WO2001025874A2 - System and methods of providing verified network sessions with visual confirmation - Google Patents
System and methods of providing verified network sessions with visual confirmation Download PDFInfo
- Publication number
- WO2001025874A2 WO2001025874A2 PCT/US2000/027282 US0027282W WO0125874A2 WO 2001025874 A2 WO2001025874 A2 WO 2001025874A2 US 0027282 W US0027282 W US 0027282W WO 0125874 A2 WO0125874 A2 WO 0125874A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- server
- client
- transaction
- session
- record
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012790 confirmation Methods 0.000 title claims description 29
- 230000000007 visual effect Effects 0.000 title claims description 16
- 238000010200 validation analysis Methods 0.000 claims 5
- 235000014510 cooky Nutrition 0.000 description 62
- 230000008569 process Effects 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 8
- 238000012546 transfer Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 239000003814 drug Substances 0.000 description 2
- 229940079593 drug Drugs 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 229920000136 polysorbate Polymers 0.000 description 2
- 241001155433 Centrarchus macropterus Species 0.000 description 1
- 101100536354 Drosophila melanogaster tant gene Proteins 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 150000001768 cations Chemical class 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 239000000599 controlled substance Substances 0.000 description 1
- 230000000254 damaging effect Effects 0.000 description 1
- 239000000796 flavoring agent Substances 0.000 description 1
- 235000019634 flavors Nutrition 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000000955 prescription drug Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000135 prohibitive effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 108020001568 subdomains Proteins 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000002747 voluntary effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/75—Indicating network or usage conditions on the user display
Definitions
- the invention is related to the authentication and verification of two party transactions
- session level security such as SSL
- rity e.g., a bank or large well-known merchant
- that party can generally be relied upon to
- the present invention discloses methods for using available technologies and
- protocols to facilitate the witnessing of sessions between two parties generally a client and a
- the original parties can consult with one of the third parties to
- the invention also provides a method for generating or providing a visual confirma ⁇
- first server will be used to describe
- FIG 1 is an illustration of the system architecture of the present invention.
- Figure 2 is an illustration of the visual confirmation of a verified session according to the pre ⁇
- SSL Secured socket layer
- An SSL session is most commonly generated using a server public key certificate, and
- the clients most commonly authenticate themselves using passwords in a given session.
- the client may also provide a client public key certificate. However this is relatively
- data may be transmitted from the users' machine to one or both servers based on commands
- a cookie is a data record that may be written by a web server to a file on the user's machine.
- Microsoft Internet Explorer writes each cookie to a separate file, while Netscape
- RFC 2109 (Feb 1997).
- Each cookie may contain at most one variable name/value pair, with a total maximum
- a single server can write up to 30 cookies
- the top level domain is .com and the second level domain is ibm.com.
- port.ibm.com, etc. can all read the same cookie from the client browser.
- the present invention relies in part on the ability of multiple different web servers to read and write cookie records relating to the client's transaction, using the client's machine as
- a client can participate in a plurality of privileged and encrypted sessions with more than one server.
- server can participate in a plurality of privileged and encrypted sessions with more than one server.
- encrypts and writes back to the client machine can be read and acknowledged by other servers participating in the same session. Such data can be read and acknowledged by a plurality of
- the client's machine may thus be said to function as a "router" through which the
- tween servers is necessary and may not be desirable, but it is permitted.
- a preferred method involves the use of a standards-compliant Internet web browser
- witness servers might submit a list of one or more witness servers it deems acceptable, and the server could select one (or more) and embed the necessary commands into the pages it sends to the client.
- SSL sessions which are ordinarily two way secured communi ⁇
- the servers may either be different servers within the
- the first server may write either (a) a three dot specified i.e. domain-
- unrestricted cookie or (b) a two dot (..daguio.net) domain-restricted cookie as a means of transmitting data between the servers.
- the first server when beginning to transmit data, would create an
- the last cookie would contain footer data (such as a checksum, digital signature, DES MAC, or the like) relating to the other cookies in the group of cookies.
- the sending server generally reads back the browser cookie files it transmits, to ascertain that they were written
- the client browser 100 establishes
- the first server 102 writes back in step 106, a page referencing the second server 104 in
- the browser screen and program 105 establishes a second simultaneous secure
- step 108 the session in step 108, with the second server 104, which writes back to the browser screen 105,
- step 110 a confirmation in step 110, that it has agreed to participate.
