly and method for activating prepaid debit cards
US5819237A (en) 1996-02-13 1998-10-06 Financial Engineering Associates, Inc. System and method for determination of incremental value at risk for securities trading
US5781909A (en) 1996-02-13 1998-07-14 Microtouch Systems, Inc. Supervised satellite kiosk management system with combined local and remote data storage
US5665953A (en) 1996-02-14 1997-09-09 Lobar Code Inc. Self-contained personal data collector for redeeming coupons
US5806044A (en) 1996-02-20 1998-09-08 Powell; Ken R. System and method for distributing coupons through a system of computer networks
US5870718A (en) 1996-02-26 1999-02-09 Spector; Donald Computer-printer terminal for producing composite greeting and gift certificate card
EP0803832A3 (en) 1996-02-28 2000-05-31 Hitachi, Ltd. Card holder-type balance display
WO1997033416A1 (en) 1996-03-07 1997-09-12 American Express Travel Related Services Company, Inc. Methods and apparatus for providing a prepaid, remote memory transaction account with voice indicia
US5887065A (en) 1996-03-22 1999-03-23 Activcard System and method for user authentication having clock synchronization
US5802176A (en) 1996-03-22 1998-09-01 Activcard System for controlling access to a function, using a plurality of dynamic encryption variables
US5737421A (en) 1996-03-22 1998-04-07 Activcard System for controlling access to a function having clock synchronization
US5937068A (en) 1996-03-22 1999-08-10 Activcard System and method for user authentication employing dynamic encryption variables
JPH09259239A (en) 1996-03-25 1997-10-03 Toshiba Corp Mobile terminal device for IC card
US5728998A (en) 1996-03-29 1998-03-17 Motorola, Inc. Secure smart card reader with virtual image display and pull-down options
US6097292A (en) 1997-04-01 2000-08-01 Cubic Corporation Contactless proximity automated data collection system and method
US5815665A (en) 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network
US6044360A (en) 1996-04-16 2000-03-28 Picciallo; Michael J. Third party credit card
US6014645A (en) 1996-04-19 2000-01-11 Block Financial Corporation Real-time financial card application system
US5815657A (en) 1996-04-26 1998-09-29 Verifone, Inc. System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
US5848396A (en) 1996-04-26 1998-12-08 Freedom Of Information, Inc. Method and apparatus for determining behavioral profile of a computer user
US6014638A (en) 1996-05-29 2000-01-11 America Online, Inc. System for customizing computer displays in accordance with user preferences
US5704046A (en) 1996-05-30 1997-12-30 Mastercard International Inc. System and method for conducting cashless transactions
US6049782A (en) 1996-05-31 2000-04-11 Citibank, N.A. Relationship management system and process for pricing financial instruments based on a customer's relationship with a financial institution
US5826023A (en) 1996-06-03 1998-10-20 International Business Machines Corporation Communications tunneling
US5864871A (en) 1996-06-04 1999-01-26 Multex Systems Information delivery system and method including on-line entitlements
US6076072A (en) 1996-06-10 2000-06-13 Libman; Richard Marc Method and apparatus for preparing client communications involving financial products and services
US5987434A (en) 1996-06-10 1999-11-16 Libman; Richard Marc Apparatus and method for transacting marketing and sales of financial products
US20040039588A1 (en) 1996-06-10 2004-02-26 Libman Richard M. System, method, and computer program product for selecting and presenting financial products and services
US7774230B2 (en) 1996-06-10 2010-08-10 Phoenix Licensing, Llc System, method, and computer program product for selecting and presenting financial products and services
US6999938B1 (en) 1996-06-10 2006-02-14 Libman Richard M Automated reply generation direct marketing system
FR2750274B1 (en) 1996-06-21 1998-07-24 Arditti David PROCEDURE FOR TAKING INTO ACCOUNT A REQUEST FOR THE USE OF A VIRTUAL PREPAID CARD ALLOWING THE REUSE OF ITS SERIAL NUMBER
US5845259A (en) 1996-06-27 1998-12-01 Electronic Consumer Concepts, L.L.C. Electronic coupon dispensing system
JPH1021551A (en) 1996-06-28 1998-01-23 Victor Co Of Japan Ltd Method for reproducing information recording medium
US6070147A (en) 1996-07-02 2000-05-30 Tecmark Services, Inc. Customer identification and marketing analysis systems
US5770843A (en) 1996-07-02 1998-06-23 Ncr Corporation Access card for multiple accounts
ATE206228T1 (en) 1996-07-09 2001-10-15 Ldc Direct Ltd Co SALES SYSTEM FOR PREPAID CARDS IN SALES OFFICE
US5890138A (en) 1996-08-26 1999-03-30 Bid.Com International Inc. Computer auction system
US5819234A (en) 1996-07-29 1998-10-06 The Chase Manhattan Bank Toll collection system
US6004681A (en) 1996-08-02 1999-12-21 The Ohio State University Research Foundation Light-emitting devices containing network electrode polymers in electron blocking layer
US5770849A (en) 1996-08-23 1998-06-23 Motorola, Inc. Smart card device with pager and visual image display
US5734154A (en) 1996-09-03 1998-03-31 Motorola, Inc. Smart card with Iintegrated reader and visual image display
US5897620A (en) 1997-07-08 1999-04-27 Priceline.Com Inc. Method and apparatus for the sale of airline-specified flight tickets
US6065679A (en) 1996-09-06 2000-05-23 Ivi Checkmate Inc. Modular transaction terminal
US5789733A (en) 1996-09-20 1998-08-04 Motorola, Inc. Smart card with contactless optical interface
US5933817A (en) 1996-09-27 1999-08-03 Hucal; Stephen J. Tiered interest rate revolving credit system and method
US6085172A (en) 1996-10-02 2000-07-04 Nintendo Of America Inc. Method and apparatus for efficient handling of product return transactions
US5953710A (en) 1996-10-09 1999-09-14 Fleming; Stephen S. Children's credit or debit card system
US5839113A (en) 1996-10-30 1998-11-17 Okemos Agency, Inc. Method and apparatus for rating geographical areas using meteorological conditions
US7137006B1 (en) 1999-09-24 2006-11-14 Citicorp Development Center, Inc. Method and system for single sign-on user access to multiple web servers
US5905246A (en) 1996-10-31 1999-05-18 Fajkowski; Peter W. Method and apparatus for coupon management and redemption
US5796827A (en) 1996-11-14 1998-08-18 International Business Machines Corporation System and method for near-field human-body coupling for encrypted communication with identification cards
EP0880738A1 (en) 1996-11-15 1998-12-02 Koninklijke Philips Electronics N.V. Data processing circuit with a self-timed instruction execution unit
US5884274A (en) 1996-11-15 1999-03-16 Walker Asset Management Limited Partnership System and method for generating and executing insurance policies for foreign exchange losses
US7080036B1 (en) 1996-11-27 2006-07-18 Diebold, Incorporated Automated banking machine development method
US5923016A (en) 1996-12-03 1999-07-13 Carlson Companies, Inc. In-store points redemption system & method
US6498861B1 (en) 1996-12-04 2002-12-24 Activcard Ireland Limited Biometric security encryption system
US6076167A (en) 1996-12-04 2000-06-13 Dew Engineering And Development Limited Method and system for improving security in network applications
US5991748A (en) 1996-12-06 1999-11-23 American Express Travel Related Services Company, Inc. Methods and apparatus for regenerating a prepaid transaction account
US5760381A (en) 1996-12-16 1998-06-02 Moore Business Forms, Inc. Prepaid card
JP3592016B2 (en) 1996-12-27 2004-11-24 株式会社日立製作所 Remote procedure call processing method
US5915244A (en) 1996-12-31 1999-06-22 Bi Performance Services Computerized incentive program with plateau pricing and remote award redemption
US5923552A (en) 1996-12-31 1999-07-13 Buildnet, Inc. Systems and methods for facilitating the exchange of information between separate business entities
US6161113A (en) 1997-01-21 2000-12-12 Texas Instruments Incorporated Computer-aided project notebook
US5961593A (en) 1997-01-22 1999-10-05 Lucent Technologies, Inc. System and method for providing anonymous personalized browsing by a proxy system in a network
US5884278A (en) 1997-02-11 1999-03-16 Powell; Ken R. Retail store and method employing multiple network interfaces at each cash register, and receiving signals from portable cards at each cash register
US5864830A (en) 1997-02-13 1999-01-26 Armetta; David Data processing method of configuring and monitoring a satellite spending card linked to a host credit card
