×

Encapsulated security tokens for electronic transactions

  • US 10,423,952 B2
  • Filed: 09/06/2013
  • Issued: 09/24/2019
  • Est. Priority Date: 05/06/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for use in executing a digital transaction using one or more processors, comprising:

  • 1) first receiving, at a transaction processing system, a security token that incorporates a first set of first transaction elements that are required for an electronic transaction, said security token comprising;

    a) a first data object including at least a first subset of said first set of first transaction elements;

    b) an at least once-encapsulated data object encapsulating at least the first data object using a first digital signature system including a first digital signature of a first party for encapsulating the first data object and a first signature verification for verifying the first signature and de-encapsulating the first data object; and

    c) an at least twice-encapsulated data object including at least a second subset of said first transaction elements, different than said first subset, and encapsulating at least the at least once-encapsulated data object and said second subset of said first transaction elements using a second digital signature system including a second digital signature of a second party for encapsulating the at least once-encapsulated data object and said second subset of said first transaction elements, and a second signature verification for verifying the second signature and de-encapsulating the at least once-encapsulated data object and said second subset of said first transaction elements;

    2) second receiving, at said transaction processing system, a transaction request for said electronic transaction, said request comprising a second set of second transaction elements;

    3) first operating said transaction processing system to use said second signature system to de-encapsulate said at least twice-encapsulated data object so as to obtain said second subset of said first transaction elements;

    4) second operating said transaction processing system to use said first signature system to de-encapsulate said at least once-encapsulated data object to obtain said first subset of said first transaction elements; and

    5) comparing, at said transaction processing system, said first financial transaction elements of said security token with said second financial transaction elements of said transaction request to verify said transaction request.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×