- the first server 102 then completes at least the first portion of a transaction with the client 100, and writes in step 112, to the client's cookie storage file 114, one or more cookies
- server 104 which confirms their (cookie) contents, including any necessary authentication of
- the first server 102 tests of consistency and legitimacy of the transaction, and writes back
- step 118 to confirm that the transaction is okay, which is read back in
- step 120 and stored by the first server 102, for future reference.
- the receiving server would then (a) poll for the footer cookie expected to be written
- cookie message indicating that it had in fact read the group of cookies.
- the first server can check (e.g., poll) for this acknowledgment cookie from the witness server, to determine if the witnessing process (or at least the read operation by the wit ⁇
- a desirable feature of this approach is that the voluntary participation of each party is required and each party may independently or cooperatively perform functions in support of
- server can write a header cookie (which might include the information "cookie 1 of 10"),
- the first server might wish to write a very
- the first server would format the stream based transmission as a series
- the first server can indicate in the header cookie that it is about to write a
- the first server would indi ⁇
- ric cryptographic algorithms may be employed to protect and authenticate such data transmis ⁇
- cookie messages could be signed but unencrypted. It is also possible for sessions and
- a client user may commence a transaction (e.g., business, financial, or personal, etc.) with a first web server, wherein it is desired for the transaction to be witnessed by a mutually agreed third party witness server.
- a transaction e.g., business, financial, or personal, etc.
- the client and/or the first server may propose one or more potentially acceptable wit ⁇
- the first server will embed instructions into the pages
- the first server and witness server will possess the capability to write information to
- the client may have the ability to click on distinctive icons within each
- the client will then conduct at least a portion of the desired transaction with the first
- the first server will write back to the client a
- the witness server will then read the said cookies written by the first server, and con ⁇
- the witness server to initiate this read operation may be an action by the first server to inform
- the witness server may also decrypt them, assemble them back into the structured data file as intended by the first server, and verified a digital signature
- the witness server may display a summary of the transaction on the user's screen, with a request for the user to reconfirm the details as read by the witness server.
- the user's request for witness confirmation can merely transmit the en ⁇
- witness server only needs to compare the contents of the cookie confirmation record with
- Nal-ID can be split into two separate images, along a line drawn through the middle.
- the first server can display the left ("Nal") side of the logo, to visually inform the user that the confirmation system was in use, and the witness server can display the right ("ID”) side, once it has successfully performed its portion of the confirmation process.
- the pieces of the image can also be active icons, such that pressing one (or
- the first server displays a first portion of the visual representation 200, to the client when the first secure session is established. Then, when the second secure session is
- the second server signifies its presence and participation by, inter alia, displaying
- ond server has read the transaction details from the client, verified and confirmed them, and
- SMS System Management Server
- the implanted "server” can also take com ⁇
- the participation of the first server in the selection process is essen ⁇
- the client / end-user might make a ar- rangement for a "server" to be implanted on his machine, preferably with functionality lim ⁇
- remote "client” could be called upon, without the knowledge or consent of the first server, to witness a transaction with the first server. Based upon a pre-arranged signal, the remote
- client could record the contents of the entire interaction between the client and the first
- the witness server has been able to assist the client in authenti ⁇
- first server or primary server
- a second server can also participate in the underlying transaction, where the
- first server and second server collaborate to jointly deliver some goods or services to the end-
- a second server can also perform a secon ⁇
- the first server could also serve as a witness to the data flows between the client and the sec ⁇
- the client initiates a secure session with each such server, and the entire
- process is negotiated between the client and the first server, which embeds the references to the other server(s) in the primary page it sends to the client.
- a client contacts a merchant (first server) and
- the client the merchant embeds a reference to the merchant's bank into the page, and the cli ⁇
- the merchant ent establishes a second secure session with the merchant's bank, according to the present invention.
- the merchant solicits a credit card number from the client, and then utilizes the client-router methodology to transmit the credit card number and other transaction details to its
- the bank confirms the client's credit
- This methodology has the great advantage that it requires a small software modifica- tion to the merchant's server, to allow it to perform the routing through the client to the bank, and furthermore it can reassure the bank, which is itself participating in the session, that the
- a first server can represent a car
- the client selects the make and model of car, and any relevant options,
- the finance company can then cooperate
- the parties can cooperate to consummate all elements of this transaction without server-to-server communications, by routing the necessary information through
- the client with the full knowledge and cooperation of the client.
