摘要 |
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. |
主权项 |
1. A computing system comprising:
a cell phone including
a screen;a video camera having a field of view, disposed proximate to the screen, and configured such that a person viewing the screen will be within the field of view; andlogic configured to
communicate over a secure channel with an authentication system,receive a video signal from the video camera and generate therefrom a first video stream that is encrypted and a second video stream that is not encrypted,render the second video stream to the screen, andtransmit the first video stream over the channel to the authentication system. |