摘要 |
<p>The method involves generating a challenge by an authentication system (14) of a secure server system, and expecting a response from a user as an identity proof of the user. A receipt (17), incorporating a visual integrity control comprising an integration of the challenge and electronic transaction data, is generated in the system, where the data is in bitmap form having characters readable by a human being and not included in American standard code for information interchange (ASCII) character set. A response to the challenge is associated to the challenge and the transaction. An independent claim is also included for a system for implementing an electronic transaction securing method.</p> |