US6119932A (en) 1997-02-18 2000-09-19 Protech Video Security, Inc. Identification verification apparatus and method
US5857709A (en) 1997-02-24 1999-01-12 Chock; Ernest P. Anticounterfeit documentation with see-through and write-able hologram
US5884312A (en) 1997-02-28 1999-03-16 Electronic Data Systems Corporation System and method for securely accessing information from disparate data sources through a network
US5970478A (en) 1997-03-12 1999-10-19 Walker Asset Management Limited Partnership Method, apparatus, and program for customizing credit accounts
US6684384B1 (en) 1997-03-28 2004-01-27 International Business Machines Corporation Extensible object oriented framework for general ledger
US6278996B1 (en) 1997-03-31 2001-08-21 Brightware, Inc. System and method for message process and response
WO1998044442A1 (en) 1997-04-02 1998-10-08 Citibank, N.A. Method and system for standardizing and reconciling invoices from vendors
US6182059B1 (en) 1997-04-03 2001-01-30 Brightware, Inc. Automatic electronic message interpretation and routing system
US6202158B1 (en) 1997-04-11 2001-03-13 Hitachi, Ltd. Detection method of illegal access to computer system
US5970480A (en) 1997-04-14 1999-10-19 Kalina; Dyan T. Centralized credit interchange system of converting purchase credit awards through credit exchange system for purchase of investment vehicle
US6243688B1 (en) 1997-04-14 2001-06-05 Dyan T. Kalina Internet-based credit interchange system of converting purchase credit awards through credit exchange system for purchase of investment vehicle
US6868391B1 (en) 1997-04-15 2005-03-15 Telefonaktiebolaget Lm Ericsson (Publ) Tele/datacommunications payment method and apparatus
US6014636A (en) 1997-05-06 2000-01-11 Lucent Technologies Inc. Point of sale method and system
JP4212068B2 (en) 1997-05-19 2009-01-21 ローム株式会社 IC card and IC chip module
US6081893A (en) 1997-05-28 2000-06-27 Symantec Corporation System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
US6278981B1 (en) 1997-05-29 2001-08-21 Algorithmics International Corporation Computer-implemented method and apparatus for portfolio compression
US5987454A (en) 1997-06-09 1999-11-16 Hobbs; Allen Method and apparatus for selectively augmenting retrieved text, numbers, maps, charts, still pictures and/or graphics, moving pictures and/or graphics and audio information from a network resource
US20010047342A1 (en) 1997-06-16 2001-11-29 Vincent Cuervo Credit or debit cards of all kinds to be issued with a bank savings account attched
US6405182B1 (en) 1998-08-03 2002-06-11 Vincent Cuervo System for dispensing prepaid debit cards through point-of-sale terminals
US20020174016A1 (en) 1997-06-16 2002-11-21 Vincent Cuervo Multiple accounts and purposes card method and system
BR9810938A (en) 1997-06-25 2000-09-26 Inforonics Inc Device and method for identifying customers accessing network sites.
IL121192A0 (en) 1997-06-30 1997-11-20 Ultimus Ltd Processing system and method for a heterogeneous electronic cash environment
US6044402A (en) 1997-07-02 2000-03-28 Iowa State University Research Foundation Network connection blocker, method, and computer readable memory for monitoring connections in a computer network and blocking the unwanted connections
US6000608A (en) 1997-07-10 1999-12-14 Dorf; Robert E. Multifunction card system
US6295522B1 (en) 1997-07-11 2001-09-25 Cybercash, Inc. Stored-value card value acquisition method and apparatus
US6006988A (en) 1997-07-15 1999-12-28 Behrmann; Bry E. Non-cash media card and process of dispensing from automated teller
US6078888A (en) 1997-07-16 2000-06-20 Gilbarco Inc. Cryptography security for remote dispenser transactions
US6049463A (en) 1997-07-25 2000-04-11 Motorola, Inc. Microelectronic assembly including an antenna element embedded within a polymeric card, and method for forming same
WO1999005633A1 (en) 1997-07-25 1999-02-04 Main Street Marketing Automated credit card payment system
US20020002675A1 (en) 1997-08-06 2002-01-03 Ronald Roscoe Bush Secure encryption of data packets for transmission over unsecured networks
US6016476A (en) 1997-08-11 2000-01-18 International Business Machines Corporation Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security
US5903878A (en) 1997-08-20 1999-05-11 Talati; Kirit K. Method and apparatus for electronic commerce
FR2767624B1 (en) 1997-08-21 2002-05-10 Activcard ELECTRONIC PORTABLE DEVICE FOR SECURE COMMUNICATION SYSTEM, AND METHOD FOR INITIALIZING ITS PARAMETERS
US6163771A (en) * 1997-08-28 2000-12-19 Walker Digital, Llc Method and device for generating a single-use financial account number
US6026370A (en) 1997-08-28 2000-02-15 Catalina Marketing International, Inc. Method and apparatus for generating purchase incentive mailing based on prior purchase history
US5974399A (en) 1997-08-29 1999-10-26 Catalina Marketing International, Inc. Method and apparatus for generating purchase incentives based on price differentials
US6213391B1 (en) 1997-09-10 2001-04-10 William H. Lewis Portable system for personal identification based upon distinctive characteristics of the user
US6718482B2 (en) 1997-09-12 2004-04-06 Hitachi, Ltd. Fault monitoring system
US6000832A (en) 1997-09-24 1999-12-14 Microsoft Corporation Electronic online commerce card with customer generated transaction proxy number for online transactions
US5883810A (en) 1997-09-24 1999-03-16 Microsoft Corporation Electronic online commerce card with transactionproxy number for online transactions
US7225249B1 (en) 1997-09-26 2007-05-29 Mci, Llc Integrated systems for providing communications network management services and interactive generating invoice documents
US6385644B1 (en) 1997-09-26 2002-05-07 Mci Worldcom, Inc. Multi-threaded web based user inbox for report management
US6574603B1 (en) 1997-09-26 2003-06-03 Gilbarco Inc. In-vehicle ordering
US6438666B2 (en) 1997-09-26 2002-08-20 Hughes Electronics Corporation Method and apparatus for controlling access to confidential data by analyzing property inherent in data
US5984180A (en) 1997-10-06 1999-11-16 Albrecht; Jerry L. Method and system for gift credit card
US6128599A (en) 1997-10-09 2000-10-03 Walker Asset Management Limited Partnership Method and apparatus for processing customized group reward offers
US6484149B1 (en) 1997-10-10 2002-11-19 Microsoft Corporation Systems and methods for viewing product information, and methods for generating web pages
US6049773A (en) 1997-10-14 2000-04-11 Reclaim Technology And Services Limited Automated method for identification of reinsurance claims
US6422459B1 (en) 1997-10-15 2002-07-23 Citicorp Development Center, Inc. Method and system for off-line loading of stored value cards using a batch-load terminal
US6026398A (en) 1997-10-16 2000-02-15 Imarket, Incorporated System and methods for searching and matching databases
US6061660A (en) 1997-10-20 2000-05-09 York Eggleston System and method for incentive programs and award fulfillment
DE69807513T2 (en) 1997-10-22 2003-04-24 Cambridge Consultants Ltd., Cambridge PORTABLE CHIP CARD
US5991750A (en) 1997-10-24 1999-11-23 Ge Capital System and method for pre-authorization of individual account transactions
US6047268A (en) 1997-11-04 2000-04-04 A.T.&T. Corporation Method and apparatus for billing for transactions conducted over the internet
US6038292A (en) 1997-11-07 2000-03-14 American Express Travel Related Services Company, Inc. Methods and apparatus for language registration of prepaid, remote entry customer account
EP0917119A3 (en) 1997-11-12 2001-01-10 Citicorp Development Center, Inc. Distributed network based electronic wallet
US6009411A (en) 1997-11-14 1999-12-28 Concept Shopping, Inc. Method and system for distributing and reconciling electronic promotions
US6202066B1 (en) 1997-11-19 2001-03-13 The United States Of America As Represented By The Secretary Of Commerce Implementation of role/group permission association using object access type
US6070153A (en) 1997-11-21 2000-05-30 Simpson; Mark S. System and method for automatically investing a portion of a credit card interest charged amount in an investment account
US6078891A (en) 1997-11-24 2000-06-20 Riordan; John Method and system for collecting and processing marketing data
US6065120A (en) 1997-12-09 2000-05-16 Phone.Com, Inc. Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices
US6038552A (en) 1997-12-10 2000-03-14 The Chase Manhattan Bank Method and apparatus to process combined credit and debit card transactions
