throbber
US007444676B1
`
`(12) Ulllted States Patent
`Asghari-Kamrani et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,444,676 B1
`Oct. 28, 2008
`
`(54) DIRECT AUTHENTICATION AND
`AUTHORIZATION SYSTEM AND METHOD
`FOR TRUSTFD NETWORK OF FINANCIAL
`
`6,529,885 B1 *
`6,748,367 B1 *
`2001/0044787 A1 *
`
`3/2003 Johnson ..................... .. 705/64
`6/2004 Lee .............. ..
`705/66
`
`.............. .. 705/78
`11/2001 Shwaitz et al.
`
`INSTITUTIONS
`
`OTHER PUBLICATIONS
`
`(76)
`
`Inventors, Nader Asgha1.i_Kam1.ani, 6558
`Palisades Dr.’ Cemrevfllea VA (US)
`_
`_
`20121; Kamran ASgharl'Kamram’
`6547 Palisades Dr-s CemreVfl1es VA (US)
`20121
`
`( * ) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`0
`
`C0uncil_(Oct.
`Examination
`_ Institutions
`Financial
`Federal
`2005) ‘A/uthentication in an/Internet_Bar_1king Environment available
`at http.//www.fliec.g0v/pdf/ authenticati0n_guidance.pdf.
`“Will Financial Institutions Really by more Secure with 2-Factor
`Athentication?” available at http://www.securitypark.c0.uk/article.
`asp?aiticleid:25011&CategoryID:1%C2%A0.
`“Experts Struggle to Fight Online ‘Phishing”’ (May 4, 2006) avail-
`able at http://domainsmagazine.c0m/D0mains_14/D0main_2830.
`shtml.
`>1: Cited
`
`exalniner
`
`(21) Appl. No.: 11/239,046
`
`(22)
`
`Filed:
`
`Sep. 30, 2005
`
`Related U.S.Applicati0n Data
`.
`.
`.
`.
`.
`(63) C0IIIIIIIIaII0II'III'PaI'I Of aPP1ICaII0I1 N0~ 09/940535:
`filed 011 Aug 29: 2001-
`(60) Provisional application No. 60/615,603, filed on Oct.
`5, 2004.
`
`(51)
`
`[nt_ C1_
`(200501)
`G06}? 7/04
`(2005.01)
`G06F 19/00
`(2005.01)
`H04L 9/32
`(2005.01)
`H04L 9/00
`(52) U.s. Cl.
`........................... .. 726/21; 726/4; 713/168;
`713/170; 705/44; 705/64; 705/67
`(58) Field of Classification Search ................... .. 726/4,
`726/21; 713/168, 170; 705/643 67, 44
`See application file for Complete Search history.
`I
`References Clted
`U.S. PATENT DOCUMENTS
`
`(56)
`
`Primary Examiner—Benjamin E. Lanier
`Assistant Examiner—Abdulhakim Nobahar
`
`ABSTRACT
`(57)
`h
`d/
`.
`.
`h d f
`d.
`h
`d
`A
`system an met 0
`or
`irect aut entication an or aut o-
`rization oftransactions. The system includes a trusted Digital
`Identity (DID) Network connecting an Originating Partici-
`PaIIIIg FIIIaIICIa1 IIISIIIIIIIOII (OPFI) and 3 ReCeIVIIIg PaIIICI'
`pating Financial Institution (RPFI) through a DID Operator.
`The DID Operator may further be coupled to a DID System
`that calculates digital identities ‘for Originators. According to
`the method, direct authentication
`the Originator and/or
`authorization ofthe transaction. 1S initiated upon the.Origina-
`tor communicating its digital identity to. the.Receiver. The
`Receiver subsequently provides the digital identity to the
`RPFI The RPFI 15 then 8131619 Commumcate W1th.the.0I’FI
`for authentication of the Originator and/or authorization of
`‘he}ra¥1S?‘°‘19n‘hF°“gh‘he DID Qperator based 0“ Qrigma‘
`tor s digital identity. The transaction between the Originator
`and Receiver can be financial or non-financial and may
`include, for example, account-to-account transfers, identity
`authentication or express agreements. In another embodi-
`ment, authentication and/or authorization may be performed
`in real time.
`
`................. .. 382/115
`5,838,812 A * 11/1998 Pare etal.
`5,883,810 A *
`3/1999 Franklinetal.
`............. .. 705/39
`
`20 Claims, 11 Drawing Sheets
`
`Direct Authentication & Authorization
`System and Method
`
`40
`
`USAA 1015
`
`
`
`
`
`25
`OFF
`
`E
`
`20
`
`(customer)
`
`communication
`
`
`
`
`
`nlgiui Iuamny
`
`1
`
`USAA 1015
`
`

`
`U.S. Patent
`
`Oct. 28,2008
`
`Sheet 1 of 11
`
`US 7,444,676 B1
`
`Direct Authentication & Authorization
`System and Method
`
`Communication
`Network
`
`40
`
`Receiver
`(business)
`
`
`
`20
`
`Originator
`(customer)
`
`Digital Identity
`
`Figure 1
`
`2
`
`

`
`U.S. Patent
`
`Oct. 28,2008
`
`Sheet 2 of 11
`
`US 7,444,676 B1
`
`25, 35
`
`2
`
`3
`
`Figure 2
`
`3
`
`

`
`U.S. Patent
`
`Oct. 28,2008
`
`Sheet 3 of 11
`
`US 7,444,676 B1
`
`20
`
`
`
`
`
`
`
`Digital Identity System
`
`
`
`H <---
`
`40
`
`Receiver
`
`50
`
`1
`Direct Authentication & Authorization
`System and Method
`
`3 Digital Identity Network
`
`Figure 3
`
`4
`
`

`
`U.S. Patent
`
`Oct. 28,2008
`
`Sheet 4 of 11
`
`US 7,444,676 B1
`
`
`
`Customer's Bank
`
`Customer's Bank
`
`(°PF"
`
`| Digital Identity
`
`l
`
`‘RPH’
`
`50
`
`50
`
`Customer
`
`(Originator and Receiver are the same entity)
`
`OPFI: Originating Participating Financial Institution
`RPFI: Receiving Participating Financial Institution
`
`4——> Data Communication
`
`—"-—> Digital Identity flow
`
`- - -F Funds transfer flow
`
`Figure 4
`
`5
`
`

`
`U.S. Patent
`
`Oct. 28,2008
`
`Sheet 5 of 11
`
`US 7,444,676 B1
`
`100
`
`
`
`Customer (Originator) authenticates himl
`herself to the first financial institution (OPFI)
`
`
`
`Customer desires to transfer funds to his
`
`account at second financial institution (RPFI)
`
`
`
`Customer requests funds transfer from the
`OPFI over the communication network
`
`
`
`\
`
`
`
`
`The OPFI starts the funds transfer process by
`requesting a new digital identity for that
`customer from the DID Operator over Digital
`Identity Network
`
`\
`
`DID Operator calculates a new digital identity
`for the customer and fonuard it to the OPFI
`
`105
`
`110
`
`115
`
`120
`
`
`
`
`
`The OPFI records the digital identity along
`with the transaction information and presents
`it to the customer over the communication
`
`network
`
`To finalize the transfer, OPFI requests the
`customer to provide this digital identity to
`the RPFI for identification and prove of
`account ownership and authorization of the
`
`funds transfer
`
`140
`
`Figure 5
`
`125
`
`130
`
`6
`
`

`
`U.S. Patent
`
`Oct. 28, 2008
`
`Sheet 6 of 11
`
`US 7,444,676 B1
`
`V
`
`140
`
`145
`
`150
`
`155
`
`The customer authenticates
`himself to the RPFI
`
`
`
`Customer provides hislher
`digital identity to the RPFI to
`finalize the funds transfer
`
`The RPFI sends a Digital Identity
`Message containing the
`customer's digital identity to the
`DID Operator
`
`The DID Operator validates the
`customer's digital identity and
`identifies the customer
`
`160
`
`157
`
`The DID Operator sends a Digital
`Identity Message to the OPFI for
`
`processing
`
`No
`
`DID Operator sends a denial
`identification and authorization
`
`message to the RPFI
`
`{I
`
`180
`
`158
`
`RPFI sends a denial
`Identification and authorization
`
`message to the customer
`
`Figure 6
`
`7
`
`

`
`U.S. Patent
`
`Oct. 28,2008
`
`Sheet 7 of 11
`
`US 7,444,676 B1
`
`180
`
`
`
`OPFI receives the Digital Identity
`message and validates the
`transaction
`
`
`
`
`Yes
`
`OPFI sends a denial
`
`identification and authorization
`
`message to the RPFI through
`DID Operator
`
`
`RPFI sends a denial
`
`ldentlflcatlon and
`191
`
`authorization message to
`
`the customer
`
`OPFI records the Originators
`OPFI records the Originator's
`authorization and transfers the
`
`authorization and sends the
`customers account information
`back to the RPFI
`
`funds using the desired funds
`transfer network, such as ACH
`network
`
`
`
`
`
`RPFI finalizes the funds transfer
`transaction by transferring the
`funds using the desired funds
`transfer network
`
`OPFI sends an approval
`identification and authorization
`message back to RPFI
`
`RPFI notifies the customer
`
`
`
`Figure 7
`
`8
`
`

`
`U.S. Patent
`
`Oct. 28,2008
`
`Sheet 8 of 11
`
`US 7,444,676 B1
`
`
`
`customers Bank
`(OPFI)
`
`5°\I
`
`l
`
`--————-—~>
`
`Digital
`
`Identity
`
`T
`
`Customer's Bank
`(RPFI)
`
`1/50
`
`
`
`lndividuallcorporate
`custom”
`(Originator)
`
`Corporatetgustomer
`(R°°°“’°")
`
`OPFI: Originating Participating Financiai Institution
`RPFI: Receiving Participating Financial Institution
`
`4--5 Data Communication
`
`—-—--—> Digital Identity flow
`
`- - -> Funds transfer flow
`
`Figure 8
`
`9
`
`

`
`U.S. Patent
`
`Oct. 28,2008
`
`Sheet 9 of 11
`
`US 7,444,676 B1
`
`200
`
`205
`
`21 O
`
`215
`
`220
`
`Customer (Originator) desires to transfer funds to a third party
`(Receiver such as biller, merchant)
`
`Customer authenticates himself to the first financial institution
`
`(OPFI) over a communication network
`
`\ Customer requests to send payment to the third party (Receiver)
`from the OPFI over the communication network
`
`The OPFI starts the payment process by requesting a new digital
`identity from the DID Operator over the Digital Identity Network
`
`speclflc to that customer andlor transaction
`
`\
`
`DID Operator calculates a new digital Identity that may be
`specific to that customer andlor transaction, and forwards the
`
`customer's digital identity to the OPFI over the Digital Identity
`
`Network
`
`225
`
`OPFI presents the digital identity to the customer (Originator)
`over the communication network
`
`230
`
`To finalize the payment, OPFI requests the customer to provide
`this digital identity to the third party (Receiver) for identification
`and prove of account ownership and authorization of the
`
`payment
`
`1V 2
`
`40
`
`Figure 9
`
`10
`
`10
`
`

`
`U.S. Patent
`
`Oct. 28,2008
`
`Sheet 10 of 11
`
`US 7,444,676 B1
`
`245
`
`The customer provides the digital identity to the
`third party (Receiver) for authentication and
`authorization of the payment
`
`250 \ To process the payment, the third party
`
`(Receiver) forwards the customer's digital identity
`to the RPFI along with the transaction information
`using any communication network
`
`255
`
`260
`
`The RPFI may validate the information and may
`forward a Digital Identity Message containing the
`customer's digital identity to the DID Operator for
`authentication and transaction authorization.
`
`The DID Operator validates the digital identity and
`identifies and authenticates the customer
`
`/ 267
`
`DID Operator sends a denial
`identification and authorization
`
`message to the RPFI
`
`268
`
`
`
`Receiver sends a denial
`
`identification and authorization
`280
`message to the customer
`V
`
`Figure 10
`
`11
`
`
`The DID Operator sends a Digital
`Identity Message to the 0PFl for
`processing
`
`RPFI sends a denial
`identification and authorization
`
`message to the Receiver
`
`269
`
`11
`
`

`
`U.S. Patent
`
`Oct. 28,2008
`
`Sheet 11 of 11
`
`US 7,444,676 B1
`
`285
`
`
`
`The OPFI validates the customer's
`digital identity andlor verifies the
`transaction.
`
`
`
`287
`
`OPFI sends a denial
`identification and authorization
`message to the RPFI
`
`288
`
`RPFI sends a denial
`identification and authorization
`message to the Receiver
`
`296
`
`
`
`OPFI records the Originator's
`authorization and sends the
`customer's account information
`back to the RPFI
`
`OPFI records the Originators
`authorization and transfers the
`funds using the deslred funds
`transfer network. such as ACH
`network
`
`
`
`297
`
`292
`OPFI sends an approval
`
`identification and authorization
`message back to RPFI
`
`
`
`RPFI finalizes the funds transfer
`transaction by transferring the
`funds uslng the desired funds
`transfer network
`
`RPFI notifies the Receiver
`
`
`
`
`
`_Figure 11
`
`12
`
`12
`
`

`
`US 7,444,676 B1
`
`1
`DIRECT AUTHENTICATION AND
`AUTHORIZATION SYSTEM AND METHOD
`FOR TRUSTED NETWORK OF FINANCIAL
`INSTITUTIONS
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a continuation in part of and claims
`priority to U.S. patent application Ser. No. 09/940,635 filed
`Aug. 29, 2001. This application also claims priority to U.S.
`provisional patent application Ser. No. 60/615,603 filed Oct.
`5, 2004.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`
`The present invention generally relates to a direct authen-
`tication and authorization system and method for trusted net-
`work of financial
`institutions allowing them to directly
`authenticate their customers and receive their authorization of
`financial transactions over a communication network such as
`
`the Internet. More specifically, the present invention is based
`on a new identification and authentication scheme as digital
`identity that enables financial institutions to directly authen-
`ticate their account owners and/or receive their authorization
`of financial transactions over a communication network such
`as the Internet.
`
`2. Background of the Invention
`With the advent ofthe Internet, the number of online finan-
`cial
`transactions has increased dramatically. With this
`increase, concerns for the security of the financial transac-
`tions, proof of authorization for such transactions, and the
`need for direct authentication of the parties to these transac-
`tions have also risen. Therefore the Internet is more than just
`a different delivery charmel for online financial transactions.
`There are two unique characteristics of the Internet that
`require special considerations:
`The anonymity of the Internet creates an environment in
`which parties are not certain with whom they are doing
`business, which poses unique opportunities for fraud
`The Internet is an open network, which requires special
`security procedures to be deployed to prevent unautho-
`rized access to the consumer financial information
`
`These unique characteristics of the Internet needed to be
`addressed by financial institutions in order to maintain their
`dominance in the payment arena. Today, any authentication
`over a communication network such as the Internet is an
`
`indirect authentication. Meaning, customers provide confi-
`dential, personal and financial information, in the form of
`social security numbers, names, addresses, credit card and
`bank account numbers, and businesses verify this information
`by accessing external databases. This type of authentication is
`not sufiicient to truly identify the identity of customers and
`tell whether the customer is the actual account owner. This is
`
`why financial institutions have limited their online interbank
`and intrabank service offerings. For example,
`today,
`the
`financial institutions require their account owners to do their
`interbank funds transfer at a branch ofiice and send a physical
`check to the receiver of the funds for payment, both of which
`are inconvenient and burdensome to corporate and individual
`customers.
`
`NACHA (National Clearing House Association) operating
`rules and federal govemment regulations also require finan-
`cial institutions to authenticate their customers’ identity and
`receive their authorization for any type of financial transac-
`tion such as payment or funds transfer over the Internet. In the
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`13
`
`2
`
`physical world, financial transactions are authorized by the
`account owners in writing and signed or similarly authenti-
`cated. In the online world however, financial institutions do
`not have any solution to meet these requirements. An elec-
`tronic authorization for an online transaction should be
`
`authenticated by a mctl1od that l) idcntifics the customer
`(account owner), and 2) manifests the assent of the customer
`to the authorization. Therefore, financial institutions must use
`a method that provides the same assurance as a signature in
`the physical world (a signature both uniquely identifies a
`person and evidences his assent to an agreement). These
`objectives should be met by whatever method or process a
`financial institution employs when obtaining a customers’
`authorization electronically.
`When dealing with customers over any communication
`network such as the Internet, financial institutions are facing
`numerous challenges:
`Be able to identify the identity of the customers;
`Be able to obtain transaction authorization from customers
`over the Internet;
`Be able to confirm that the customer is the account owner
`and is authorized to use such account
`
`Financial institutions must meet these challenges in order
`to expand their online service offerings (interbank and intra-
`bank) and maintain their dominance in the market. But lack of
`identification and real-time account verification methods
`
`have prevented financial institutions to achieve their goals.
`Today, there are three different identification and authen-
`tication schemes in the market:
`
`Knowledge-based, which involve allowing access accord-
`ing to what a user knows;
`token-based, which involve allowing access according to
`what a user possesses;
`biometrics-based, which involve allowing access accord-
`ing to what the user is.
`Due to various problems the current authentication
`schemes have, financial institutions have not been able to
`successfully use these technologies to perform direct authen-
`tication and authorization of their customers. Passwords are
`
`inexpensive and easy to use, but the static nature of pass-
`words, makes them vulnerable for replay attacks. Another
`drawback of passwords is that online banking password can-
`not be used for identification and verification of financial
`
`account at the third party web sites. Biometrics can also be
`useful for user identification, but one problem with these
`schemes is the difficult tradeoff between imposter pass rate
`and false alarm rate. In addition, many biometric systems
`require specialized devices, which may be expensive. Token-
`based schemes are problematic as well. These are expensive
`to implement and require users to install special devices and
`software. Most token-based authentication systems also use
`knowledge-based authentication to prevent impersonation
`through theft or loss of the token.
`National Clearing House Association (NACHA) and sev-
`eral financial institutions such as Visa and MasterCard have
`
`also attempted to develop authentication systems and meth-
`ods, such as ISAP (Internet Secure ATM Payments) and SET
`(Secure Electronic Transaction) using smart card technology,
`but due to aforementioned smart card problems they failed to
`achieve customer acceptance. Therefore, they are now experi-
`menting new password based programs such as VPAS (Visa
`Payer Authentication Service) and UCAF (MasterCard Payer
`Authentication Service) to allow registered cardholders to
`verify their purchases, a process known as payer authentica-
`tion, but unfortunately these have abovementioned password
`issues and are specific to credit card transactions and do not
`apply to bank account transactions. It is also very difficult for
`
`13
`
`

