1. Technical Field
The present invention relates to authenticating and securing online purchases. More particularly, the present invention relates to facilitating a financial transaction only when requested from a trusted node. Specifically, the present invention relates to providing a unique identifier of a node to a financial institution for use in authenticating future financial transactions.
2. Background Information
Increased use of communication and Internet technology has altered the landscape of information delivery and has affected numerous aspects of life, including commerce and finance. This technological development has enabled individuals to participate in various business transactions within an Internet marketplace. In these online transactions, electronic payments between transacting parties have become increasingly prevalent as the accessibility of the technology to enable such payments has increased. Internet-based vendors typically depend on electronic payment services and may accept a number of electronic payment instruments (e.g. credit cards, debit cards, etc.) and other electronic payment services such as the PayPal™ online payment service. Conventionally, in an online identification and authorization system the user is required to provide a user identification name and password and personal details in order to purchase content from a website or gain access to content. Along with this information, the user is required to provide the identification number of the payment instrument, for example a credit card number. The credit card number is cross-referenced with the owner's name and other basic personal details and if there is a match, the payment is authorized.
If a payment instrument number and associated data is stolen, a thief only needs to enter the information in the same manner as an authorized instrument holder. The systems which authorize and allow payments make no distinction between a thief entering the correct information or a true authorized entity entering the correct information, as long as the desired input matches. Thus, there is a tremendous need in the art for overcoming this significant security flaw in contemporary systems.
In one aspect, the invention may provide a method for authenticating and securing online purchases, the method comprising the steps of: initiating an online payment of an amount from a payor to a payee, wherein the payor initiates the online payment via a computer system; providing, by the payor, a unique identifier of the computer system, a financial account identifier, and an amount to the payee; providing, by the payee, the unique identifier, the financial account identifier, and the amount to a financial institution associated with the financial account identifier; determining, by the financial institution, whether the unique identifier is associated with the financial account identifier; completing the online payment by crediting the payee the amount and debiting the payor the amount if the unique identifier is associated with the financial identifier; and rejecting the online payment if the unique identifier is not associated with the financial identifier.
In another aspect, the invention may provide a method for authenticating and securing online purchases, the method comprising the steps of: linking a node and a financial account, wherein the node includes a processor, a memory, and a logic circuit; allowing payment for online purchases via the financial account when the online purchase is initiated by the node; and disallowing payment for online purchases via the financial account when the online purchase is not initiated by the node.
In another aspect, the invention may provide a method for authenticating and securing online purchases, the system comprising: storing a plurality of financial account identifiers in a storage system of a financial institution; associating a first financial account identifier in the plurality of financial account identifiers with an account holder of the financial institution; entering a first unique identifier of a node associated with the account holder into a plurality of unique identifiers in the storage system of the financial institution; and associating the first unique identifier with the first financial account identifier in the storage system.
One or more preferred embodiments that illustrate the best mode(s) are set forth in the drawings and in the following description. The appended claims particularly and distinctly point out and set forth the invention.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate various example methods, and other example embodiments of various aspects of the invention. It will be appreciated that the illustrated element boundaries (e.g., boxes, groups of boxes, or other shapes) in the figures represent one example of the boundaries. One of ordinary skill in the art will appreciate that in some examples one element may be designed as multiple elements or that multiple elements may be designed as one element. In some examples, an element shown as an internal component of another element may be implemented as an external component and vice versa. Furthermore, elements may not be drawn to scale.
Similar numbers refer to similar parts throughout the drawings.
A system and method for authenticating and securing online purchases is shown in
As shown in
In one embodiment of system 1, unique identifier 11 is the media access control address (hereinafter “MAC address”) assigned to node 3. MAC addresses are unique identifiers assigned to network interfaces for communication on the physical network segment. MAC addresses are most often assigned by the manufacturer of a network interface controller (not shown) disposed in node 3 and are stored in its hardware, such as the controller's read-only memory or some other firmware mechanism. MAC addresses can be contrasted with an internet protocol address (hereinafter “IP address”), which is issued dynamically to node 3 and may be arbitrarily changed. MAC addresses are typically 48 bits long. This 48-bit address space contains potentially 248 or 281,474,976,710,656 possible MAC addresses. Newer machine access control schemes include 64-bit address, dramatically increasing the already large address space of the 48-bit MAC address scheme. In accordance with the above, MAC addresses are intended to be a permanent and globally unique identification mechanism for modern electronic communication devices, such as those embodied by node 3.
Unique identifier 11 may be a composite or compilation of various features stored on node 3. In one embodiment of system 1, unique identifier may be embodied by a serial number associated with node 3 appended to the MAC address. This unique identifier 11 adds a high level of security as the serial numbers of nodes 3 are generally not broadcast across communication platforms as part of the commonly used communication protocols. Given a secure encrypted communication channel between node 3 and a communication partner, this embodiment of unique identifier 11 may be used to great benefit. In another embodiment, system 1 may use a checksum algorithm to compute a checksum datum off the MAC address and/or serial number and/or an encrypted block of data stored on node 3. This checksum datum may then be used as part of unique identifier 11, for example, by appending the checksum datum to the MAC address for use as unique identifier 11.
Unique identifier 11 may be a combination of the MAC address or another string of digits and a bit-wise, decimal, hexadecimal, or any other style of representation of an image or graphic stored on node 3. For example, a user may scan a fingerprint or acquire another style of image and store the image on node 3. Unique identifier 11 may then be a bit-wise representation of the image. Alternatively, the MAC address and the photo representation may be appended to each other to form unique identifier 11. Unique identifier 11 may alternatively be a voice or speech .wav file or another type of voice-representative data file for use in forming unique identifier 11. Similarly, unique identifier 11 may incorporate a retina scan or an eye scan and the data file produced therefrom. Thus, the present invention encompasses any type of biometric data or data file which may be used and incorporated into unique identifier 11.
Unique identifier 11 may alternative be an entirely new paradigm in the computing industry, whereby computer manufacturers systematically generate and provide unique identifier 11 to all nodes 3 at the time of manufacture. This system for assigning unique identifiers 11 may be implemented by agreement between computing companies or by an industry governing body, or possibly by mandate from the federal government.
Unique identifier 11 may be constructed dynamically as needed by node 3. For example, by querying for the MAC address and the serial number of node 3 when unique identifier 11 is required. This prevents a pre-formed constructed unique identifier 11 from being stored on node 3 in an explicit manner which aids in preventing a hacker from simply downloading the file containing unique identifier 11. In the event that node 3 does detect an intrusion or a possible hacking relating to unique identifier 11, system 1 may be configured to alert law enforcement or the vendor or the financial institution of a possible fraudulent crime in progress.
Unique identifier 11 may be embodied in a phone number provided to a phone owner, which may represent node 3. Thus, the user would transmit the phone number along with the data stream when using phone as node 3 to initiate a purchase. Unique identifier 11 may be embodied in a subscriber identity module or subscriber identification module (SIM), or any subcomponent thereof. The subscriber identify module is an integrated circuit that securely stores the international mobile subscriber identity (IMSI) and the related key used to identify and authenticate subscribers on mobile telephony devices, such as mobile phones and computers. A SIM circuit may be embedded into a removable plastic card. This plastic card is called a “SIM card” and can be transferred between different mobile devices. A SIM card contains its unique serial number, international mobile subscriber identity (IMSI), security authentication and ciphering information, temporary information related to the local network, a list of the services the user has access to and two passwords: a personal identification number (PIN) for ordinary use and a personal unblocking code (PUK) for PIN unlocking. Thus, unique identifier 11 may be embodied in one of the above unique variables or any combination thereof.
Unique identifier 11 may also be embodied in a driver's license number or a license plate number or any other type of unique number or signature assigned to the owner or user of that particular node 3.
The owner or user of node 3 is also the owner or user of a financial account at a financial institution 15. As shown in
For organizational purposes, financial institution 15 provides a financial account identifier 27 for each account at financial institution 15. Financial account identifiers 27 may be any method for identifying an individual account, including a social security number, a unique number or combination of alpha-numeric characters, or any other mechanism or method for tracking and identifying a financial account by computer system 17. As shown in
As shown in
Once the user of node 3 transmits unique identifier 11 to financial institution 15, financial institution 15 stores unique identifier 11 in storage system 23 and associates unique identifier 11 with the sender's financial account identifier 27 in list 28. This association can be performed using any method commonly understood in the art. For example, by entering unique identifier 11 in a field in a database table and associating that field with another field in another database table containing list 28 of financial account identifiers 27. Financial institution 15 may also store the user's name or some other way of identifying the user with respect to financial account identifier 27 as more than one user may be authorized to access that financial account and records may be kept for who is supplying which unique identifier 11. Multiple users may be linked to one financial account identifier 27 and provided with a user specific name and password, for example, if multiple employees use a company credit card to perform services for the company. Thus, the company and/or financial institution may provide and revoke a user's login and password and remove the association with a particular financial account identifier.
One familiar in the art will recognize a database query may be formed to select a record from financial account identifier table 33 and thereafter select all the records in unique identifier table 35 with the financial account identifier table key column 43 equal to key column 37 of the selected record. This query will provide all of the unique identifiers 11 associated with a given financial account identifier 27. As shown in
After a user uploads or transmits a particular unique identifier 11 to financial institution 15 for association with the user's particular financial account identifier 27, the user may end or close communication link 29. Financial institution 15 retains the uploaded unique identifier 11 in storage system 23 for future use as an authentication and security feature. More particularly, financial institution 15 only permits a financial transaction involving that financial account identifier 27 if the request for a financial transaction is initiated from a particular node 3 having a matching unique identifier 11 stored in storage system 23. In essence, financial institution 15 blocks all financial transactions involving a particular financial account associated with financial account identifier 27 which are not initiated via a node 3 having a previously uploaded unique identifier 11 associated with financial account identifier 27. All requests for financial transactions initiated on non-authenticated nodes 3 are blocked and/or refused, preventing unauthorized financial transactions. As such, even if all of the user's financial information and credentials are stolen (financial account number, login ID, login password, etc.) financial transactions involving the compromised account are still prevented if the thief is not using an authorized node 3 to facilitate the fraudulent financial transactions.
Often, an individual wishes to initiate a financial transaction with a vendor. Therefore, the three parties to the financial transaction must coordinate and authenticate the financial transaction. As shown in
Thereafter, a data packet 53 is constructed and sent via communication link 51 from financial institution 15 to vendor 49 in the direction of Arrow C. Data packet 53 contains an answer 55. Answer 55 is the result of the comparison of whether unique identifier 11A matches any unique identifiers 11B, 11C, etc. stored in storage system 23 (
The portion of system 1 residing on node 3 may be embodied in a precompiled and downloadable application which provides all of the benefits and features described above relating to node 3. Thus, a user may purchase an application to provide these features or an entity such as financial institution 15 may provide the application for free. The user then downloads and installs the application on node 3, which may be a phone, tablet, laptop computer, or any other type of computing device. The application may be programmed to read the node's unique identifier 11 and provide said unique identifier 11 to financial institution 15 for the initialization of system 1. Thereafter, application may provide unique identifier 11 to either vendor 49 or financial institution 15 depending on the user's input and desires. The application may be precompiled and downloadable from online marketplaces such as iTunes® or Amazon® or from the financial institution's website.
As shown in
As shown in
As shown in
“Logic,” “logic circuitry,” or “logic circuit,” as used herein, includes but is not limited to hardware, firmware, software and/or combinations of each to perform a function(s) or an action(s), and/or to cause a function or action from another logic, method, and/or system. For example, based on a desired application or needs, logic may include a software controlled microprocessor, discrete logic like a processor (e.g., microprocessor), an application specific integrated circuit (ASIC), a programmed logic device, a memory device containing instructions, or the like. Logic may include one or more gates, combinations of gates, or other circuit components. Logic may also be fully embodied as software. Where multiple logics are described, it may be possible to incorporate the multiple logics into one physical logic. Similarly, where a single logic is described, it may be possible to distribute that single logic between multiple physical logics.
Example methods may be better appreciated with reference to flow diagrams. While for purposes of simplicity of explanation, the illustrated methodologies are shown and described as a series of blocks, it is to be appreciated that the methodologies are not limited by the order of the blocks, as some blocks can occur in different orders and/or concurrently with other blocks from that shown and described. Moreover, less than all the illustrated blocks may be required to implement an example methodology. Blocks may be combined or separated into multiple components. Furthermore, additional and/or alternative methodologies can employ additional, not illustrated blocks.
In the foregoing description, certain terms have been used for brevity, clearness, and understanding. No unnecessary limitations are to be implied therefrom beyond the requirement of the prior art because such terms are used for descriptive purposes and are intended to be broadly construed.
While the present invention has been described in connection with the preferred embodiments of the various figures, it is to be understood that other similar embodiments may be used or modifications and additions may be made to the described embodiment for performing the same function of the present invention without deviating there from. Therefore, the present invention should not be limited to any single embodiment, but rather construed in breadth and scope in accordance with the recitation of the appended claims.
This application claims priority from U.S. Provisional Application Ser. No. 61/855,942, filed May 28, 2013, the disclosure of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61855942 | May 2013 | US |