US6092057A (en) 1997-12-12 2000-07-18 Commstar, Inc. Unattended POS system for automatic control of bank system rejections
FI105249B (en) 1997-12-18 2000-06-30 More Magic Software Mms Oy Procedure and arrangements for connecting information to network resources
WO1999033033A2 (en) 1997-12-19 1999-07-01 Visa International Service Association Card activation at point of distribution
US6105006A (en) 1997-12-22 2000-08-15 Motorola Inc Transaction authentication for 1-way wireless financial messaging units
US6188309B1 (en) 1998-01-07 2001-02-13 At&T Corp Method and apparatus for minimizing credit card fraud
US6092192A (en) 1998-01-16 2000-07-18 International Business Machines Corporation Apparatus and methods for providing repetitive enrollment in a plurality of biometric recognition systems based on an initial enrollment
US6064985A (en) 1998-01-21 2000-05-16 Assured Equities, Inc. Automated portfolio management system with internet datafeed
US6202053B1 (en) 1998-01-23 2001-03-13 First Usa Bank, Na Method and apparatus for generating segmentation scorecards for evaluating credit risk of bank card applicants
US6068183A (en) 1998-04-17 2000-05-30 Viztec Inc. Chip card system
US6019284A (en) 1998-01-27 2000-02-01 Viztec Inc. Flexible chip card with display
US6098053A (en) 1998-01-28 2000-08-01 Citibank, N.A. System and method for performing an electronic financial transaction
US6029139A (en) 1998-01-28 2000-02-22 Ncr Corporation Method and apparatus for optimizing promotional sale of products based upon historical data
GB9801978D0 (en) 1998-01-30 1998-03-25 Orbital Technologies Limited Information systems
AU2586299A (en) 1998-02-06 1999-08-23 Manning & Napier Information Services Method of updating display frames while preserving information associated therewith
US6173267B1 (en) 1998-02-24 2001-01-09 Laurie Cairns Method for product promotion
US6095416A (en) 1998-02-24 2000-08-01 Privicom, Inc. Method and device for preventing unauthorized use of credit cards
US6105011A (en) 1998-03-19 2000-08-15 First Union Corporation Security system and method for business transactions with customers
US6519763B1 (en) 1998-03-30 2003-02-11 Compuware Corporation Time management and task completion and prediction software
US6182220B1 (en) 1998-03-30 2001-01-30 International Business Machines Corporation System and method for building and exchanging encrypted passwords between a client and server
US6422462B1 (en) 1998-03-30 2002-07-23 Morris E. Cohen Apparatus and methods for improved credit cards and credit card transactions
US6385652B1 (en) 1998-04-16 2002-05-07 Citibank, N.A. Customer access solutions architecture
US6450407B1 (en) 1998-04-17 2002-09-17 Viztec, Inc. Chip card rebate system
US6315195B1 (en) 1998-04-17 2001-11-13 Diebold, Incorporated Transaction apparatus and method
US20020198806A1 (en) 1998-04-24 2002-12-26 First Data Corporation Systems and methods for accessing and modifying usage parameters associated with a financial transaction account
US6463039B1 (en) 1998-04-24 2002-10-08 Intelligent Ideation, Inc. Method and apparatus for full duplex sideband communication
US6160903A (en) 1998-04-24 2000-12-12 Dew Engineering And Development Limited Method of providing secure user access
US6219639B1 (en) 1998-04-28 2001-04-17 International Business Machines Corporation Method and apparatus for recognizing identity of individuals employing synchronized biometrics
EP0959440A3 (en) 1998-05-22 2000-05-17 Citicorp Development Center, Inc. System and method for automated electronic scrip transactions
US6148297A (en) 1998-06-01 2000-11-14 Surgical Safety Products, Inc. Health care information and data tracking system and method
US6129274A (en) 1998-06-09 2000-10-10 Fujitsu Limited System and method for updating shopping transaction history using electronic personal digital shopping assistant
GB2377071B (en) 1998-06-22 2003-02-12 First Usa Bank Debit purchasing of stored value card for use by and/or delivery to others
US6029890A (en) 1998-06-22 2000-02-29 Austin; Frank User-Specified credit card system
US6615189B1 (en) 1998-06-22 2003-09-02 Bank One, Delaware, National Association Debit purchasing of stored value card for use by and/or delivery to others
US5931764A (en) 1998-06-24 1999-08-03 Viztec, Inc. Wearable device with flexible display
US6349290B1 (en) 1998-06-30 2002-02-19 Citibank, N.A. Automated system and method for customized and personalized presentation of products and services of a financial institution
US6122623A (en) 1998-07-02 2000-09-19 Financial Engineering Associates, Inc. Watershed method for controlling cashflow mapping in value at risk determination
US6105865A (en) 1998-07-17 2000-08-22 Hardesty; Laurence Daniel Financial transaction system with retirement saving benefit
US6067531A (en) 1998-07-21 2000-05-23 Mci Communications Corporation Automated contract negotiator/generation system and method
US6470357B1 (en) 1998-07-28 2002-10-22 International Bussiness Machines Corp. System and method of enhanced directory services for telecommunications management network applications
US6580814B1 (en) 1998-07-31 2003-06-17 International Business Machines Corporation System and method for compressing biometric models
DE19834515C1 (en) 1998-07-31 2000-03-16 Deutsche Telekom Ag Electronic dog tag
US6163770A (en) 1998-08-25 2000-12-19 Financial Growth Resources, Inc. Computer apparatus and method for generating documentation using a computed value for a claims cost affected by at least one concurrent, different insurance policy for the same insured
US6256664B1 (en) 1998-09-01 2001-07-03 Bigfix, Inc. Method and apparatus for computed relevance messaging
KR100437007B1 (en) 1998-09-11 2004-06-23 모토로라 인코포레이티드 Radio frequency identification tag apparatus and related method
US6601761B1 (en) 1998-09-15 2003-08-05 Citibank, N.A. Method and system for co-branding an electronic payment platform such as an electronic wallet
US6607136B1 (en) 1998-09-16 2003-08-19 Beepcard Inc. Physical presence digital authentication system
CA2345241A1 (en) 1998-09-22 2000-03-30 Science Applications International Corporation User-defined dynamic collaborative environments
US6609111B1 (en) 1998-10-22 2003-08-19 Lawrence L. Bell Method and apparatus for modeling and executing deferred award instrument plan
US6161096A (en) 1998-10-22 2000-12-12 Bell; Lawrence L. Method and apparatus for modeling and executing deferred award instrument plan
US6473500B1 (en) 1998-10-28 2002-10-29 Mastercard International Incorporated System and method for using a prepaid card
US6182894B1 (en) 1998-10-28 2001-02-06 American Express Travel Related Services Company, Inc. Systems and methods for authorizing a transaction card
US6999569B2 (en) 1998-10-28 2006-02-14 Mastercard International Incorporated System and method for using a prepaid card
US6363381B1 (en) 1998-11-03 2002-03-26 Ricoh Co., Ltd. Compressed document matching
US7010512B1 (en) 1998-11-09 2006-03-07 C/Base, Inc. Transfer instrument
US6164533A (en) 1998-11-12 2000-12-26 Barton; Blain Point of sale automatic savings program contribution system
US6343361B1 (en) 1998-11-13 2002-01-29 Tsunami Security, Inc. Dynamic challenge-response authentication and verification of identity of party sending or receiving electronic communication
US6032136A (en) 1998-11-17 2000-02-29 First Usa Bank, N.A. Customer activated multi-value (CAM) card
US6182048B1 (en) 1998-11-23 2001-01-30 General Electric Company System and method for automated risk-based pricing of a vehicle warranty insurance policy
US20010044293A1 (en) 1998-11-30 2001-11-22 Joseph La Mance Morgan System and method for global real-time account tracking
US6167385A (en) 1998-11-30 2000-12-26 The Chase Manhattan Bank Supply chain financing system and method
US6560578B2 (en) 1999-03-12 2003-05-06 Expanse Networks, Inc. Advertisement selection system supporting discretionary target market characteristics
US6624761B2 (en) 1998-12-11 2003-09-23 Realtime Data, Llc Content independent data compression method and system
JP2000182086A (en) 1998-12-18 2000-06-30 Toshiba Corp Ticket issuing method and ticket matching method
US6327578B1 (en) 1998-12-29 2001-12-04 International Business Machines Corporation Four-party credit/debit payment protocol
US6490601B1 (en) 1999-01-15 2002-12-03 Infospace, Inc. Server for enabling the automatic insertion of data into electronic forms on a user computer
JP3437933B2 (en) 1999-01-21 2003-08-18 インターナショナル・ビジネス・マシーンズ・コーポレーション Browser sharing method and system
