Google llc (20240161097). Transaction Authentication simplified abstract
Contents
- 1 Transaction Authentication
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 Transaction Authentication - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
Transaction Authentication
Organization Name
Inventor(s)
Ankit Aggarwal of Singapore (SG)
Sakshi Gopal of Singapore (SG)
John J. Geewax, Jr. of Singapore (SG)
Ishaan Malhi of Singapore (SG)
Transaction Authentication - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240161097 titled 'Transaction Authentication
Simplified Explanation
The abstract describes a method for authenticating a transaction between two entities by generating transaction details information, encrypting it by digitally signing, and transmitting it to the first computing device.
- Receiving a transaction request between two entities
- Generating transaction details information for the transaction
- Encrypting the transaction details information by digitally signing it
- Transmitting the encrypted transaction details information to the first computing device
Potential Applications
This technology could be applied in various industries such as banking, e-commerce, and healthcare for secure and authenticated transactions between entities.
Problems Solved
This technology solves the problem of unauthorized access to transaction details and ensures the authenticity of the transaction between the two entities.
Benefits
The benefits of this technology include enhanced security, reduced risk of fraud, and increased trust between the entities involved in the transaction.
Potential Commercial Applications
The potential commercial applications of this technology include secure online payments, digital contracts, and secure data exchange between organizations.
Possible Prior Art
One possible prior art for this technology could be existing digital signature and encryption methods used in secure communication protocols.
Unanswered Questions
How does this technology compare to existing authentication methods?
This article does not provide a comparison with existing authentication methods to evaluate its effectiveness and efficiency.
What are the potential limitations or vulnerabilities of this technology?
The article does not address any potential limitations or vulnerabilities that may exist in the proposed method for authenticating transactions.
Original Abstract Submitted
a method for authenticating a transaction between two entities includes receiving, by one or more processors, a request associated with the transaction between a first entity associated with a first computing device and a second entity, generating, by the one or more processors, transaction details information associated with completion of the transaction between the first entity and the second entity, encrypting, by the one or more processors, the transaction details information by digitally signing the transaction details information, and transmitting, by the one or more processors, the transaction details information encrypted by the one or more processors, to the first computing device.