- FF Mile example a client initiates a session with a Hotel- Airline Frequent Flier (FF) Mile example
- the hotel attempts to reserve a room, paying in part with frequent flyer miles from an airline.
- the hotel At the request of the client, the hotel generates and sends a page to the client, which has the
- a client initiates a session with a government
- the tax agency (state, federal, etc.) adds the client's bank to the session, by writing
- the bank may effect the payment using
- a conventional payment system such as wire or ACH.
- Such accounts may be demand deposit, savings, money market, securities trading, retirement
- the client / end-user can establish a first session
- the first FI writes back a page that causes the client to invoke the second session with the second FI.
- the client then initiates an instruction to the first FI to
- the first FI confirms the availability of funds, and then writes
- the parties can add more confirmation steps as
- the hospital buyer first establishes a session with the seller of controlled substances, and requests that his relevant licensing agency be added to the
- an authenticated record that may span a series of cookies, to the user's machine, whereupon these cookies are then read, verified, and stored by
- the buyer and seller then finalize their transaction and the goods are shipped as requested.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU79918/00A AU7991800A (en) | 1999-10-04 | 2000-10-04 | System and methods for providing verified network sessions with visual confirmation |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15764299P | 1999-10-04 | 1999-10-04 | |
US60/157,642 | 1999-10-04 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001025874A2 true WO2001025874A2 (en) | 2001-04-12 |
WO2001025874A3 WO2001025874A3 (en) | 2001-08-30 |
Family
ID=22564625
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/027282 WO2001025874A2 (en) | 1999-10-04 | 2000-10-04 | System and methods of providing verified network sessions with visual confirmation |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU7991800A (en) |
WO (1) | WO2001025874A2 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6766450B2 (en) | 1995-10-24 | 2004-07-20 | Corestreet, Ltd. | Certificate revocation system |
US7205882B2 (en) | 2004-11-10 | 2007-04-17 | Corestreet, Ltd. | Actuating a security system using a wireless device |
US7337315B2 (en) | 1995-10-02 | 2008-02-26 | Corestreet, Ltd. | Efficient certificate revocation |
US7353396B2 (en) | 1995-10-02 | 2008-04-01 | Corestreet, Ltd. | Physical access control |
US7600129B2 (en) | 1995-10-02 | 2009-10-06 | Corestreet, Ltd. | Controlling access using additional data |
US7657751B2 (en) | 2003-05-13 | 2010-02-02 | Corestreet, Ltd. | Efficient and secure data currentness systems |
US7660994B2 (en) | 1995-10-24 | 2010-02-09 | Corestreet, Ltd. | Access control |
US7716486B2 (en) | 1995-10-02 | 2010-05-11 | Corestreet, Ltd. | Controlling group access to doors |
US7822989B2 (en) | 1995-10-02 | 2010-10-26 | Corestreet, Ltd. | Controlling access to an area |
US7966487B2 (en) | 2004-01-09 | 2011-06-21 | Corestreet, Ltd. | Communication-efficient real time credentials for OCSP and distributed OCSP |
US8015597B2 (en) | 1995-10-02 | 2011-09-06 | Corestreet, Ltd. | Disseminating additional data used for controlling access |
US8261319B2 (en) | 1995-10-24 | 2012-09-04 | Corestreet, Ltd. | Logging access attempts to an area |
US8707030B2 (en) | 2003-11-19 | 2014-04-22 | Corestreet, Ltd. | Distributed delegated path discovery and validation |
US8732457B2 (en) | 1995-10-02 | 2014-05-20 | Assa Abloy Ab | Scalable certificate validation and simplified PKI management |
CN108921534A (en) * | 2018-07-06 | 2018-11-30 | 中国电力财务有限公司 | A kind of inter-bank method of payment and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5630081A (en) * | 1995-09-07 | 1997-05-13 | Puma Technology, Inc. | Connection resource manager displaying link-status information using a traffic light iconic representation |
US6170017B1 (en) * | 1997-05-08 | 2001-01-02 | International Business Machines Corporation | Method and system coordinating actions among a group of servers |
US6134658A (en) * | 1997-06-09 | 2000-10-17 | Microsoft Corporation | Multi-server location-independent authentication certificate management system |
-
2000