US6507912B1 (en) 1999-01-27 2003-01-14 International Business Machines Corporation Protection of biometric data via key-dependent sampling
US6317834B1 (en) 1999-01-29 2001-11-13 International Business Machines Corporation Biometric authentication system with encrypted models
US6651168B1 (en) 1999-01-29 2003-11-18 International Business Machines, Corp. Authentication framework for multiple authentication processes and mechanisms
US6263316B1 (en) 1999-02-02 2001-07-17 Momente, Llc Automated process for retailing to a vehicle occupant
IL128720A (en) 1999-02-25 2009-06-15 Cidway Technologies Ltd Method for certification of over the phone transactions
US6467684B2 (en) 1999-03-02 2002-10-22 Netvisions, Inc. Pre-paid card system for purchasing products or services
JP2003524815A (en) 1999-03-02 2003-08-19 クイックスター インヴェストメンツ,インコーポレイテッド E-commerce in marketing systems, including membership purchase opportunities
US6625582B2 (en) 1999-03-12 2003-09-23 Richman/Singer Venture Method and system for converting a designated portion of future social security and other retirement payments to current benefits
US6373969B1 (en) 1999-03-15 2002-04-16 Activcard Ireland, Limited Corrective optical component
US6081900A (en) 1999-03-16 2000-06-27 Novell, Inc. Secure intranet access
US6498657B1 (en) 1999-03-17 2002-12-24 Prout Ag Programmable data extractor, data analyzer, and printer report generator
US6484144B2 (en) 1999-03-23 2002-11-19 Dental Medicine International L.L.C. Method and system for healthcare treatment planning and assessment
US6751654B2 (en) 1999-03-31 2004-06-15 International Business Machines Corporation Simulating web cookies for non-cookie capable browsers
US6907566B1 (en) 1999-04-02 2005-06-14 Overture Services, Inc. Method and system for optimum placement of advertisements on a webpage
US6589291B1 (en) 1999-04-08 2003-07-08 International Business Machines Corporation Dynamically determining the most appropriate location for style sheet application
US6487641B1 (en) 1999-04-19 2002-11-26 Oracle Corporation Dynamic caches with miss tables
WO2000065566A1 (en) 1999-04-26 2000-11-02 Ronald Katz Point of sale terminal for the visually impaired
US6145741A (en) 1999-04-27 2000-11-14 Wisdom; Juanita J. Universal pre-paid gasoline and travel card
JP5116920B2 (en) 1999-04-30 2013-01-09 ペイパル, インコーポレイテッド System and method for electronically exchanging value between distributed users
US6609113B1 (en) 1999-05-03 2003-08-19 The Chase Manhattan Bank Method and system for processing internet payments using the electronic funds transfer network
US6684248B1 (en) 1999-05-03 2004-01-27 Certifiedmail.Com, Inc. Method of transferring data from a sender to a recipient during which a unique account for the recipient is automatically created if the account does not previously exist
US6609106B1 (en) 1999-05-07 2003-08-19 Steven C. Robertson System and method for providing electronic multi-merchant gift registry services over a distributed network
US6227447B1 (en) 1999-05-10 2001-05-08 First Usa Bank, Na Cardless payment system
US6385591B1 (en) 1999-05-11 2002-05-07 Jeffrey W. Mankoff Method and system for electronic organization of coupons
US6226752B1 (en) 1999-05-11 2001-05-01 Sun Microsystems, Inc. Method and apparatus for authenticating users
US6345261B1 (en) 1999-09-21 2002-02-05 Stockback Holdings, Inc. Customer loyalty investment program
JP3550509B2 (en) 1999-05-26 2004-08-04 松下電器産業株式会社 Image recording / reproducing device, image reproducing device, and unauthorized use prevention method
WO2000075820A2 (en) 1999-06-02 2000-12-14 Algorithmics International Corp. Risk management system, distributed framework and method
US6393479B1 (en) 1999-06-04 2002-05-21 Webside Story, Inc. Internet website traffic flow analysis
US7089203B1 (en) 1999-06-04 2006-08-08 Crookshanks Rex J Building construction bid and contract management system, internet-based method and computer program therefor
US6697947B1 (en) 1999-06-17 2004-02-24 International Business Machines Corporation Biometric based multi-party authentication
US6594640B1 (en) 1999-06-23 2003-07-15 Richard Postrel System for electronic barter, trading and redeeming points accumulated in frequent use reward programs
US7188181B1 (en) 1999-06-30 2007-03-06 Sun Microsystems, Inc. Universal session sharing
US6397202B1 (en) 1999-07-01 2002-05-28 The United States Of America As Represented By The Secretary Of The Navy System and method for monitoring risk in a system development program
US20020026418A1 (en) 1999-07-02 2002-02-28 Adam Koppel Method for providing pre-paid anonymous electronic debit card compatible with existing network of credit cards
US7058817B1 (en) 1999-07-02 2006-06-06 The Chase Manhattan Bank System and method for single sign on process for websites with multiple applications and services
US20050075932A1 (en) 1999-07-07 2005-04-07 Mankoff Jeffrey W. Delivery, organization, and redemption of virtual offers from the internet, interactive-tv, wireless devices and other electronic means
US6868426B1 (en) 1999-07-07 2005-03-15 Jeffrey W. Mankoff Virtual document organizer system and method
US7593862B2 (en) 1999-07-07 2009-09-22 Jeffrey W. Mankoff Delivery, organization, and redemption of virtual offers from the internet, interactive-TV, wireless devices and other electronic means
US20020120627A1 (en) 1999-07-07 2002-08-29 Mankoff Jeffrey W. Virtual document organizer system and method
US20050071230A1 (en) 1999-07-07 2005-03-31 Mankoff Jeffrey W. Delivery, organization, and redemption of virtual offers from the internet, interactive-TV, wireless devices and other electronic means
US6584505B1 (en) 1999-07-08 2003-06-24 Microsoft Corporation Authenticating access to a network server without communicating login information through the network server
US6789115B1 (en) 1999-07-09 2004-09-07 Merrill Lynch & Company System for collecting, analyzing, and reporting high volume multi-web server usage
US20030105672A1 (en) 1999-07-09 2003-06-05 Epstein John B. Method and apparatus to facilitate payment over a computer network
US6718535B1 (en) 1999-07-30 2004-04-06 Accenture Llp System, method and article of manufacture for an activity framework design in an e-commerce based environment
US6386444B1 (en) 1999-07-30 2002-05-14 First Usa Bank, N.A. System and methods for card payment instrument with rebate applied to an insurance premium
US6401125B1 (en) 1999-08-05 2002-06-04 Nextpage, Inc. System and method for maintaining state information between a web proxy server and its clients
US6668322B1 (en) 1999-08-05 2003-12-23 Sun Microsystems, Inc. Access management system and method employing secure credentials
US6446053B1 (en) 1999-08-06 2002-09-03 Michael Elliott Computer-implemented method and system for producing a proposal for a construction project
US6449765B1 (en) 1999-08-09 2002-09-10 Acceleration Software International Corporation Varying web page link based on user and web page status
US6763388B1 (en) 1999-08-10 2004-07-13 Akamai Technologies, Inc. Method and apparatus for selecting and viewing portions of web pages
US6957337B1 (en) 1999-08-11 2005-10-18 International Business Machines Corporation Method and apparatus for secure authorization and identification using biometrics without privacy invasion
US6505168B1 (en) 1999-08-16 2003-01-07 First Usa Bank, Na System and method for gathering and standardizing customer purchase information for target marketing
US6339423B1 (en) 1999-08-23 2002-01-15 Entrust, Inc. Multi-domain access control
US6785810B1 (en) 1999-08-31 2004-08-31 Espoc, Inc. System and method for providing secure transmission, search, and storage of data
US6581839B1 (en) 1999-09-07 2003-06-24 American Express Travel Related Services Company, Inc. Transaction card
US7070112B2 (en) 1999-09-07 2006-07-04 American Express Travel Related Services Company, Inc. Transparent transaction device
US6574348B1 (en) 1999-09-07 2003-06-03 Microsoft Corporation Technique for watermarking an image and a resulting watermarked image
US7424543B2 (en) 1999-09-08 2008-09-09 Rice Iii James L System and method of permissive data flow and application transfer
WO2001018656A1 (en) 1999-09-09 2001-03-15 Percussion Software, Inc. Virtual server system for dynamic content in world wide web pages
US20020023108A1 (en) 1999-09-09 2002-02-21 Neil Daswani Automatic web form interaction proxy
ZA200201566B (en) 1999-09-15 2003-05-26 Edward A Devlin Method and system for redeeming products marketing rebates.
EP1089516B1 (en) 1999-09-24 2006-11-08 Citicorp Development Center, Inc. Method and system for single sign-on user access to multiple web servers
US6826696B1 (en) 1999-10-12 2004-11-30 Webmd, Inc. System and method for enabling single sign-on for networked applications
US6814282B2 (en) 1999-10-26 2004-11-09 First Data Corporation Systems and methods of introducing and receiving information across a computer network
US20050160272A1 (en) 1999-10-28 2005-07-21 Timecertain, Llc System and method for providing trusted time in content of digital data files
US7401040B2 (en) 1999-11-01 2008-07-15 Accenture Llp Financial modeling and counseling system
JP2001134672A (en) 1999-11-02 2001-05-18 Hitachi Ltd Printed material issue management system
US7321864B1 (en) 1999-11-04 2008-01-22 Jpmorgan Chase Bank, N.A. System and method for providing funding approval associated with a project based on a document collection
US6714987B1 (en) 1999-11-05 2004-03-30 Nortel Networks Limited Architecture for an IP centric distributed network
US6539424B1 (en) 1999-11-12 2003-03-25 International Business Machines Corporation Restricting deep hyperlinking on the World Wide Web
US7124101B1 (en) 1999-11-22 2006-10-17 Accenture Llp Asset tracking in a network-based supply chain environment
US6411933B1 (en) 1999-11-22 2002-06-25 International Business Machines Corporation Methods and apparatus for correlating biometric attributes and biometric attribute production features
US6810395B1 (en) 1999-11-22 2004-10-26 Hewlett-Packard Development Company, L.P. Method and apparatus for query-specific bookmarking and data collection
US6671818B1 (en) 1999-11-22 2003-12-30 Accenture Llp Problem isolation through translating and filtering events into a standard object format in a network based supply chain
US6725269B1 (en) 1999-12-02 2004-04-20 International Business Machines Corporation System and method for maintaining multiple identities and reputations for internet interactions
GB9929364D0 (en) 1999-12-10 2000-02-02 Microbar Security Limited Improvements in or relating to coding techniques
US20030088489A1 (en) 1999-12-13 2003-05-08 Optimizeusa.Com Automated investment advisory software and method
US7720750B2 (en) 1999-12-15 2010-05-18 Equifax, Inc. Systems and methods for providing consumers anonymous pre-approved offers from a consumer-selected group of merchants
US6735695B1 (en) 1999-12-20 2004-05-11 International Business Machines Corporation Methods and apparatus for restricting access of a user using random partial biometrics
IL133617A0 (en) 1999-12-20 2001-04-30 Glide Ltd Career management system
US6836555B2 (en) 1999-12-23 2004-12-28 Anoto Ab Information management system with authenticity check
US6429927B1 (en) 1999-12-23 2002-08-06 Activcard Ireland, Limited Imaging device, especially for optical fingerprinting
US6970830B1 (en) 1999-12-29 2005-11-29 General Electric Capital Corporation Methods and systems for analyzing marketing campaigns
AU780943B2 (en) 1999-12-30 2005-04-28 International Business Machines Corporation Method of payment by means of an electronic communication device
US20010027474A1 (en) 1999-12-30 2001-10-04 Meny Nachman Method for clientless real time messaging between internet users, receipt of pushed content and transacting of secure e-commerce on the same web page
US7395241B1 (en) 2000-01-19 2008-07-01 Intuit Inc. Consumer-directed financial transfers using automated clearinghouse networks
US6349291B1 (en) 2000-01-21 2002-02-19 Attractor Holdings Llc Method and system for analysis, display and dissemination of financial information using resampled statistical methods
US6587835B1 (en) 2000-02-09 2003-07-01 G. Victor Treyz Shopping assistance with handheld computing device
US6615190B1 (en) 2000-02-09 2003-09-02 Bank One, Delaware, National Association Sponsor funded stored value card
US20010029464A1 (en) 2000-02-14 2001-10-11 Schweitzwer F. Christian Method for conducting on-line transactions
US7822656B2 (en) 2000-02-15 2010-10-26 Jpmorgan Chase Bank, N.A. International banking system and method
US7006983B1 (en) 2000-02-16 2006-02-28 Walker Digital, Llc Method and system for processing a rebate
WO2001061659A1 (en) 2000-02-16 2001-08-23 Mastercard International Incorporated System and method for conducting electronic commerce with a remote wallet server
US6484148B1 (en) 2000-02-19 2002-11-19 John E. Boyd Electronic advertising device and method of using the same
US20010034663A1 (en) 2000-02-23 2001-10-25 Eugene Teveler Electronic contract broker and contract market maker infrastructure
CA2401078C (en) 2000-03-01 2009-08-04 British Telecommunications Public Limited Company Apparatus and method for refreshing a web page with reduced flicker
US7139686B1 (en) 2000-03-03 2006-11-21 The Mathworks, Inc. Report generator for a mathematical computing environment
US20010032312A1 (en) 2000-03-06 2001-10-18 Davor Runje System and method for secure electronic digital rights management, secure transaction management and content distribution
US7627531B2 (en) 2000-03-07 2009-12-01 American Express Travel Related Services Company, Inc. System for facilitating a transaction
US20010038033A1 (en) 2000-03-23 2001-11-08 Habib Ali S. Unified communications and commerce systems and methods, and device therefore
DE60003148T2 (en) 2000-03-30 2004-05-13 Intershop Software Entwicklungs Gmbh Determination of the cache time
US20020091572A1 (en) 2000-03-31 2002-07-11 Carol Anderson Prepaid service interface system and method
US20030154171A1 (en) 2000-03-31 2003-08-14 Hewlett Packard Company Apparatus and method for selling personal information
AU2001253438A1 (en) 2000-04-14 2001-10-30 E-Vantage International, Inc. Method and system for delivering foreign exchange risk management advisory solutions to a designated market
CA2406001A1 (en) 2000-04-14 2001-10-25 American Express Travel Related Services Company, Inc. A system and method for using loyalty points
US20020032613A1 (en) 2000-04-18 2002-03-14 Buettgenbach Thomas H. Methods and systems for the physical delivery of goods ordered through an electronic network
US20030004828A1 (en) 2000-04-27 2003-01-02 S/B Exchange Enterprises, Inc. Prepaid card authorization and security system
US20030195808A1 (en) 2000-04-28 2003-10-16 Brown Michael Wayne Managing retailer product disbursement
US7356504B2 (en) 2000-05-01 2008-04-08 The Olsen Group Methods for determining value at risk
US7280984B2 (en) 2000-05-08 2007-10-09 Phelan Iii Frank Money card system, method and apparatus
WO2001088659A2 (en) 2000-05-15 2001-11-22 Privasys Electronic cards capable of being read by a magnetic stripe reader and methods for their use
US6805288B2 (en) 2000-05-15 2004-10-19 Larry Routhenstein Method for generating customer secure card numbers subject to use restrictions by an electronic card
US6755341B1 (en) 2000-05-15 2004-06-29 Jacob Y. Wong Method for storing data in payment card transaction
US6609654B1 (en) 2000-05-15 2003-08-26 Privasys, Inc. Method for allowing a user to customize use of a payment card that generates a different payment card number for multiple transactions
US6592044B1 (en) 2000-05-15 2003-07-15 Jacob Y. Wong Anonymous electronic card for generating personal coupons useful in commercial and security transactions
US20020010627A1 (en) 2000-05-17 2002-01-24 Gilles Lerat System and method for creation, distribution, exchange, redemption and tracking of digitally signed electronic coupons
US20020032650A1 (en) 2000-05-19 2002-03-14 Hauser Elloyd A. Payment system and method
US7020696B1 (en) 2000-05-20 2006-03-28 Ciena Corp. Distributed user management information in telecommunications networks
JP2001344120A (en) 2000-05-30 2001-12-14 Hitachi Ltd Program control system and program control method
AU2001265302A1 (en) 2000-06-01 2001-12-11 Richard B. Moore System and method for providing prepaid services via an internet protocol network system
US6792572B1 (en) 2000-06-06 2004-09-14 Intel Corporation Method and apparatus to approve documents
US20010054059A1 (en) 2000-06-08 2001-12-20 Marks Michael B. Opt-in electronic mail advertising for internet radio network
US7069434B1 (en) 2000-06-13 2006-06-27 Hewlett-Packard Development Company, L.P. Secure data transfer method and system
US7051199B1 (en) 2000-06-19 2006-05-23 Xerox Corporation System, method and article of manufacture for providing cryptographic services utilizing a network
US10185936B2 (en) 2000-06-22 2019-01-22 Jpmorgan Chase Bank, N.A. Method and system for processing internet payments
SE517132C2 (en) 2000-06-27 2002-04-16 Printon Ab Procedure and system for creating a PDF document
US7370011B2 (en) 2000-06-28 2008-05-06 Yahoo! Inc. Financial information portal
US7093020B1 (en) 2000-06-29 2006-08-15 Sungard Sct Inc. Methods and systems for coordinating sessions on one or more systems
US20020029269A1 (en) 2000-06-29 2002-03-07 Campus Pipeline, Inc. Methods and systems for coordinating the termination of sessions on one or more systems
US7032110B1 (en) 2000-06-30 2006-04-18 Landesk Software Limited PKI-based client/server authentication
JP2002032340A (en) 2000-07-14 2002-01-31 Nec Corp System and method for single sign-on web site and recording medium
US6934848B1 (en) 2000-07-19 2005-08-23 International Business Machines Corporation Technique for handling subsequent user identification and password requests within a certificate-based host session
US6976164B1 (en) 2000-07-19 2005-12-13 International Business Machines Corporation Technique for handling subsequent user identification and password requests with identity change within a certificate-based host session
US6769605B1 (en) 2000-07-21 2004-08-03 Jason P. Magness Money transfer system
US7117239B1 (en) 2000-07-28 2006-10-03 Axeda Corporation Reporting the state of an apparatus to a remote computer
US20030167229A1 (en) 2001-04-03 2003-09-04 Bottomline Technologies, Inc. Modular business transations platform
US6684212B1 (en) 2000-08-14 2004-01-27 Ford Motor Company System and method for data sharing between members of diverse organizations
US20020031230A1 (en) 2000-08-15 2002-03-14 Sweet William B. Method and apparatus for a web-based application service model for security management
WO2002017082A1 (en) 2000-08-22 2002-02-28 Akamai Technologies, Inc. Dynamic content assembly on edge-of-network servers in a content delivery network
US6641049B2 (en) 2000-08-31 2003-11-04 Pacusma Company, Ltd. Integrated circuit card with multiple integral electronic modules
US6847991B1 (en) 2000-09-06 2005-01-25 Cisco Technology, Inc. Data communication among processes of a network component
WO2002023452A1 (en) 2000-09-12 2002-03-21 American Express Travel Related Services Company, Inc. Microchip-enabled online transaction system
WO2002023478A2 (en) 2000-09-15 2002-03-21 Wonderware Corporation A method and system for animating graphical user interface elements via manufacturing/process control portal server
US20020087447A1 (en) 2000-09-19 2002-07-04 Gazebo Inc. System and method for managing and executing event based investments
US20040019563A1 (en) 2000-09-25 2004-01-29 Sines Randy D. Purchasing on the internet using verified order information and bank payment assurance
US6856970B1 (en) 2000-09-26 2005-02-15 Bottomline Technologies Electronic financial transaction system
US20020042808A1 (en) 2000-09-29 2002-04-11 Smith Joshua R. Method and apparatus for linking data and objects
US7752061B2 (en) 2000-10-02 2010-07-06 Computer Sciences Corporation Computerized method and system of displaying an accident type
US7417568B2 (en) 2000-10-03 2008-08-26 Realtime Data Llc System and method for data feed acceleration and encryption
US7197470B1 (en) 2000-10-11 2007-03-27 Buzzmetrics, Ltd. System and method for collection analysis of electronic discussion methods
US6819219B1 (en) 2000-10-13 2004-11-16 International Business Machines Corporation Method for biometric-based authentication in wireless communication for access control
US7356507B2 (en) 2000-10-30 2008-04-08 Amazon.Com, Inc. Network based user-to-user payment service
US6754640B2 (en) 2000-10-30 2004-06-22 William O. Bozeman Universal positive pay match, authentication, authorization, settlement and clearing system
US7103556B2 (en) 2000-11-02 2006-09-05 Jpmorgan Chase Bank, N.A. System and method for aggregate portfolio client support
US6892231B2 (en) 2000-11-02 2005-05-10 Microsoft Corporation Method and apparatus for verifying the contents of a global configuration file
US8015592B2 (en) 2002-03-28 2011-09-06 Innovation Connection Corporation System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe
US6366220B1 (en) 2000-11-08 2002-04-02 Bbnt Solutions Llc RF tag based system and method for drive-through applications
JP2002157423A (en) 2000-11-20 2002-05-31 Internatl Scient:Kk E financial gift card
US7051330B1 (en) 2000-11-21 2006-05-23 Microsoft Corporation Generic application server and method of operation therefor
WO2002043000A2 (en) 2000-11-22 2002-05-30 S. H. Hi Start Ltd. Hiding images in halftone pictures
WO2002048826A2 (en) 2000-11-30 2002-06-20 Harris Trust And Saving Bank User configurable demand deposit account system and method
US20050278641A1 (en) 2000-11-30 2005-12-15 Steve Mansour Javascript Calendar Application Delivered to a Web Browser
CA2327078C (en) 2000-11-30 2005-01-11 Ibm Canada Limited-Ibm Canada Limitee Secure session management and authentication for web sites
US6631849B2 (en) 2000-12-06 2003-10-14 Bank One, Delaware, National Association Selectable multi-purpose card
US6675261B2 (en) 2000-12-22 2004-01-06 Oblix, Inc. Request based caching of data store data
US7953660B2 (en) 2000-12-28 2011-05-31 Checkfree Services Corporation Method and system for payment processing
US6965939B2 (en) 2001-01-05 2005-11-15 International Business Machines Corporation Method and apparatus for processing requests in a network data processing system based on a trust association between servers
US20020095365A1 (en) 2001-01-16 2002-07-18 The Chase Manhattan Bank Corporate products trading marketplace
US20020095443A1 (en) 2001-01-17 2002-07-18 The Beacon Journal Publishing Company Method for automated generation of interactive enhanced electronic newspaper
US6931382B2 (en) 2001-01-24 2005-08-16 Cdck Corporation Payment instrument authorization technique
US6738779B1 (en) 2001-02-21 2004-05-18 Telecom Italia S.P.A. Apparatus for and method of multiple parallel string searching
GB0108044D0 (en) 2001-03-30 2001-05-23 British Telecomm Application synchronisation
US20020143703A1 (en) 2001-03-28 2002-10-03 Ahmad Razvan Internet cash card
US7185094B2 (en) 2001-03-30 2007-02-27 Sandcherry, Inc. Media session framework using a control module to direct and manage application and service servers
US20020156900A1 (en) 2001-03-30 2002-10-24 Brian Marquette Protocol independent control module
US6687245B2 (en) 2001-04-03 2004-02-03 Voxpath Networks, Inc. System and method for performing IP telephony
US7089503B1 (en) 2001-04-04 2006-08-08 Fannie Mae Mortgage loan customization system and process
US7082416B2 (en) 2001-04-06 2006-07-25 Karyn Elaine Anderson Method of using prepaid cash card for making purchases on the world wide web
AU2002303332A1 (en) 2001-04-13 2002-10-28 Beazley, Donald, E. System and method for secure highway for real-time preadjudication and payment of medical claims
US20020178113A1 (en) 2001-04-20 2002-11-28 Clifford Jeremy P. System and method for offering customized credit card products
US7272857B1 (en) 2001-04-20 2007-09-18 Jpmorgan Chase Bank, N.A. Method/system for preventing identity theft or misuse by restricting access
US7134075B2 (en) 2001-04-26 2006-11-07 International Business Machines Corporation Conversion of documents between XML and processor efficient MXML in content based routing networks
US6925481B2 (en) 2001-05-03 2005-08-02 Symantec Corp. Technique for enabling remote data access and manipulation from a pervasive device
US20020165820A1 (en) 2001-05-04 2002-11-07 Anvekar Dinesh Kashinath Prepaid electronic cash system with pin vending machines
ITVI20010122A1 (en) 2001-05-28 2002-11-28 Ferro Bortolo Giulio Dal SCRAPER CLEANER FOR CONVEYOR BELTS
US6675127B2 (en) 2001-06-15 2004-01-06 General Electric Company Computerized systems and methods for managing project issues and risks
US6983421B1 (en) 2001-06-22 2006-01-03 I2 Technologies Us, Inc. Using connectors to automatically update graphical user interface elements at a client system according to an updated state of a configuration
US7783566B2 (en) 2001-06-27 2010-08-24 American Express Travel Related Services Company, Inc. Consolidated payment account system and method
US6937976B2 (en) 2001-07-09 2005-08-30 Hewlett-Packard Development Company, L.P. Method and system for temporary network identity
US7249112B2 (en) 2002-07-09 2007-07-24 American Express Travel Related Services Company, Inc. System and method for assigning a funding source for a radio frequency identification device
US7121471B2 (en) 2001-07-10 2006-10-17 American Express Travel Related Services Company, Inc. Method and system for DNA recognition biometrics on a fob
US7503480B2 (en) 2001-07-10 2009-03-17 American Express Travel Related Services Company, Inc. Method and system for tracking user performance
US7228155B2 (en) 2001-07-10 2007-06-05 American Express Travel Related Services Company, Inc. System and method for remotely initializing a RF transaction
US7996324B2 (en) 2001-07-10 2011-08-09 American Express Travel Related Services Company, Inc. Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia
US7154375B2 (en) 2001-07-10 2006-12-26 American Express Travel Related Services Company, Inc. Biometric safeguard method with a fob
US7493288B2 (en) 2001-07-10 2009-02-17 Xatra Fund Mx, Llc RF payment via a mobile device
US7119659B2 (en) 2001-07-10 2006-10-10 American Express Travel Related Services Company, Inc. Systems and methods for providing a RF transaction device for use in a private label transaction
US7312707B1 (en) 2001-07-10 2007-12-25 American Express Travel Related Services Company, Inc. System and method for authenticating a RF transaction using a transaction account routing number
US20040239481A1 (en) 2001-07-10 2004-12-02 American Express Travel Related Services Company, Inc. Method and system for facial recognition biometrics on a fob
US7059531B2 (en) 2001-07-10 2006-06-13 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a fob
JP4828731B2 (en) 2001-07-16 2011-11-30 日立アロカメディカル株式会社 Ultrasonic diagnostic equipment
US20030055871A1 (en) 2001-07-31 2003-03-20 Javier Roses Document/poster composition and printing
US7093282B2 (en) 2001-08-09 2006-08-15 Hillhouse Robert D Method for supporting dynamic password
US6945453B1 (en) 2001-08-13 2005-09-20 Bank One Delaware N.A. System and method for funding a collective account by use of an electronic tag
US7306141B1 (en) 2001-08-13 2007-12-11 Jpmorgan Chase Bank, N.A. System and method for funding a collective account by use of an electronic tag
US8020754B2 (en) 2001-08-13 2011-09-20 Jpmorgan Chase Bank, N.A. System and method for funding a collective account by use of an electronic tag
JP4234916B2 (en) 2001-08-16 2009-03-04 システムニーズ株式会社 Memory rental service system for stand-alone identity authentication device
US20030037131A1 (en) 2001-08-17 2003-02-20 International Business Machines Corporation User information coordination across multiple domains
US20030040995A1 (en) 2001-08-23 2003-02-27 Daddario Donato V. Benefit provider system and method
US20030041165A1 (en) 2001-08-24 2003-02-27 Spencer Percy L. System and method for group video teleconferencing using a bandwidth optimizer
US20030046249A1 (en) 2001-08-31 2003-03-06 Robert Wu Prepaid card terminal and method for implementing prepaid cards
US6607127B2 (en) 2001-09-18 2003-08-19 Jacob Y. Wong Magnetic stripe bridge
US7103576B2 (en) 2001-09-21 2006-09-05 First Usa Bank, Na System for providing cardless payment
US7195154B2 (en) 2001-09-21 2007-03-27 Privasys, Inc. Method for generating customer secure card numbers
US7340714B2 (en) 2001-10-18 2008-03-04 Bea Systems, Inc. System and method for using web services with an enterprise system
US6641050B2 (en) 2001-11-06 2003-11-04 International Business Machines Corporation Secure credit card
US7587354B2 (en) 2001-11-27 2009-09-08 State Street Corporation Verification of net asset values
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
WO2003058391A2 (en) 2001-12-26 2003-07-17 Vivotech, Inc. Wireless network micropayment financial transaction processing
US7051932B2 (en) 2001-12-26 2006-05-30 Vivotech, Inc. Adaptor for magnetic stripe card reader
US20040159700A1 (en) 2001-12-26 2004-08-19 Vivotech, Inc. Method and apparatus for secure import of information into data aggregation program hosted by personal trusted device
US7028897B2 (en) 2001-12-26 2006-04-18 Vivotech, Inc. Adaptor for magnetic stripe card reader
KR100429806B1 (en) 2002-01-07 2004-05-03 삼성전자주식회사 Method and apparatus for displaying additional information linked with a digital TV program
US20030144935A1 (en) 2002-01-30 2003-07-31 Sobek Michael F. Methods and systems for processing, accounting, and administration of stored value cards
US20030163403A1 (en) 2002-02-01 2003-08-28 Ubs Painewebber Inc. Method and system for providing a weighted average aggregated accounts report
US7424441B2 (en) 2002-02-19 2008-09-09 First Data Corporation Systems and methods for integrating loyalty and stored-value programs
US7366905B2 (en) 2002-02-28 2008-04-29 Nokia Corporation Method and system for user generated keys and certificates
US7389275B2 (en) 2002-03-05 2008-06-17 Visa U.S.A. Inc. System for personal authorization control for card transactions
US7353383B2 (en) 2002-03-18 2008-04-01 Jpmorgan Chase Bank, N.A. System and method for single session sign-on with cryptography
WO2003083619A2 (en) 2002-03-29 2003-10-09 Bank One, Delaware, N.A. System and process for performing purchase transaction using tokens
US20040210498A1 (en) 2002-03-29 2004-10-21 Bank One, National Association Method and system for performing purchase and other transactions using tokens with multiple chips
US7203909B1 (en) 2002-04-04 2007-04-10 Microsoft Corporation System and methods for constructing personalized context-sensitive portal pages or views by analyzing patterns of users' information access activities
US20030204460A1 (en) 2002-04-30 2003-10-30 Rodney Robinson Data collection and transaction initiation using a financial messaging protocol
US20030225688A1 (en) 2002-05-28 2003-12-04 Charter One Financial, Inc. Financial account transfer apparatus and method
US7143174B2 (en) 2002-06-12 2006-11-28 The Jpmorgan Chase Bank, N.A. Method and system for delayed cookie transmission in a client-server architecture
US7472171B2 (en) 2002-06-21 2008-12-30 Jpmorgan Chase Bank, National Association Method and system for determining receipt of a delayed cookie in a client-server architecture
US20050091138A1 (en) 2002-06-28 2005-04-28 Fujitsu Limited Method and apparatus for processing reward point, and computer product therefor
US20040215507A1 (en) 2002-07-03 2004-10-28 Levitt Roger A. Fully funded reward program
US6805287B2 (en) 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
USD491953S1 (en) 2002-10-10 2004-06-22 Vivotech, Inc. Proximity interface with advertising insert for transaction acceptance systems
USD490840S1 (en) 2002-10-30 2004-06-01 Vivotech, Inc. Proximity interface for transaction acceptance systems
US20040098351A1 (en) 2002-11-15 2004-05-20 Ibgc Corporation Interest bearing gift card and related methods and systems
US7599856B2 (en) 2002-11-19 2009-10-06 Amazon Technologies, Inc. Detection of fraudulent attempts to initiate transactions using modified display objects
USD491186S1 (en) 2002-11-27 2004-06-08 Vivotech, Inc. Magnetic stripe simulacrum for transaction acceptance systems
US20040111610A1 (en) 2002-12-05 2004-06-10 Canon Kabushiki Kaisha Secure file format
US20050193056A1 (en) 2002-12-26 2005-09-01 Schaefer Diane E. Message transfer using multiplexed connections in an open system interconnection transaction processing environment
USD498236S1 (en) 2003-01-24 2004-11-09 Vivotech, Inc. Coreless inductor magnetic stripe simulacrum for transaction acceptance systems
US6832587B2 (en) 2003-01-28 2004-12-21 Dana Corporation Plastic valve cover with integrated metal
US7624277B1 (en) * 2003-02-25 2009-11-24 Microsoft Corporation Content alteration for prevention of unauthorized scripts
WO2004077278A2 (en) 2003-02-27 2004-09-10 Jp Morgan Chase & Co. System and method for collecting data for risk events
USD506998S1 (en) 2003-02-28 2005-07-05 Vivotech, Inc. Coreless inductor magnetic stripe simulacrum for right angle transaction acceptance systems
AU2003901043A0 (en) 2003-03-07 2003-03-20 Torto, Anthony Transaction system
US7426271B2 (en) 2003-04-25 2008-09-16 Palo Alto Research Center Incorporated System and method for establishing secondary channels
US20040225880A1 (en) * 2003-05-07 2004-11-11 Authenture, Inc. Strong authentication systems built on combinations of "what user knows" authentication factors
US20040254991A1 (en) 2003-06-16 2004-12-16 Malik Dale W. Switching Internet service providers
US7519989B2 (en) * 2003-07-17 2009-04-14 Av Thenex Inc. Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions
US20040230843A1 (en) 2003-08-20 2004-11-18 Wayne Jansen System and method for authenticating users using image selection
US7669239B2 (en) 2003-09-15 2010-02-23 Jpmorgan Chase Bank, N.A. Secure network system and associated method of use
JP4306390B2 (en) 2003-09-29 2009-07-29 日本電気株式会社 Password authentication apparatus, method and program
US8190893B2 (en) 2003-10-27 2012-05-29 Jp Morgan Chase Bank Portable security transaction protocol
IL158694A (en) 2003-10-30 2014-11-30 Verifone Israel Ltd Prepaid debit card processing
US7543739B2 (en) 2003-12-17 2009-06-09 Qsecure, Inc. Automated payment card fraud detection and location
US20050144450A1 (en) * 2003-12-30 2005-06-30 Entrust Limited Method and apparatus for providing mutual authentication between a sending unit and a recipient
JP4671637B2 (en) 2004-01-30 2011-04-20 株式会社リコー Context information exchange system, server, client, program to be executed by computer, and computer-readable recording medium
US20050193208A1 (en) 2004-02-26 2005-09-01 Charrette Edmond E.Iii User authentication
US7580898B2 (en) 2004-03-15 2009-08-25 Qsecure, Inc. Financial transactions with dynamic personal account numbers
US7584153B2 (en) 2004-03-15 2009-09-01 Qsecure, Inc. Financial transactions with dynamic card verification values
US7420456B2 (en) 2004-03-19 2008-09-02 Sentri Lock, Inc. Electronic lock box with multiple modes and security states
US7827223B2 (en) 2004-04-22 2010-11-02 Fortress Gb Ltd. Accelerated throughput synchronized word stream cipher, message authenticator and zero-knowledge output random number generator
TWI253827B (en) 2004-05-26 2006-04-21 Benq Corp Authentication control system, method and storage medium
WO2006009879A2 (en) 2004-06-18 2006-01-26 Washington Mutual, Inc. System for automatically transferring account information, such as information regarding a financial servicees account
US20060041540A1 (en) 2004-06-20 2006-02-23 Marvin Shannon System and Method Relating to Dynamically Constructed Addresses in Electronic Messages
EA201400189A1 (en) 2004-06-29 2014-09-30 Текстура Корпорейшн SYSTEM AND METHOD OF PAYMENT MANAGEMENT IN CONSTRUCTION
US7925584B2 (en) 2004-06-29 2011-04-12 Textura Corporation Construction payment management system and method with document tracking features
US7877321B2 (en) 2004-06-29 2011-01-25 Textura Corporation Method of and system for evaluating financial risk associated with a construction project
US7363504B2 (en) 2004-07-01 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for keystroke scan recognition biometrics on a smartcard
US7324976B2 (en) 2004-07-19 2008-01-29 Amazon Technologies, Inc. Automatic authorization of programmatic transactions
US7051929B2 (en) 2004-10-18 2006-05-30 Gongling Li Secure credit card having daily changed security number
US7480631B1 (en) 2004-12-15 2009-01-20 Jpmorgan Chase Bank, N.A. System and method for detecting and processing fraud and credit abuse
EP1882220A2 (en) 2005-03-26 2008-01-30 Privasys, Inc. Electronic financial transaction cards and methods
EP1882229B1 (en) 2005-04-27 2014-07-23 Privasys, Inc. Electronic cards and methods for making same
US20060259766A1 (en) 2005-05-16 2006-11-16 Rasti Mehran R System and method to protect personal identity identifiers
JP4694266B2 (en) 2005-06-03 2011-06-08 富士ゼロックス株式会社 Image processing apparatus, method, and program
US20070156521A1 (en) 2005-12-29 2007-07-05 United Video Properties, Inc. Systems and methods for commerce in media program related merchandise
US20070186252A1 (en) 2006-02-07 2007-08-09 Maggio Frank S Method and system for home shopping using video-on-demand services
US20070203850A1 (en) 2006-02-15 2007-08-30 Sapphire Mobile Systems, Inc. Multifactor authentication system
US7739744B2 (en) 2006-03-31 2010-06-15 Novell, Inc. Methods and systems for multifactor authentication

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11184336B2 (en) 2016-06-29 2021-11-23 Airwatch Llc Public key pinning for private networks
US10587582B2 (en) * 2017-05-15 2020-03-10 Vmware, Inc Certificate pinning by a tunnel endpoint
US20220337393A1 (en) * 2019-09-19 2022-10-20 Visa International Service Association System and method for using dynamic tag content
US11777709B2 (en) * 2019-09-19 2023-10-03 Visa International Service Association System and method for using dynamic tag content
US12184756B2 (en) 2019-09-19 2024-12-31 Visa International Service Association System and method for using dynamic tag content
US11341226B2 (en) * 2020-03-24 2022-05-24 Real Locks & Security Co., Ltd. Combination lock system and method of operating the same
US11921683B2 (en) * 2020-06-08 2024-03-05 Paypal, Inc. Use of time to live value during database compaction

Also Published As

Publication number Publication date
US10726417B1 (en) 2020-07-28

Similar Documents

Publication Publication Date Title
US11736296B2 (en) Biometric verification process using certification token
EP2648163B1 (en) A personalized biometric identification and non-repudiation system
US7295832B2 (en) Authorization means security module terminal system
US6067621A (en) User authentication system for authenticating an authorized user of an IC card
US20180144114A1 (en) Securing Blockchain Transactions Against Cyberattacks
US20020174345A1 (en) Remote authenticating biometric apparatus and method for networks and the like
US12282539B2 (en) Delegated biometric authentication
US20060123465A1 (en) Method and system of authentication on an open network
US20150067786A1 (en) Visual image authentication and transaction authorization using non-determinism
US20090172402A1 (en) Multi-factor authentication and certification system for electronic transactions
US20060136332A1 (en) System and method for electronic check verification over a network
US10726417B1 (en) Systems and methods for multifactor authentication
JPH07271884A (en) Terminal certification method
US20170103395A1 (en) Authentication systems and methods using human readable media
US20100115277A1 (en) Method and device for mutual authentication
US20120095919A1 (en) Systems and methods for authenticating aspects of an online transaction using a secure peripheral device having a message display and/or user input
US10503936B2 (en) Systems and methods for utilizing magnetic fingerprints obtained using magnetic stripe card readers to derive transaction tokens
CN112352410A (en) Smart card for use as a security token
Kaman et al. Remote user authentication using a voice authentication system
JP2008046906A (en) IC card and biometric information registration and authentication system
Davaanaym et al. A ping pong based one-time-passwords authentication system
WO2001092982A2 (en) System and method for secure transactions via a communications network
WO2014039763A1 (en) Visual image authentication and transaction authorization using non-determinism
Deswarte et al. A Proposal for a Privacy-preserving National Identity Card.
Luo et al. An e-cash Scheme with Multiple Denominations and Transferability

Legal Events

Date Code Title Description
AS Assignment

Owner name: JPMORGAN CHASE BANK, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EVERHART, GLENN COBOURN;REEL/FRAME:016607/0090

Effective date: 20050516

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE'S NAME TO JPMORGAN CHASE BANK, N.A. PREVIOUSLY RECORDED ON REEL 016607 FRAME 0090. ASSIGNOR(S) HEREBY CONFIRMS THE CORRECTION OF THE ASSIGNEE'S NAME;ASSIGNOR:EVERHART, GLENN COBOURN;REEL/FRAME:031940/0832

Effective date: 20050516

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION