Browse Prior Art Database

Verification of a Transaction Utilizing a Trusted Third Agent for Independent Feedback

IP.com Disclosure Number: IPCOM000013371D
Original Publication Date: 2002-Jun-13
Included in the Prior Art Database: 2003-Jun-18
Document File: 5 page(s) / 64K

Publishing Venue

IBM

Abstract

Verification of a Transaction Utilizing a Trusted Third Agent

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 42% of the total text.

Page 1 of 5

  Verification of a Transaction Utilizing a Trusted Third Agent for Independent Feedback

Verification of a Transaction Utilizing a Trusted Third Agent

Abstract

We report an architecture and business method by which electronic transitions can be verified using wireless and GPS technology. The convergence of wireless and GPS technologies is inevitable, and indeed, useful for securing electronic transactions. Our design is generally applicable to electronic transactions such as purchases and to electronic signatures for documents such as medical and legal. The verification occurs when both the seller and purchaser exchange information of the transaction with an independent verifying agent. The seller communicates the information about the transaction, such as price, quantity, and location. This information is then passed along to the purchaser through an independent path (i.e. cell phone, wireless device, or smart card) so that the purchaser can then take action on the transaction. This action is in the form of a confirmation that can occur in either active or passive mode. In the active mode, the purchaser must actually confirm the transaction by sending a signal to the verifying agent. In the passive mode, the verifier will electronically confirm that the purchase is typical for the user (via a similarity database) or that the purchaser is actually at the location via a GPS enabled wireless device. A natural extension of the scheme is that the verifying-purchaser is remote from the purchasing-purchaser allowing for multiple remote transactions to be confirmed by a single person.

A Simple Example Transaction

1) The Purchaser orders the product or service, and supplies both the means of payment, delivery information, and a synchronised key.
2) The Seller contacts the Verifier for confirmation, passing along the key, a description and other information about the purchased item.
3) The Verifier confirms the key and contacts the Purchaser by a predetermined means (eg digital wireless communication). If the purchaser has previously disabled or locked out his/her receiver, the Verifier denies the request because of a "lock-out".
4) If the Purchaser is "listening", he/she confirms or denies the requested purchase to the Verifier. In the case of multiple cards on an account the purchases may request further information and place the transaction on hold.
5) The Verifier confirms, denies, or holds the request to the Seller.
6) The Seller delivers product or service when approved.

1

Page 2 of 5

Note that in this simple transaction the Purchaser and the person the Verifier contacts are the same person. If transactions occur without the Purchasers knowledge, the Purchaser is contact by the Verifier, and place a hold on, or denies the transaction.

Problem

Currently, there is no secure and immediate verification scheme for transactions tranditionally requiring signatures which are made remotely, either over the phone or electronically. That is, it is po...