- 2000-10-04 WO PCT/US2000/027282 patent/WO2001025874A2/en active Application Filing
- 2000-10-04 AU AU79918/00A patent/AU7991800A/en not_active Abandoned
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7716486B2 (en) | 1995-10-02 | 2010-05-11 | Corestreet, Ltd. | Controlling group access to doors |
US8732457B2 (en) | 1995-10-02 | 2014-05-20 | Assa Abloy Ab | Scalable certificate validation and simplified PKI management |
US7337315B2 (en) | 1995-10-02 | 2008-02-26 | Corestreet, Ltd. | Efficient certificate revocation |
US7353396B2 (en) | 1995-10-02 | 2008-04-01 | Corestreet, Ltd. | Physical access control |
US8015597B2 (en) | 1995-10-02 | 2011-09-06 | Corestreet, Ltd. | Disseminating additional data used for controlling access |
US7600129B2 (en) | 1995-10-02 | 2009-10-06 | Corestreet, Ltd. | Controlling access using additional data |
US7822989B2 (en) | 1995-10-02 | 2010-10-26 | Corestreet, Ltd. | Controlling access to an area |
US7529928B2 (en) | 1995-10-24 | 2009-05-05 | Corestreet, Ltd. | Certificate revocation system |
US7660994B2 (en) | 1995-10-24 | 2010-02-09 | Corestreet, Ltd. | Access control |
US6766450B2 (en) | 1995-10-24 | 2004-07-20 | Corestreet, Ltd. | Certificate revocation system |
US8261319B2 (en) | 1995-10-24 | 2012-09-04 | Corestreet, Ltd. | Logging access attempts to an area |
US7657751B2 (en) | 2003-05-13 | 2010-02-02 | Corestreet, Ltd. | Efficient and secure data currentness systems |
US8707030B2 (en) | 2003-11-19 | 2014-04-22 | Corestreet, Ltd. | Distributed delegated path discovery and validation |
US7966487B2 (en) | 2004-01-09 | 2011-06-21 | Corestreet, Ltd. | Communication-efficient real time credentials for OCSP and distributed OCSP |
US7205882B2 (en) | 2004-11-10 | 2007-04-17 | Corestreet, Ltd. | Actuating a security system using a wireless device |
CN108921534A (en) * | 2018-07-06 | 2018-11-30 | 中国电力财务有限公司 | A kind of inter-bank method of payment and device |
Also Published As
Publication number | Publication date |
---|---|
AU7991800A (en) | 2001-05-10 |
WO2001025874A3 (en) | 2001-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3509006B1 (en) | Information sharing system | |
US11514440B2 (en) | Method for issuing authentication information and blockchain-based server using the same | |
US7003480B2 (en) | GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions | |
US7788499B2 (en) | Security tokens including displayable claims | |
US7676433B1 (en) | Secure, confidential authentication with private data | |
US5864667A (en) | Method for safe communications | |
DE69828971T2 (en) | Symmetrically secured electronic communication system | |
US8024570B2 (en) | Method and system for communication via a computer network | |
DE69529801T2 (en) | Process and system for protecting digital information | |
RU2292589C2 (en) | Authentified payment | |
US20090271321A1 (en) | Method and system for verification of personal information | |
CN108805573A (en) | A kind of Information Authentication method, server and storage medium | |
US20140236835A1 (en) | System and method for application security | |
US20010042051A1 (en) | Network transaction system for minimizing software requirements on client computers | |
CA2335968A1 (en) | Bi-directional, anonymous electronic transactions | |
WO2007092577A2 (en) | A point-of-sale terminal transactions using mutating identifiers | |
WO2001025874A2 (en) | System and methods of providing verified network sessions with visual confirmation | |
JP2002536732A (en) | How to operate infrastructure and applications for encryption-supported services | |
KR102085997B1 (en) | Method and system for real estate transaction service based on block chain | |
US20010037318A1 (en) | Third party payment in e-commerce | |
CN106452796A (en) | Authentication and authorization method, tax-related business platform and related device | |
CN101335754A (en) | Method for information verification using remote server | |
CN111583041B (en) | Block chain-based bond issuing data storage and verification processing method and device | |
CN1319024C (en) | Electronic information processing method | |
CN115423457A (en) | Cross-border financial payment settlement method and system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ CZ DE DE DK DK DM DZ EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ CZ DE DE DK DK DM DZ EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |