US20090312090A1 - Online Banking Through a Gaming Console - Google Patents

Online Banking Through a Gaming Console Download PDF

Info

Publication number
US20090312090A1
US20090312090A1 US12/140,579 US14057908A US2009312090A1 US 20090312090 A1 US20090312090 A1 US 20090312090A1 US 14057908 A US14057908 A US 14057908A US 2009312090 A1 US2009312090 A1 US 2009312090A1
Authority
US
United States
Prior art keywords
gaming console
credentials
console
gaming
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/140,579
Inventor
Daniel P. Shnowske
William Scott Treadwell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of America Corp
Original Assignee
Bank of America Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of America Corp filed Critical Bank of America Corp
Priority to US12/140,579 priority Critical patent/US20090312090A1/en
Assigned to BANK OF AMERICA CORPORATION reassignment BANK OF AMERICA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SHNOWSKE, DANIEL P., TREADWELL, WILLIAM SCOTT
Priority to GB0910527A priority patent/GB2460955A/en
Publication of US20090312090A1 publication Critical patent/US20090312090A1/en
Priority to US14/687,182 priority patent/US20150221172A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • G07F17/3244Payment aspects of a gaming system, e.g. payment schemes, setting payout ratio, bonus or consolation prizes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/40Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterised by details of platform network
    • A63F2300/401Secure communication, e.g. using encryption or authentication
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/40Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterised by details of platform network
    • A63F2300/407Data transfer via internet
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/50Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers

Definitions

  • online banking Since its inception, online banking has faced many security obstacles. From keyloggers to phishers, an endless throng of security risks exist in the online banking industry. Despite the convenience and ease that online banking provides, consumers may steer away from online banking to avoid the dangers of electronic threats. Part of the danger results from the vast array of modifications hackers may make to their computing devices to attempt to circumvent the security measures instituted by financial institutions. In some instances, hackers may use certain devices to spoof the origin of online banking requests or install software to guess at user passwords. Additionally, consumers may simply avoid online banking due to their aversion to computers in general. Thus, while online banking provides conveniences, there remain issues that continue to discourage consumers from adopting the technology.
  • Gaming consoles are generally hardened devices (i.e., devices with standard parts and configurations) that are specifically designed for gaming and other types of entertainment. In contrast to general computing devices, gaming consoles are typically not as easily hacked or reconfigured due to their hardened nature. Accordingly, gaming consoles may offer an alternative for online banking. Additionally, with the explosive growth of the gaming industry, providing online banking through gaming consoles may allow financial institutions to tap into previously untouched markets. In practice, console integrity may be verified using console credentials that may be hardcoded into the gaming device. In addition, access to a financial account may be regulated by console and user specific credentials.
  • console specific credentials may be hardcoded into a chip in the console to prevent tampering and/or hacking. User specific credentials may also be used as an added level of protection.
  • a gaming service provider may further be used to verify console integrity and, in some instances, to facilitate communication between a gaming console and the financial institution.
  • FIG. 1 illustrates a schematic diagram of a general-purpose digital computing environment in which aspects described herein may be used
  • FIG. 2 is an illustrative block diagram of workstations and servers that may be used to implement one or more of the processes and functions of various embodiments;
  • FIG. 3 is a flowchart illustrating a method for accessing a financial account through a gaming console according to one or more aspects described herein;
  • FIG. 4 is a flowchart illustrating a method for verifying a game console requesting account access according to one or more aspects described herein;
  • FIGS. 5A and 5B illustrate information flows in various network configurations according to one or more aspects described herein;
  • FIG. 6 illustrates different passwords that may be used in a gaming console environment for logging into online banking
  • FIG. 7 illustrates an example interface through which a user may login to a financial account
  • FIG. 8 illustrates an example interface through which a user may select a banking or gaming account profile.
  • FIG. 1 illustrates a block diagram of a computing environment 100 including a generic computing device 101 (e.g., a computer server) that may be used according to an illustrative embodiment of the invention.
  • the computer 101 may have a processor 103 for controlling overall operation of the server and its associated components, including RAM 105 , ROM 107 , input/output (I/O) module 109 , and memory 115 .
  • I/O 109 may include a microphone, keypad, touch screen, and/or stylus through which a user of device 101 may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual and/or graphical output.
  • Software may be stored within memory 115 and/or storage to provide instructions to processor 103 for enabling server 101 to perform various functions.
  • memory 115 may store software used by the server 101 , such as an operating system 117 , application programs 119 , and an associated database 121 .
  • some or all of server 101 computer executable instructions may be embodied in hardware or firmware (not shown).
  • the database 121 may provide centralized storage of account information and account holder information for the entire business, allowing interoperability between different elements of the business residing at different physical locations.
  • the computer 101 may operate in a networked environment supporting connections to one or more remote computers, such as terminals 141 and 151 .
  • the terminals 141 and 151 may be personal computers or servers that include many or all of the elements described above relative to the server 101 .
  • the network connections depicted in FIG. 1 include a local area network (LAN) 125 and a wide area network (WAN) 129 , but may also include other networks.
  • LAN local area network
  • WAN wide area network
  • the computer 101 is connected to the LAN 125 through a network interface or adapter 123 .
  • the server 101 may include a modem 127 or other means for establishing communications over the WAN 129 , such as the Internet 131 .
  • network connections shown are illustrative and other means of establishing a communications link between the computers may be used.
  • the existence of any of various well-known protocols such as TCP/IP, Ethernet, FTP, HTTP and the like is presumed, and the system can be operated in a client-server configuration to permit a user to retrieve web pages from a web-based server.
  • Any of various conventional web browsers can be used to display and manipulate data on web pages.
  • an application program 119 used by the computer 101 may include computer executable instructions for invoking user functionality related to communication, such as email, short message service (SMS), and voice input and speech recognition applications.
  • SMS short message service
  • Computing device 101 and/or terminals 141 or 151 may also be mobile terminals including various other components, such as a battery, speaker, and antennas (not shown).
  • the invention is operational with numerous other general purpose or special purpose computing system environments or configurations.
  • Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
  • the invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer.
  • program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote computer storage media including memory storage devices.
  • system 200 may include one or more workstations 201 .
  • Workstations 201 may be local or remote, and are connected by one or more communication links 202 to computer network 203 that is linked via communications links 205 to server 204 .
  • server 204 may be any suitable server, processor, computer, or data processing device, or combination of the same. Server 204 may be used to process the instructions received from, and the transactions entered into by, one or more participants.
  • Computer network 203 may be any suitable computer network including the Internet, an intranet, a wide-area network (WAN), a local-area network (LAN), a wireless network, a digital subscriber line (DSL) network, a frame relay network, an asynchronous transfer mode (ATM) network, a virtual private network (VPN), or any combination of any of the same.
  • Communications links 202 and 205 may be any communications links suitable for communicating between workstations 201 and server 204 , such as network links, dial-up links, wireless links, hard-wired links, etc.
  • computing device 101 of FIG. 1 may comprise a game console such as, but not limited to, MICROSOFT XBOX360, SONY PLAYSTATION 3 and NINTENDO WII.
  • a game console generally refers to a computing device that comprises dedicated gaming components (e.g., software, hardware, firmware, device connectors, etc.) and that is specifically configured for gaming.
  • a gaming console may have proprietary or generic input/output ports for game input devices having directional keys, a series of color or letter coded buttons, specific firmware or operating systems for executing game instructions, dedicated graphics and the like.
  • a game console may further exist in a networked environment as illustrated in FIG. 2 .
  • a game console may include a component such as a computer chip in which a hardware or console identifier and/or other information is hardcoded. Hardcoding an identifier and/or other information onto a piece of hardware such as a chip provides additional protection against hacking and other attempts to infiltrate computing devices. Console identification information or other data may be hardcoded in a manner such that if an intruder attempts to hack the console, the chip and the information stored therein may be destroyed.
  • gaming consoles Although most game consoles are designed with gaming in mind, some gaming consoles have evolved to include other capabilities as well. Thus, while one of the primary purposes of a gaming console is still to provide an enjoyable and immersive gaming experience, other activities such as web browsing and movie watching may also be performed on such consoles.
  • FIG. 3 is a flowchart illustrating a method for accessing an online banking system through a gaming console while maintaining a secure environment.
  • a gaming console may receive a request from a user to access a financial account.
  • a user may select an online banking option in a main menu of the gaming console operating system causing an online banking application to be launched on the console.
  • An online banking application may be distributed from a financial institution in the form of a digital download, a CD-ROM or other portable media among others.
  • the game console may request or retrieve one or more credentials specific to the gaming console in step 305 .
  • the one or more credentials may include a unique console identifier assigned by a manufacturer or supplier and hardcoded onto a console component (e.g., a chip).
  • a console component e.g., a chip
  • a client side certificate or key unique to each console may be extracted from a hardware chip in the console.
  • the application may then verify the integrity of the console using the one or more credentials in step 310 .
  • the gaming console may verify, with a game service provider, that the console has not been stolen.
  • a game service provider may track when consoles are stolen and flag the corresponding console credentials accordingly.
  • a game service provider may track the status of consoles based on reports submitted by the users of the consoles.
  • the console may subsequently establish a secure connection with a server of the financial institution associated with the financial account in step 320 .
  • the gaming console and banking application may receive a request from the financial institution server for console specific credentials and/or user specific credentials such as an account identifier, a password, account number, gamer tag, gaming profile, a personal identification number (PIN) and the like.
  • a password may include characters or codes corresponding to input buttons such as a directional key on a game controller, movements of a joystick and/or a motion or series of motions (e.g., detected by a motion sensor), as is described in further detail below.
  • an account name or login name may be automatically determined based on a currently active gaming or user profile. For example, a login name may be automatically identified as the gamer tag associated with a particular user profile and thus, a user might not need to manually enter the user or account name.
  • the gaming console may transmit the requested credentials to the financial institution server for validation and verification in step 330 . If the credentials are validated and verified, the gaming console and banking application may subsequently receive authorization to access the financial account and conduct financial transactions from the financial institution server in step 335 . Information sent to and from the gaming console may be encrypted or otherwise secured. Alternatively, if the credentials are not verified or validated, an access denial message may be received in step 340 .
  • FIG. 4 illustrates a method for authorizing a user and console to access a financial account.
  • a financial institution may receive a request to access a financial account from a gaming console.
  • the request may include one or more credentials for the console, the user, or both. If credentials are not included in the request, the financial institution may request the credentials. Regardless, the financial institution may obtain the one or more credentials in step 405 (e.g., by extraction from the request or requesting from the console/user).
  • the financial institution may determine whether the received console specific credentials are valid. The validation may be conducted in a variety of manners including verifying that the credentials match what is stored in an account information database.
  • user and/or console specific credentials may be collected and saved in association with a financial account during a registration process. If the console specific credentials are valid, the financial institution may optionally validate the user specific credentials in step 415 . For example, if the user specific credentials include an account name and password, the name and password may be compared against what is stored in the account information database. If the user specific credentials are validated, the financial institution may then transmit an authorization to access the financial account to the gaming console in step 420 . If, however, either the console specific credentials or the user specific credentials are not valid or cannot be verified, the financial institution may transmit a denial of access message to the console and user in step 425 .
  • the financial institution may optionally validate the user specific credentials in step 415 . For example, if the user specific credentials include an account name and password, the name and password may be compared against what is stored in the account information database. If the user specific credentials are validated, the financial institution may then transmit an authorization to access the financial account to the gaming console in step 420 . If, however, either the console specific
  • the financial institution may further verify the integrity of the console by querying a remote gaming service provider with the one or more console specific credentials.
  • the remote gaming service provider may be able to provide information regarding, the owner, whether the console has been stolen, whether the console is registered or not registered with the service provider and the like. If the console specific credentials have been marked as stolen or not registered, the financial institution may receive a response indicating such status information (e.g., indication that console integrity cannot be verified). Alternatively, if the console specific credentials are registered and/or does not indicate the console was stolen, the financial institution may receive an indication that the console integrity is verified.
  • FIG. 5 illustrates a network diagram showing one example of a flow of information between a financial institution 501 , a gaming console 503 and a gaming service provider 505 .
  • a financial institution 501 may initially transmit an online banking application configured to interface with the financial institution to gaming console 503 .
  • the gaming console 503 may transmit console and user specific credentials to a financial institution 501 along with a request to access an account and/or perform a transaction.
  • Console integrity may be verified by either the gaming console 503 (i.e., through the banking application) or by the financial institution 501 .
  • console integrity may be verified by sending a query to gaming service provider 505 .
  • the financial institution 501 may further validate the credentials to determine if access is authorized. If so, the financial institution 501 may respond with a grant of access; however, if not, a response may include a denial of service.
  • FIG. 5B illustrates an alternative network diagram showing another flow of information between a financial institution 551 , a gaming console 553 and a gaming service provider 555 .
  • gaming console 553 and financial institution 551 may communicate through gaming service provider 555 .
  • communications may be piggybacked on an existing network architecture established between gaming console 553 and gaming service provider 555 (e.g., XBOX LIVE network).
  • the gaming service provider 555 may forward console and/or user specific credentials to financial institution 551 for validation.
  • Gaming service provider 555 may provide a secure transmission channel between gaming console 553 and financial institution 551 based on existing network protocols. Additionally, secure communications may be established between the financial institution 551 and the gaming service provider 555 without substantial risk of hacking or security circumvention that might exist by establishing direct communications with the gaming console 553 .
  • FIG. 6 illustrates various types of passwords or credentials that may be used to verify a user.
  • controller 600 may include a series of directional buttons 603 , color coded and letter coded buttons 605 , a joystick 607 and one or more motion sensing components (not shown).
  • a user may enter a password 609 including presses of the directional buttons 603 and color and letter coded buttons 605 .
  • the same or a different user may enter a password 611 that is based solely on a motion such as a check mark entered using joystick 607 or movement of the controller 600 .
  • a combination of alphanumeric characters, buttons 603 and 605 and motions may be used, as shown in password 613 .
  • a duration of a button press may also be specified as part of a password.
  • FIG. 7 illustrates a login interface for online banking access.
  • Interface 700 includes a menu bar 705 including multiple activity options such as ABC Bank Online option 705 a.
  • interface 700 may include account and password entry fields 715 and 720 , a get profile option 710 and a console integrity verification indicator 725 .
  • Console integrity verification indicator 725 provides users with a notification of whether the console was verified as valid. In some instances, indicator 725 may indicate that the console was stolen and/or was not verified. In such cases, a user might not be allowed to login to online banking (e.g., fields 715 and 720 may be deactivated or grayed out).
  • Get profile option 710 allows a user to choose a gamer or banking profile. Profiles may be used to store account IDs, passwords, banking preferences and configurations and the like. Alternatively, a user may manually enter account ID and password information without selection of a profile.
  • FIG. 8 illustrates a profile selection interface for selecting an online banking profile.
  • Profile selection interface 750 may be displayed in response to a user selecting a get profile option such as option 710 of FIG. 7 .
  • a profile selection menu 730 may be displayed with multiple selectable profiles 740 .
  • Each profile in menu 730 may provide information about that profile including a gamer tag or account ID and a rating. The rating may correspond to a number of games played, a proficiency of a user associated with the profile in one or more games, frequency with which a user uses one or more application (e.g., a particular game or the online banking application) and the like.
  • a user may select done 735 to finalize the choice and return to the login screen. Alternatively or additionally, upon selecting a desired profile, the user may be automatically logged in.
  • credentials in addition to console specific and user specific credentials may further be required and validated before access is granted by a financial institution.
  • other credentials may include a code or password generated by a device that is configured to change or update the code or password at predefined times (e.g., every 30 seconds).
  • a console may be required to submit user specific credentials, console specific credentials and a code or password generated by another device (i.e., other than the console).
  • aspects described herein may be embodied as a method, a data processing system, or as one or more computer-readable media storing computer-executable instructions. Accordingly, those aspects may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects.
  • signals representing data or events as described herein may be transferred between a source and a destination in the form of light and/or electromagnetic waves traveling through signal-conducting media such as metal wires, optical fibers, and/or wireless transmission media (e.g., air and/or space).

Abstract

Online banking using a gaming console may provide added security due to the hardened nature of gaming consoles. Additionally, console specific credentials may be used to verify that a user or console is authorized to access a requested financial account. The console specific credentials may be hardcoded in one or more hardware components of the gaming console so that the risks of exposure through tampering or hacking is reduced. User specific credentials and/or other information may also be used to further verify that a user or console is authorized to access a financial account. An integrity of the console may also be validated using console specific information. In one example, console integrity may be verified by a gaming service provider.

Description

    BACKGROUND
  • Since its inception, online banking has faced many security obstacles. From keyloggers to phishers, an endless throng of security risks exist in the online banking industry. Despite the convenience and ease that online banking provides, consumers may steer away from online banking to avoid the dangers of electronic threats. Part of the danger results from the vast array of modifications hackers may make to their computing devices to attempt to circumvent the security measures instituted by financial institutions. In some instances, hackers may use certain devices to spoof the origin of online banking requests or install software to guess at user passwords. Additionally, consumers may simply avoid online banking due to their aversion to computers in general. Thus, while online banking provides conveniences, there remain issues that continue to discourage consumers from adopting the technology.
  • SUMMARY
  • The following presents a simplified summary in order to provide a basic understanding of some aspects of the invention. The summary is not an extensive overview of the invention. It is neither intended to identify key or critical elements of the invention nor to delineate the scope of the invention. The following summary merely presents some concepts of the invention in a simplified form as a prelude to the description below.
  • Aspects described herein relate to providing online banking through a dedicated or special-purpose gaming console. Gaming consoles are generally hardened devices (i.e., devices with standard parts and configurations) that are specifically designed for gaming and other types of entertainment. In contrast to general computing devices, gaming consoles are typically not as easily hacked or reconfigured due to their hardened nature. Accordingly, gaming consoles may offer an alternative for online banking. Additionally, with the explosive growth of the gaming industry, providing online banking through gaming consoles may allow financial institutions to tap into previously untouched markets. In practice, console integrity may be verified using console credentials that may be hardcoded into the gaming device. In addition, access to a financial account may be regulated by console and user specific credentials. Stated differently, authorization for access to a financial account may be given based on whether console and/or user specific credentials matches predefined information. In one arrangement, console specific credentials may be hardcoded into a chip in the console to prevent tampering and/or hacking. User specific credentials may also be used as an added level of protection. A gaming service provider may further be used to verify console integrity and, in some instances, to facilitate communication between a gaming console and the financial institution.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present disclosure is illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements.
  • FIG. 1 illustrates a schematic diagram of a general-purpose digital computing environment in which aspects described herein may be used;
  • FIG. 2 is an illustrative block diagram of workstations and servers that may be used to implement one or more of the processes and functions of various embodiments;
  • FIG. 3 is a flowchart illustrating a method for accessing a financial account through a gaming console according to one or more aspects described herein;
  • FIG. 4 is a flowchart illustrating a method for verifying a game console requesting account access according to one or more aspects described herein;
  • FIGS. 5A and 5B illustrate information flows in various network configurations according to one or more aspects described herein;
  • FIG. 6 illustrates different passwords that may be used in a gaming console environment for logging into online banking;
  • FIG. 7 illustrates an example interface through which a user may login to a financial account; and
  • FIG. 8 illustrates an example interface through which a user may select a banking or gaming account profile.
  • DETAILED DESCRIPTION
  • In the following description of various illustrative embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown, by way of illustration, various embodiments in which the claimed subject matter may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope of the present claimed subject matter.
  • FIG. 1 illustrates a block diagram of a computing environment 100 including a generic computing device 101 (e.g., a computer server) that may be used according to an illustrative embodiment of the invention. The computer 101 may have a processor 103 for controlling overall operation of the server and its associated components, including RAM 105, ROM 107, input/output (I/O) module 109, and memory 115.
  • I/O 109 may include a microphone, keypad, touch screen, and/or stylus through which a user of device 101 may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual and/or graphical output. Software may be stored within memory 115 and/or storage to provide instructions to processor 103 for enabling server 101 to perform various functions. For example, memory 115 may store software used by the server 101, such as an operating system 117, application programs 119, and an associated database 121. Alternatively, some or all of server 101 computer executable instructions may be embodied in hardware or firmware (not shown). As described in detail below, the database 121 may provide centralized storage of account information and account holder information for the entire business, allowing interoperability between different elements of the business residing at different physical locations.
  • The computer 101 may operate in a networked environment supporting connections to one or more remote computers, such as terminals 141 and 151. The terminals 141 and 151 may be personal computers or servers that include many or all of the elements described above relative to the server 101. The network connections depicted in FIG. 1 include a local area network (LAN) 125 and a wide area network (WAN) 129, but may also include other networks. When used in a LAN networking environment, the computer 101 is connected to the LAN 125 through a network interface or adapter 123. When used in a WAN networking environment, the server 101 may include a modem 127 or other means for establishing communications over the WAN 129, such as the Internet 131. It will be appreciated that the network connections shown are illustrative and other means of establishing a communications link between the computers may be used. The existence of any of various well-known protocols such as TCP/IP, Ethernet, FTP, HTTP and the like is presumed, and the system can be operated in a client-server configuration to permit a user to retrieve web pages from a web-based server. Any of various conventional web browsers can be used to display and manipulate data on web pages.
  • Additionally, an application program 119 used by the computer 101 according to an illustrative embodiment of the invention may include computer executable instructions for invoking user functionality related to communication, such as email, short message service (SMS), and voice input and speech recognition applications.
  • Computing device 101 and/or terminals 141 or 151 may also be mobile terminals including various other components, such as a battery, speaker, and antennas (not shown).
  • The invention is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
  • The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
  • Referring to FIG. 2, an illustrative system 200 for implementing methods according to the present invention is shown. As illustrated, system 200 may include one or more workstations 201. Workstations 201 may be local or remote, and are connected by one or more communication links 202 to computer network 203 that is linked via communications links 205 to server 204. In system 200, server 204 may be any suitable server, processor, computer, or data processing device, or combination of the same. Server 204 may be used to process the instructions received from, and the transactions entered into by, one or more participants.
  • Computer network 203 may be any suitable computer network including the Internet, an intranet, a wide-area network (WAN), a local-area network (LAN), a wireless network, a digital subscriber line (DSL) network, a frame relay network, an asynchronous transfer mode (ATM) network, a virtual private network (VPN), or any combination of any of the same. Communications links 202 and 205 may be any communications links suitable for communicating between workstations 201 and server 204, such as network links, dial-up links, wireless links, hard-wired links, etc.
  • As understood by those skilled in the art, the steps that follow in the Figures may be implemented by one or more of the components in FIGS. 1 and 2 and/or other components, including other computing devices.
  • In one configuration described herein, computing device 101 of FIG. 1 may comprise a game console such as, but not limited to, MICROSOFT XBOX360, SONY PLAYSTATION 3 and NINTENDO WII. A game console, as used herein, generally refers to a computing device that comprises dedicated gaming components (e.g., software, hardware, firmware, device connectors, etc.) and that is specifically configured for gaming. For example, a gaming console may have proprietary or generic input/output ports for game input devices having directional keys, a series of color or letter coded buttons, specific firmware or operating systems for executing game instructions, dedicated graphics and the like. A game console may further exist in a networked environment as illustrated in FIG. 2. According to one aspect, a game console may include a component such as a computer chip in which a hardware or console identifier and/or other information is hardcoded. Hardcoding an identifier and/or other information onto a piece of hardware such as a chip provides additional protection against hacking and other attempts to infiltrate computing devices. Console identification information or other data may be hardcoded in a manner such that if an intruder attempts to hack the console, the chip and the information stored therein may be destroyed.
  • Although most game consoles are designed with gaming in mind, some gaming consoles have evolved to include other capabilities as well. Thus, while one of the primary purposes of a gaming console is still to provide an enjoyable and immersive gaming experience, other activities such as web browsing and movie watching may also be performed on such consoles.
  • FIG. 3 is a flowchart illustrating a method for accessing an online banking system through a gaming console while maintaining a secure environment. In step 300, a gaming console may receive a request from a user to access a financial account. In one example, a user may select an online banking option in a main menu of the gaming console operating system causing an online banking application to be launched on the console. An online banking application may be distributed from a financial institution in the form of a digital download, a CD-ROM or other portable media among others.