`
`US 7,444,676 B1
`
`3
`a customer to manage. Owning N different credit cards
`requires recalling N different passwords for payment at
`checkout. According to a survey from Jupiter Media Metrix
`(epaynews.com, Feb. 21 2002), these systems and methods
`are also complicating the picture for consumers, who are
`worried by thc mix of idcntification and authentication
`schemes.
`
`As for the financial account ownership verification, cur-
`rently, there are several companies that are attempting to
`bring systems and methods for verifying account ownership,
`such as Paypal (EBAY) and CashEdge.
`Paypal introduces a system that initiates one or more veri-
`fying transactions using financial account information given
`by the customer. Selected details of the transaction(s) are
`saved, particularly details that may vary from one transaction
`to another. Such variable details may include the number of
`transactions performed, the amount of a transaction, the type
`of transaction (e.g., credit, debit, deposit, withdrawal), the
`merchant name or account used by the system for the trans-
`action, etc. The customer then retrieves evidence ofthe trans-
`action(s) from his or her financial institution, which may be
`accomplished on-line, by telephone, in a monthly statement,
`etc., and submits the requested details to the Paypal system.
`The submitted details are compared to the stored details and,
`if they match, the account ownership is verified and the cus-
`tomer is then allowed to use the financial account. There are
`
`many drawbacks associated with the Paypal’s system, includ-
`ing:
`No real-time account verification: lt takes 2 to 3 days to
`verify customer’s financial account
`High cost: Paypal suggests sending two deposits (credits)
`to the user’s financial account, each ofwhich is less than
`$0.99 in value.
`Weak account verification: An unauthorized individual
`
`who has access to the details about verifying transac-
`tions would be verified as the account owner.
`
`CashEdge’s system requires the customer to provide bank
`account information along with the username and password
`of the online banking web site that the customer is using to
`access his/her bank account. The system then applies the
`customer’s username and password to login to the online
`banking system for verification ofthe account ownership. The
`drawback of CashEdge system includes:
`Security and Privacy Concerns: Requesting the customer
`to provide the online banking username and password to
`CashEdge raises customers’ security and privacy con-
`cerns.
`Weak account verification: An unauthorized individual
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`who has access to the customer’s username and pass-
`word would be verified as the account owner.
`
`50
`
`Fraud Risk: Without CashEdge’s system, a fraudster who
`has access to customer’s online banking username and
`password, is not able to transfer funds from the custom-
`er’s account, but CashEdge system provides this oppor-
`tunity to an unauthorized individual to commit fraud.
`Financial institutions need a system that eliminates the
`aforementioned problems and concerns by:
`verifying customers’ identity
`verifying account ownerships in real-time
`providing prove of transaction authorization
`being secure, inexpensive and easy to use
`not requiring financial institutions to change their existing
`systems and processes
`covering bank account as well as credit card transactions
`For convenience, the term “customer” is used throughout
`to represent a financial institution’s individual or corporate
`customer.
`
`55
`
`60
`
`65
`
`14
`
`4
`
`The term “financial institution” is used herein to denote any
`institution such as bank, credit card issuer, brokerage firm,
`debit card or credit card Company such as Visa, Master card,
`and AMEX or any other company that offers financial ser-
`vices.
`
`The term “financial account” is used herein to denote any
`bank account, brokerage account, debit card and credit card
`account.
`
`The term “account ownership verification” is used herein
`to denote the process of verifying that the financial account
`belongs to the customer and the customer is authorized to use
`such financial account.
`The term “communication network” is used herein to
`
`denote any private, wireless or public network such as Inter-
`net.
`The term “indirect authentication” is used herein to denote
`
`any authentication method that authenticates the customers
`based on customers’ information. Meaning, customers pro-
`vide confidential, personal and financial information, in the
`form of social security numbers, names, addresses, credit
`card and bank account numbers, and businesses verify this
`information by accessing external databases.
`The term “direct authentication” is used herein to denote
`
`any authentication method that authenticates the customers
`based on customers’ credentials such as biometric data or
`smart card.
`The term “funds transfer network” is used herein to denote
`
`any network that financial institutions use to transfer funds,
`such as ACH, Fed wire, Visa network.
`The term “interbank funds transfer” is used herein to
`denote account-to-account funds transfer between accounts
`at different financial institutions.
`
`The term “debit pull” is used herein to denote the way
`electronic payments and funds transfer are authorized and
`executed, where the receiver of funds is asking customer’s
`financial institution to debit the customer’s account.
`
`The term “credit push” is used herein to denote the way
`electronic payments and funds transfer are authorized and
`executed, where the customer instructs his/her financial insti-
`tution to credit the account of the receiver (e.g. merchant
`account).
`identity” is used herein to denote a
`The term “digital
`dynamic, non-predictable and time dependent alphanumeric
`code, or any other key, which may be given by customer’s
`financial institution to the customer over a communication
`
`network such as the lntemet, and may be valid for one-time
`use. The customer’s digital identity is used for identification,
`authentication and authorization purposes for processing
`transactions over the communication network. Digital iden-
`tity is calculated using a proprietary algorithm that may
`include any other customer and/or transaction specific infor-
`mation to make the digital identity customer and transaction
`specific.
`The term “identity authority” is used herein to denote any
`entity that offers direct authentication services to other busi-
`nesses. Identity authority issues and manages the digital iden-
`tity.
`The term “Digital Identity System” is used herein to denote
`the system that deals with the calculation, transformation and
`validation of the digital identity using a proprietary algo-
`rithm.
`
`The term “Digital Identity Network” is used herein to
`denote the trusted network between financial
`institutions
`
`using any communication network such as the Internet. The
`Digital
`Identity Network enables
`the
`communication
`between financial institutions to send and receive Digital
`
`14
`
`

`
`US 7,444,676 B1
`
`5
`Identity Messages for identification and authentication of
`account owners and authorization of financial transactions.
`
`The term “Digital Identity Message” is used herein to
`denote the message sent or received over the Digital Identity
`Network that may include customer’s digital identity and
`transaction information.
`
`SUMMARY OF THE INVENTION
`
`The present invention provides solution to the aforemen-
`tioned problems and the challenges the financial institutions
`face today. The present invention relates to a direct authenti-
`cation and authorization system and method for trusted net-
`work of financial
`institutions allowing them to directly
`authenticate their customers and receive their authorization of
`financial or non-financial transactions over a communication
`network such as the Internet.
`
`To overcome the drawbacks of the known systems and
`methods discussed above, the present invention is based on a
`new identification and authentication method as digital iden-
`tity. The new digital identity-based identification and authen-
`tication system and method:
`verifies customers’ identity
`verifies account ownerships in real-time
`provides prove of transaction authorization
`reduces the risk of fraud and identity theft
`is secure, inexpensive and easy to use
`does not require financial institutions to change their exist-
`ing systems and processes
`could be utilized for bank account as well as credit card
`transactions
`
`The digital identity is an alphanumeric code and unlike
`password, biometric and smart card, the digital identity may
`be valid for one time use and is dynamic, non-predictable and
`may be time dependent, which is calculated using a propri-
`etary algorithm that may include other customer’s specific
`information, which makes the digital identity customer spe-
`cific. Thus, it is impossible to calculate the same digital iden-
`tity for two different customers or two different customers
`receive the same digital identity. Therefore, the digital iden-
`tity offers the benefits of a password, biometric and smart
`card, without their disadvantages. It’s as easy to use as pass-
`word and as secure as biometric and smart card.
`
`This invention comprises of Digital Identity System and
`Digital Identity Network. The Digital Identity System deals
`with the calculation, transformation and validation of the
`digital identity. The Digital Identity Network is the trusted
`network between financial institutions that enables the com-
`munication between financial institutions to send and receive
`Digital Identity Messages for identification and authentica-
`tion of account owners and authorization of financial or non-
`
`financial transactions. The Digital Identity Message may
`include customer’s digital identity and transaction informa-
`tion.
`
`Direct authentication and authorization system and
`method according to the present invention may include the
`following participants:
`Originator—the Originator is the individual or corporate
`customer ofthe Participating Financial Institution (PFI).
`The Originator receives a new digital identity from its
`Participating Financial Institution (PFI) each time the
`Originator desires to initiate and authorize any non-
`financial or financial transaction such as payment or
`funds transfer. The Originator provides the digital iden-
`tity to the Receiver for identification, authentication and/
`or authorization of the transaction.
`
`6
`Receiver: Receiver is the individual or corporate customer
`of the Participating Financial Institution (PFI) that
`receives Originator’s digital identity for identification,
`authentication and/or authorization of the non-financial
`
`or financial transaction such as payment or funds trans-
`fcr.
`
`PFI—the Participating Financial Institution is the financial
`institution that has an existing relationship with Origi-
`nators and/or Receivers and offers services to the Origi-
`nators and/or Receivers. When a PFI serves Originators,
`the PFI is acting as an Originating Participating Finan-
`cial Institution (OPFI) and when a PFI serves Receivers
`the PFI is acting as a Receiving Participating Financial
`Institution (RPFI). A Participating Financial Institution
`(PFI) may participate in the Digital Identity Network as
`an OPFI as well as a RPFI.
`
`DID Operator—the Digital Identity Operator is the digital
`identity authority that provides digital identity-based
`authentication and authorization services to the Partici-
`
`pating Financial Institutions (PFIs) by maintaining,
`operating and managing the Digital Identity System and
`Network. Each time the Originator desires to initiate and
`authorize any non-financial or financial transaction such
`as payment or funds transfer, its Participating Financial
`Institutions (OPFI) requests the DID Operator to calcu-
`late a new digital identity for that Originator.
`Financial institutions need to become the Digital Identity
`Network participants to perform identification and authenti-
`cation of their customers and/or receive their authorization of
`transactions.
`This invention enables financial institutions and their busi-
`
`ness customers to perform identification and authentication
`oftheir customers and/or to manifest their assent to the autho-
`
`identity,
`rization of transactions. The customer’s digital
`which has been provided to that customer by the customer’s
`financial institution, is issued and used at the time when third
`parties (e. g. merchant, billers) or other Participating Financial
`Institution needs to authenticate the customer’ s
`identity,
`verify the account ownership and/or receive the customer’s
`authorization for the financial or non-financial transaction.
`
`Participating Financial Institutions issue digital identities to
`their account holders and validate digital identities issued by
`other Participating Financial Institutions in real time. Using
`Digital Identity System and Network, financial institutions
`can establish an environment in which parties to a transaction
`can reliably verify the electronic identities of customers,
`engage in legally binding agreements, and maintain auditable
`electronic information trails. The resulting high level of secu-
`rity and trust enables financial institutions to better serve the
`customers by enhancing their online service offerings.
`This invention enables financial institutions to enhance
`
`security and reduce fraud by identifying their customers and
`account holders. This will allow them to provide various
`services to their customers.As an example, the invention may
`be used in interbank funds transfer transactions to perfonn
`identification and authentication, receive customers’ authori-
`zation and verify account ownership.As another example, the
`invention may be used in online payment transactions to
`perform identification and authentication of customers,
`receive customers’ authorization, obtain payments and
`receive account ownership verification.
`As another example, the invention may be used in identity
`verification service offered by financial institutions to provide
`customer identification in e-commerce.
`
`This invention relates to a system and method for verifica-
`tion of customers’ identity over a communication network
`such as the Internet.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`15
`
`15
`
`

`
`US 7,444,676 B1
`
`7
`Accordingly, it is a principal objective of the invention to
`perform account ownership verification in real-time over a
`communication network such as the Internet.
`
`It is another objective of the invention to allow all parties
`involved in a transaction to give and receive transaction
`authorization ovcr a communication nctwork such as thc
`Internet.
`
`It is another objective of the invention to provide a direct
`authentication and authorization system and method that is
`secure, inexpensive, easy to use and offers privacy to the
`financial institutions customers.
`
`It is another objective of the invention to provide a direct
`authentication and authorization system and method that does
`not require financial institutions to change their existing sys-
`tems.
`
`It is another objective of the invention to provide a direct
`authentication and authorization system and method that is
`independent from any financial institution and applies to vari-
`ous types of financial accounts.
`It is another objective of the invention to reduce fraud and
`identity theft and increase security.
`It is another objective of th

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket