×

Encapsulated security tokens for electronic transactions

  • US 10,410,213 B2
  • Filed: 05/06/2013
  • Issued: 09/10/2019
  • Est. Priority Date: 05/04/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for use in securing functional data for use in electronic transactions, comprising:

  • 1) constructing a security token that incorporates a first set of first transaction elements that are required for an electronic transaction, said constructing a security token comprising;

    a) operating a first processing system to generate a first data object including at least a first subset of said first set of first transaction elements;

    b) transmitting the first data object, directly or indirectly, from said first processing system to a second processing system;

    c) first operating the second processing system to generate an at least once-encapsulated data object by encapsulating at least the first data object using a first digital signature system including a first digital signature of a first party, for encapsulating the first data object and a first signature verification for verifying the first signature and de-encapsulating the first data object;

    d) transmitting the at least once-encapsulated data object to a third processing system; and

    e) second operating the third processing system to generate an at least twice-encapsulated data object by adding at least a second subset of said first transaction elements, different than said first subset, to said once-encapsulated data object and encapsulating at least the at least once-encapsulated data object and said second subset of said first transaction elements using a second digital signature system including a second digital signature of a second party, for encapsulating the at least once-encapsulated data object and a second signature verification for verifying the second signature and de-encapsulating the at least once-encapsulated data object;

    wherein said security token comprises said at least twice-encapsulated data object;

    2) transmitting said security token to a transaction processing system; and

    3) transmitting, to said transaction processing system, signature information sufficient to allow said transaction processing system to use said second signature system to de-encapsulate said at least twice-encapsulated data object so as to obtain said second subset of said first transaction elements and to use said first signature system to de-encapsulate said at least once-encapsulated data object to obtain said first subset of said first transaction elements and to compare said first financial transaction elements of said security token with second financial transaction elements of a transaction request to verify said transaction request.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×