Google llc (20240161097). Transaction Authentication simplified abstract

From WikiPatents
Jump to navigation Jump to search

Transaction Authentication

Organization Name

google llc

Inventor(s)

Ankit Aggarwal of Singapore (SG)

Sakshi Gopal of Singapore (SG)

John J. Geewax, Jr. of Singapore (SG)

Jia Lin Cai of Singapore (SG)

Ishaan Malhi of Singapore (SG)

Transaction Authentication - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240161097 titled 'Transaction Authentication

Simplified Explanation

The abstract describes a method for authenticating a transaction between two entities by generating transaction details information, encrypting it by digitally signing, and transmitting it to the first computing device.

  • Receiving a transaction request between two entities
  • Generating transaction details information for the transaction
  • Encrypting the transaction details information by digitally signing it
  • Transmitting the encrypted transaction details information to the first computing device

Potential Applications

This technology could be applied in various industries such as banking, e-commerce, and healthcare for secure and authenticated transactions between entities.

Problems Solved

This technology solves the problem of unauthorized access to transaction details and ensures the authenticity of the transaction between the two entities.

Benefits

The benefits of this technology include enhanced security, reduced risk of fraud, and increased trust between the entities involved in the transaction.

Potential Commercial Applications

The potential commercial applications of this technology include secure online payments, digital contracts, and secure data exchange between organizations.

Possible Prior Art

One possible prior art for this technology could be existing digital signature and encryption methods used in secure communication protocols.

Unanswered Questions

How does this technology compare to existing authentication methods?

This article does not provide a comparison with existing authentication methods to evaluate its effectiveness and efficiency.

What are the potential limitations or vulnerabilities of this technology?

The article does not address any potential limitations or vulnerabilities that may exist in the proposed method for authenticating transactions.


Original Abstract Submitted

a method for authenticating a transaction between two entities includes receiving, by one or more processors, a request associated with the transaction between a first entity associated with a first computing device and a second entity, generating, by the one or more processors, transaction details information associated with completion of the transaction between the first entity and the second entity, encrypting, by the one or more processors, the transaction details information by digitally signing the transaction details information, and transmitting, by the one or more processors, the transaction details information encrypted by the one or more processors, to the first computing device.