Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication for a commercial transaction using a mobile module

a mobile module and commercial transaction technology, applied in the field of networked transaction systems, can solve the problems of one side of the bargain not being upheld, conventional online transaction models are awkward for the purchaser, and lose personal, financial and/or other confidential information, so as to achieve simple and more secure online commercial transaction framework, relieve some of the burden of transfer, and enhance security

Inactive Publication Date: 2014-11-27
MICROSOFT TECH LICENSING LLC
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text discusses a new way to make online commercial transactions more secure and user-friendly. By outsourcing certain responsibilities to lower-level systems and using secure methods for validating the purchaser's identity, the experience becomes more intuitive and secure for users. The text also mentions the use of single or multilevel authentication using a SIM device, as well as a three-way secure commercial transaction between a merchant, consumer, and payment provide. The technical effects of the patent text are enhanced security and simplicity for users and merchants in online commercial transactions.

Problems solved by technology

Conventional online transactions, for example, the purchase of goods and / or services over a network, are vulnerable to security breaches resulting in loss of personal, financial and / or other confidential information.
Moreover, in an untrusted network (e.g., the Internet), both merchants and purchasers are at risk for entering into a transaction with a bad actor such that one side of the bargain is not upheld.
In addition, conventional online transaction models are awkward for the purchaser and produce a generally unintuitive transaction experience.
For example, conventional online transactions are conducted via a browser using a login / password paradigm that is confusing and difficult to manage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication for a commercial transaction using a mobile module
  • Authentication for a commercial transaction using a mobile module
  • Authentication for a commercial transaction using a mobile module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]Conventional models for networked commercial transactions focus on the browser as the interface for requesting and submitting personal and financial information between an end-user purchaser and a merchant or service provider, whether it be directly through the merchant or via a third party transaction provider. In the first instance, the merchant is burdened with creating and maintaining an infrastructure capable of querying, obtaining, handling and processing personal and financial information, typically with some minimum level of security. Moreover, the merchant may be responsible for maintaining accounts and account information for each of its customers (which typically includes both confidential personal and financial information).

[0035]A purchaser must relinquish personal information (e.g., name, address, phone number, etc.) and financial information (e.g., debit and credit card numbers and expiration dates, banking account numbers, etc.) to complete a transaction. At so...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Current embodiments provide for authorization and payment of an online commercial transaction between a purchaser and a merchant including verification of an identity of the purchaser and verification of an ability of the purchaser to pay for the transaction, where the identity provider and the payment provider are often different network entities. Other embodiments also provide for protocols, computing systems, and other mechanisms that allow for identity and payment authentication using a mobile module, which establishes single or multilevel security over an untrusted network (e.g., the Internet). Still other embodiments also provide for a three-way secure communication between a merchant, consumer, and payment provider such that sensitive account information is opaque to the merchant, yet the merchant is sufficiently confident of the consumer's ability to pay for requested purchases. In yet another embodiment, electronic billing information is used for authorization, auditing, payment federation, and other purposes.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation of U.S. patent application Ser. No. 11 / 379,143 filed on Apr. 18, 2006, entitled “AUTHENTICATION FOR A COMMERCIAL TRANSACTION USING A MOBILE MODULE,” which issued as U.S. Pat. No. ______ on ______, which is both (1) a continuation of U.S. patent application Ser. No. 11 / 379,133 filed on Apr. 18, 2006, entitled SECURE NETWORK COMMERCIAL TRANSACTIONS by Johnson, et al., as well as (2) a continuation-in-part of U.S. patent application Ser. No. 11 / 376,535 filed Mar. 15, 2006, entitled “METHOD AND APPARATUS FOR NETWORK TRANSACTIONS”, by Johnson, which issued as U.S. Pat. No. 7,849,020 on Dec. 7, 2010, and both of which claim the benefit of U.S. Provisional Application 60 / 672,754, filed Apr. 19, 2005, entitled “METHODS AND APPARATUS FOR NETWORK TRANSACTIONS.” All of the foregoing applications are incorporated herein by reference in their entireties.BACKGROUND OF THE INVENTION[0002]1. The Field of the Invention[0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q20/38G06Q20/32G06Q20/40G06Q20/00
CPCG06Q20/3829G06Q20/3227G06Q20/40G06Q20/02G06Q20/12G06Q20/322G06Q20/3229G06Q20/4014G06Q20/425G06Q30/02G06Q30/0601G06Q20/32
Inventor JOHNSON, BRUCE E.WEBSTER-LAM, CHUNG
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products