  • In response to the user request, the game console may request or retrieve one or more credentials specific to the gaming console in step 305. In one arrangement, the one or more credentials may include a unique console identifier assigned by a manufacturer or supplier and hardcoded onto a console component (e.g., a chip). In the instance of MICROSOFT XBOX360, a client side certificate or key unique to each console may be extracted from a hardware chip in the console. The application may then verify the integrity of the console using the one or more credentials in step 310. In one example, the gaming console may verify, with a game service provider, that the console has not been stolen. A game service provider may track when consoles are stolen and flag the corresponding console credentials accordingly. In one configuration, a game service provider may track the status of consoles based on reports submitted by the users of the consoles.
  • If console integrity is verified, as determined in steps 310 and 315, the console may subsequently establish a secure connection with a server of the financial institution associated with the financial account in step 320. In step 325, the gaming console and banking application may receive a request from the financial institution server for console specific credentials and/or user specific credentials such as an account identifier, a password, account number, gamer tag, gaming profile, a personal identification number (PIN) and the like. According to one configuration, a password may include characters or codes corresponding to input buttons such as a directional key on a game controller, movements of a joystick and/or a motion or series of motions (e.g., detected by a motion sensor), as is described in further detail below. This provides additional security by expanding the number of password or passcode permutations or possibilities. Additionally or alternatively, an account name or login name may be automatically determined based on a currently active gaming or user profile. For example, a login name may be automatically identified as the gamer tag associated with a particular user profile and thus, a user might not need to manually enter the user or account name.
  • In response to the request from the financial institution server, the gaming console may transmit the requested credentials to the financial institution server for validation and verification in step 330. If the credentials are validated and verified, the gaming console and banking application may subsequently receive authorization to access the financial account and conduct financial transactions from the financial institution server in step 335. Information sent to and from the gaming console may be encrypted or otherwise secured. Alternatively, if the credentials are not verified or validated, an access denial message may be received in step 340.
  • FIG. 4 illustrates a method for authorizing a user and console to access a financial account. In step 400, a financial institution may receive a request to access a financial account from a gaming console. The request may include one or more credentials for the console, the user, or both. If credentials are not included in the request, the financial institution may request the credentials. Regardless, the financial institution may obtain the one or more credentials in step 405 (e.g., by extraction from the request or requesting from the console/user). In step 410, the financial institution may determine whether the received console specific credentials are valid. The validation may be conducted in a variety of manners including verifying that the credentials match what is stored in an account information database. For example, user and/or console specific credentials may be collected and saved in association with a financial account during a registration process. If the console specific credentials are valid, the financial institution may optionally validate the user specific credentials in step 415. For example, if the user specific credentials include an account name and password, the name and password may be compared against what is stored in the account information database. If the user specific credentials are validated, the financial institution may then transmit an authorization to access the financial account to the gaming console in step 420. If, however, either the console specific credentials or the user specific credentials are not valid or cannot be verified, the financial institution may transmit a denial of access message to the console and user in step 425.
  • In one or more arrangements, the financial institution may further verify the integrity of the console by querying a remote gaming service provider with the one or more console specific credentials. The remote gaming service provider may be able to provide information regarding, the owner, whether the console has been stolen, whether the console is registered or not registered with the service provider and the like. If the console specific credentials have been marked as stolen or not registered, the financial institution may receive a response indicating such status information (e.g., indication that console integrity cannot be verified). Alternatively, if the console specific credentials are registered and/or does not indicate the console was stolen, the financial institution may receive an indication that the console integrity is verified.
  • FIG. 5 illustrates a network diagram showing one example of a flow of information between a financial institution 501, a gaming console 503 and a gaming service provider 505. In particular, a financial institution 501 may initially transmit an online banking application configured to interface with the financial institution to gaming console 503. When online banking services are requested, the gaming console 503 may transmit console and user specific credentials to a financial institution 501 along with a request to access an account and/or perform a transaction. Console integrity may be verified by either the gaming console 503 (i.e., through the banking application) or by the financial institution 501. In one example, console integrity may be verified by sending a query to gaming service provider 505. Once verified, the financial institution 501 may further validate the credentials to determine if access is authorized. If so, the financial institution 501 may respond with a grant of access; however, if not, a response may include a denial of service.
  • FIG. 5B illustrates an alternative network diagram showing another flow of information between a financial institution 551, a gaming console 553 and a gaming service provider 555. Instead of gaming console 553 and financial institution 551 communicating directly with one another, gaming console 553 and financial institution 551 may communicate through gaming service provider 555. In particular, communications may be piggybacked on an existing network architecture established between gaming console 553 and gaming service provider 555 (e.g., XBOX LIVE network). Accordingly, upon verifying the integrity of the gaming console 553, the gaming service provider 555 may forward console and/or user specific credentials to financial institution 551 for validation. Gaming service provider 555 may provide a secure transmission channel between gaming console 553 and financial institution 551 based on existing network protocols. Additionally, secure communications may be established between the financial institution 551 and the gaming service provider 555 without substantial risk of hacking or security circumvention that might exist by establishing direct communications with the gaming console 553.
  • FIG. 6 illustrates various types of passwords or credentials that may be used to verify a user. For example, controller 600 may include a series of directional buttons 603, color coded and letter coded buttons 605, a joystick 607 and one or more motion sensing components (not shown). As illustrated, a user may enter a password 609 including presses of the directional buttons 603 and color and letter coded buttons 605. The same or a different user, on the other hand, may enter a password 611 that is based solely on a motion such as a check mark entered using joystick 607 or movement of the controller 600. Alternatively or additionally, a combination of alphanumeric characters, buttons 603 and 605 and motions may be used, as shown in password 613. A duration of a button press may also be specified as part of a password.
  • FIG. 7 illustrates a login interface for online banking access. Interface 700 includes a menu bar 705 including multiple activity options such as ABC Bank Online option 705 a. Upon selection of option 705 a, interface 700 may include account and password entry fields 715 and 720, a get profile option 710 and a console integrity verification indicator 725. Console integrity verification indicator 725 provides users with a notification of whether the console was verified as valid. In some instances, indicator 725 may indicate that the console was stolen and/or was not verified. In such cases, a user might not be allowed to login to online banking (e.g., fields 715 and 720 may be deactivated or grayed out). Get profile option 710 allows a user to choose a gamer or banking profile. Profiles may be used to store account IDs, passwords, banking preferences and configurations and the like. Alternatively, a user may manually enter account ID and password information without selection of a profile.
  • FIG. 8 illustrates a profile selection interface for selecting an online banking profile. Profile selection interface 750 may be displayed in response to a user selecting a get profile option such as option 710 of FIG. 7. A profile selection menu 730 may be displayed with multiple selectable profiles 740. Each profile in menu 730 may provide information about that profile including a gamer tag or account ID and a rating. The rating may correspond to a number of games played, a proficiency of a user associated with the profile in one or more games, frequency with which a user uses one or more application (e.g., a particular game or the online banking application) and the like. Upon highlighting or selecting the desired profile, a user may select done 735 to finalize the choice and return to the login screen. Alternatively or additionally, upon selecting a desired profile, the user may be automatically logged in.
  • Any number of credentials may be used in accordance with the aspects described herein. Thus, credentials in addition to console specific and user specific credentials may further be required and validated before access is granted by a financial institution. For example, other credentials may include a code or password generated by a device that is configured to change or update the code or password at predefined times (e.g., every 30 seconds). Thus, a console may be required to submit user specific credentials, console specific credentials and a code or password generated by another device (i.e., other than the console).
  • Although not required, one of ordinary skill in the art will appreciate that various aspects described herein may be embodied as a method, a data processing system, or as one or more computer-readable media storing computer-executable instructions. Accordingly, those aspects may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. In addition, various signals representing data or events as described herein may be transferred between a source and a destination in the form of light and/or electromagnetic waves traveling through signal-conducting media such as metal wires, optical fibers, and/or wireless transmission media (e.g., air and/or space).
  • Aspects of the invention have been described in terms of illustrative embodiments thereof. Numerous other embodiments, modifications and variations within the scope and spirit of the appended claims will occur to persons of ordinary skill in the art from a review of this disclosure. For example, one of ordinary skill in the art will appreciate that the steps illustrated in the illustrative figures may be performed in other than the recited order, and that one or more steps illustrated may be optional in accordance with aspects of the disclosure.

Claims (20)

1. A method comprising:
establishing, by a special-purpose gaming console, a network connection to a remote financial institution;
transmitting an authorization request to access a financial account to the remote financial institution through the network connection, the request including one or more credentials specific to the gaming console; and
in response to the authorization request, receiving, from the remote financial institution, authorization to access the financial account through the gaming console, the authorization indicating that the one or more credentials specific to the gaming console was verified.
2. The method of claim 1, wherein the authorization request further includes one or more credentials specific to a user and wherein the authorization further indicates that the one or more credentials specific to the user was verified.
3. The method of claim 2, wherein the one or more user specific credentials are determined from a user profile.
4. The method of claim 1, wherein the one or more credentials specific to the gaming console is hardcoded into at least one hardware component of the gaming console.
5. The method of claim 4, further comprising verifying an integrity of the gaming console based on the one or more credentials specific to the gaming console.
6. The method of claim 5, wherein the integrity of the gaming console is verified by an online banking application running on the gaming console.
7. The method of claim 6, wherein verifying the integrity of the gaming console includes sending a verification request to a remote gaming service provider.
8. The method of claim 1, wherein the authorization request is transmitted to the financial institution through a remote gaming service provider.
9. A method comprising:
receiving, at a financial institution, a request to access a financial account of a user from a special-purpose gaming console, wherein the request includes one or more credentials specific to the gaming console;
verifying the one or more credentials specific to the gaming console; and
granting access to the financial account in response to verifying the one or more credentials specific to the gaming console are valid.
10. The method of claim 9, wherein the one or more credentials specific to the gaming console is hardcoded into at least one hardware component of the gaming console.
11. The method of claim 9, further comprising:
receiving one or more credentials specific to the user as part of the request; and
determining whether the user is authorized to access the financial account based on the one or more credentials specific to the user.
12. The method of claim 11, wherein the one or more credentials specific to the user includes a game account identifier.
13. The method of claim 11, wherein the one or more user specific credentials includes a passcode comprising input corresponding to depression of a directional key of a game controller.
14. The method of claim 9, wherein verifying the one or more credentials specific to the gaming console includes querying a remote server to verify an integrity of the gaming console based on the one or more credentials specific to the gaming console.
15. A method comprising:
receiving, at a special-purpose gaming console, a request to access a financial account;
verifying an integrity of the gaming console by querying a remote gaming server;
establishing a network connection with a remote financial institution associated with the financial account in response to verifying the integrity of the gaming console;
transmitting an authorization request to access the financial account to the remote financial institution through the network connection, the request including one or more credentials hardcoded in the gaming console; and
in response to the authorization request, receiving, from the remote financial institution, authorization to access the financial account through the gaming console, the authorization indicating that the one or more credentials hardcoded in the gaming console were verified.
16. The method of claim 15, wherein the one or more credentials hardcoded in the gaming console includes a console identifier unique to the gaming console.
17. The method of claim 15, wherein the authorization request further includes one or more user specific credentials and wherein the authorization to access the financial account further indicates that the one or more user specific credentials were verified.
18. The method of claim 17, wherein the one or more user specific credentials include a password comprising a motion.
19. The method of claim 15, wherein verifying the integrity of the gaming console includes receiving a confirmation from the remote gaming server that the gaming console has not been compromised.
20. The method of claim 15, wherein the network connection is established over a gaming network.
US12/140,579 2008-06-17 2008-06-17 Online Banking Through a Gaming Console Abandoned US20090312090A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US12/140,579 US20090312090A1 (en) 2008-06-17 2008-06-17 Online Banking Through a Gaming Console
GB0910527A GB2460955A (en) 2008-06-17 2009-06-17 Online banking through a gaming console
US14/687,182 US20150221172A1 (en) 2008-06-17 2015-04-15 Online Banking Through a Gaming Console

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/140,579 US20090312090A1 (en) 2008-06-17 2008-06-17 Online Banking Through a Gaming Console

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/687,182 Continuation US20150221172A1 (en) 2008-06-17 2015-04-15 Online Banking Through a Gaming Console

Publications (1)

Publication Number Publication Date
US20090312090A1 true US20090312090A1 (en) 2009-12-17

Family

ID=40941037

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/140,579 Abandoned US20090312090A1 (en) 2008-06-17 2008-06-17 Online Banking Through a Gaming Console
US14/687,182 Abandoned US20150221172A1 (en) 2008-06-17 2015-04-15 Online Banking Through a Gaming Console

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/687,182 Abandoned US20150221172A1 (en) 2008-06-17 2015-04-15 Online Banking Through a Gaming Console

Country Status (2)

Country Link
US (2) US20090312090A1 (en)
GB (1) GB2460955A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130151264A1 (en) * 2011-12-08 2013-06-13 Sap Ag Processing of Business Object Identifiers in Master Data Integration Scenarios Involving Non-Local Identifiers
US20150006339A1 (en) * 2013-07-01 2015-01-01 Bank Of America Corporation Application for payroll providers

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8364567B2 (en) * 2008-12-29 2013-01-29 Bank Of America Corporation Secure platforms for financial transaction applications

Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5835603A (en) * 1996-05-21 1998-11-10 Ncr Corporation Financial transaction system
US5866889A (en) * 1995-06-07 1999-02-02 Citibank, N.A. Integrated full service consumer banking system and system and method for opening an account
US5896125A (en) * 1995-11-06 1999-04-20 Niedzwiecki; Richard H. Configurable keyboard to personal computer video game controller adapter
US5903721A (en) * 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
US6154879A (en) * 1994-11-28 2000-11-28 Smarttouch, Inc. Tokenless biometric ATM access system
US6269348B1 (en) * 1994-11-28 2001-07-31 Veristar Corporation Tokenless biometric electronic debit and credit transactions
US20010034834A1 (en) * 2000-02-29 2001-10-25 Shinako Matsuyama Public-key-encryption data-communication system and data-communication-system forming method
US20020184500A1 (en) * 2001-05-29 2002-12-05 Michael Maritzen System and method for secure entry and authentication of consumer-centric information
US20050091164A1 (en) * 2003-10-24 2005-04-28 Thomas Bryan Varble Method and apparatus for the rental or sale, and secure distribution of digital content
US20070013515A1 (en) * 2005-07-15 2007-01-18 Microsoft Corporation Parental controls for a media console
US7174568B2 (en) * 2001-01-31 2007-02-06 Sony Computer Entertainment America Inc. Method and system for securely distributing computer software products
US7218739B2 (en) * 2001-03-09 2007-05-15 Microsoft Corporation Multiple user authentication for online console-based gaming
US20070113090A1 (en) * 2004-03-10 2007-05-17 Villela Agostinho De Arruda Access control system based on a hardware and software signature of a requesting device
WO2007096845A2 (en) * 2006-02-27 2007-08-30 It Crimes Cc Method and system for registering a device
US20080070703A1 (en) * 2006-09-08 2008-03-20 Campo James A Wireless electronic gaming unit
US20080108426A1 (en) * 2006-11-06 2008-05-08 Igt Remote wager gaming system using a video game console
US20080120195A1 (en) * 2006-11-21 2008-05-22 Shakkarwar Rajesh G Systems and methods for identification and authentication of a user
US20080133376A1 (en) * 2006-12-04 2008-06-05 Hill Evan M Systems and methods for single step purchasing of content
US20080171600A1 (en) * 2007-01-15 2008-07-17 Microsoft Corporation Automatic delivery of game content to a game console
US20080185429A1 (en) * 2007-02-05 2008-08-07 First Data Corporation Authentication Of PIN-Less Transactions
US20090144205A1 (en) * 2007-11-29 2009-06-04 Visa Usa, Inc. Serial number and payment data based payment card processing
US20100169659A1 (en) * 2008-12-29 2010-07-01 Bank Of America Corporation Gaming console-specific user authentication
US20100169202A1 (en) * 2008-12-29 2010-07-01 Bank Of America Corporation Secure platforms for financial transaction applications
US7844255B2 (en) * 2004-12-08 2010-11-30 Verifone, Inc. Secure PIN entry device for mobile phones
US7877543B2 (en) * 2004-12-03 2011-01-25 Hewlett-Packard Development Company, L.P. System and method for writing data and a time value to an addressable unit of a removable storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3413125B2 (en) * 1999-04-14 2003-06-03 株式会社ソニー・コンピュータエンタテインメント Entertainment system, data communication network system, entertainment device and portable information communication terminal
US20030159053A1 (en) * 2002-02-19 2003-08-21 Charles Fauble Secure reconfigurable input device with transaction card reader
US8469808B2 (en) * 2004-01-15 2013-06-25 Bgc Partners, Inc. System and method for managing a game controller device for electronic trading

Patent Citations (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6154879A (en) * 1994-11-28 2000-11-28 Smarttouch, Inc. Tokenless biometric ATM access system
US6269348B1 (en) * 1994-11-28 2001-07-31 Veristar Corporation Tokenless biometric electronic debit and credit transactions
US5866889A (en) * 1995-06-07 1999-02-02 Citibank, N.A. Integrated full service consumer banking system and system and method for opening an account
US5896125A (en) * 1995-11-06 1999-04-20 Niedzwiecki; Richard H. Configurable keyboard to personal computer video game controller adapter
US5835603A (en) * 1996-05-21 1998-11-10 Ncr Corporation Financial transaction system
US5903721A (en) * 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
US20010034834A1 (en) * 2000-02-29 2001-10-25 Shinako Matsuyama Public-key-encryption data-communication system and data-communication-system forming method
US7174568B2 (en) * 2001-01-31 2007-02-06 Sony Computer Entertainment America Inc. Method and system for securely distributing computer software products
US7512235B2 (en) * 2001-03-09 2009-03-31 Microsoft Corporation Multiple user authentication for online console-based gaming
US7765401B2 (en) * 2001-03-09 2010-07-27 Microsoft Corporation Multiple user authentication for online console-based gaming
US7218739B2 (en) * 2001-03-09 2007-05-15 Microsoft Corporation Multiple user authentication for online console-based gaming
US7818568B2 (en) * 2001-03-09 2010-10-19 Microsoft Corporation Multiple user authentication for online console-based gaming
US20020184500A1 (en) * 2001-05-29 2002-12-05 Michael Maritzen System and method for secure entry and authentication of consumer-centric information
US20050091164A1 (en) * 2003-10-24 2005-04-28 Thomas Bryan Varble Method and apparatus for the rental or sale, and secure distribution of digital content
US20070113090A1 (en) * 2004-03-10 2007-05-17 Villela Agostinho De Arruda Access control system based on a hardware and software signature of a requesting device
US7877543B2 (en) * 2004-12-03 2011-01-25 Hewlett-Packard Development Company, L.P. System and method for writing data and a time value to an addressable unit of a removable storage medium
US7844255B2 (en) * 2004-12-08 2010-11-30 Verifone, Inc. Secure PIN entry device for mobile phones
US20070013515A1 (en) * 2005-07-15 2007-01-18 Microsoft Corporation Parental controls for a media console
WO2007096845A2 (en) * 2006-02-27 2007-08-30 It Crimes Cc Method and system for registering a device
US20090094256A1 (en) * 2006-02-27 2009-04-09 It Crimes Cc Method and system for registering a device
US20080070703A1 (en) * 2006-09-08 2008-03-20 Campo James A Wireless electronic gaming unit
US20080108426A1 (en) * 2006-11-06 2008-05-08 Igt Remote wager gaming system using a video game console
US20080120195A1 (en) * 2006-11-21 2008-05-22 Shakkarwar Rajesh G Systems and methods for identification and authentication of a user
US20080133376A1 (en) * 2006-12-04 2008-06-05 Hill Evan M Systems and methods for single step purchasing of content
US20080171600A1 (en) * 2007-01-15 2008-07-17 Microsoft Corporation Automatic delivery of game content to a game console
US20080185429A1 (en) * 2007-02-05 2008-08-07 First Data Corporation Authentication Of PIN-Less Transactions
US20090144203A1 (en) * 2007-11-29 2009-06-04 Visa Usa, Inc. Serial number and payment data based payment card processing
US20090144202A1 (en) * 2007-11-29 2009-06-04 Visa Usa, Inc. Module id based encryption for financial transactions
US20090144204A1 (en) * 2007-11-29 2009-06-04 Visa Usa, Inc. Module id based targeted marketing
US20090144205A1 (en) * 2007-11-29 2009-06-04 Visa Usa, Inc. Serial number and payment data based payment card processing
US20100169659A1 (en) * 2008-12-29 2010-07-01 Bank Of America Corporation Gaming console-specific user authentication
US20100169202A1 (en) * 2008-12-29 2010-07-01 Bank Of America Corporation Secure platforms for financial transaction applications

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130151264A1 (en) * 2011-12-08 2013-06-13 Sap Ag Processing of Business Object Identifiers in Master Data Integration Scenarios Involving Non-Local Identifiers
US9852385B2 (en) * 2011-12-08 2017-12-26 Sap Se Processing of business object identifiers in master data integration scenarios involving non-local identifiers
US20150006339A1 (en) * 2013-07-01 2015-01-01 Bank Of America Corporation Application for payroll providers

Also Published As

Publication number Publication date
GB0910527D0 (en) 2009-07-29
GB2460955A (en) 2009-12-23
US20150221172A1 (en) 2015-08-06

Similar Documents

Publication Publication Date Title
US9021254B2 (en) Multi-platform user device malicious website protection system
US8701166B2 (en) Secure authentication
US9032498B1 (en) Method for changing authentication for a legacy access interface
US8646060B1 (en) Method for adaptive authentication using a mobile device
JP4755866B2 (en) Authentication system, authentication server, authentication method, and authentication program
CA2736582C (en) Authorization of server operations
KR101019458B1 (en) Extended one­time password method and apparatus
KR101569753B1 (en) System, Method and Apparatus for Secure Login
US9419956B2 (en) Systems and methods for authenticating a user for accessing account information using a web-enabled device
KR101851686B1 (en) Abstracted and randomized one-time passwords for transactional authentication
US20070130618A1 (en) Human-factors authentication
US9548975B2 (en) Authentication method, authentication system, and service delivery server
US20100175136A1 (en) System and method for security of sensitive information through a network connection
JP2007310512A (en) Communication system, service providing server, and user authentication server
US9660981B2 (en) Strong authentication method
JP4334515B2 (en) Service providing server, authentication server, and authentication system
CN110213195A (en) A kind of login authentication method, server and user terminal
US20150221172A1 (en) Online Banking Through a Gaming Console
CA2797353C (en) Secure authentication
KR102313868B1 (en) Cross authentication method and system using one time password
CN115037482A (en) Fraud detection method and device, electronic equipment and readable storage medium
CN112583816A (en) Login verification method and device, electronic equipment and storage medium
KR20100076238A (en) System and method for on line game service
KR20080113781A (en) Method for input process of authentication information comprised of text and voice, and authentication system using communication network
JP2014092891A (en) Authentication device, authentication method, and authentication program

Legal Events

Date Code Title Description
AS Assignment

Owner name: BANK OF AMERICA CORPORATION, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHNOWSKE, DANIEL P.;TREADWELL, WILLIAM SCOTT;REEL/FRAME:021106/0560

Effective date: 20080612

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION