Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Methods and Apparatus for Enabling Secure Network-Based Transactions

Inactive Publication Date: 2007-03-22
OHVA
View PDF9 Cites 238 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0016] In still another aspect of the invention, a method is provided for sending a secure modulated sound pass from a sound-producing device having a semiconductor chip supporting a modem, an electrical plug-in interface for enabling coupling with a host machine, and a housing of a size and shape to support hand-held operation to a software applet for demodulating the sound pass to glean the secure data embedded therein. Th

Problems solved by technology

The main reasons are the high cost of the card reader and the complexity of the system for most people.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and Apparatus for Enabling Secure Network-Based Transactions
  • Methods and Apparatus for Enabling Secure Network-Based Transactions
  • Methods and Apparatus for Enabling Secure Network-Based Transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The inventors provide a system that may be used in a variety of ways using hardware and / or software to provide secure authentication over a network for users and user groups. The present invention is described according to various embodiments and in enabling detail supporting each of those embodiments. More particularly, the system uses a modulated sound consisting at least in part of an identification number and a session key.

[0033] It is important to note herein that in one embodiment, the identification number may, for example, contain 16 digits of data and may be a fixed identification number (ID) or on that is dynamically assigned. It may also be encoded to include an error detection bit. In this case the identification number may also be encrypted with a proprietary key to ensure the provider authorized to provide the software of the invention may practice the invention in a way that is functional.

[0034] The following example demonstrates a configuring and encryption ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for enabling secure transacting over a network has a network sever application for storing client information and activating clients for secure transacting, a software driver for performing authentication, the software driver accessible to the network server, a software applet for creating a secure data record and for managing transmission and update of the contents of the record, and a sound source in the form of a file or a sound generating device, the sound source being part of or having access to the secure data record.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] The present invention claims priority to a U.S. provisional patent application Ser. No. 60 / 719,273 filed on Sep. 20, 2005. The referenced application is included herein at least by reference.BACKGROUND OF THE INVENTION [0002] 1. Field of the Invention [0003] The present invention is in the field of electronic transactions carried out over a network connection and pertains particularly to methods and apparatus for ensuring identity security for the transaction parties. [0004] 2. Discussion of the State of the Art [0005] Integrated circuit cards, commonly referred to as smart cards, are widely used in stores to secure electronic payments. The online market has not adopted smart cards, although they provide the best security to conduct electronic commerce. The main reasons are the high cost of the card reader and the complexity of the system for most people. Not only a card but also a reader must be provided to the millions of potential en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3271H04L9/0844H04L2209/56H04L2209/80H04L63/0853H04L9/3213H04L63/083H04L63/10G06Q20/341G06Q20/4018
Inventor COLNOT, VINCENT
Owner OHVA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products