Method of conducting transactions
First Claim
1. A method of conducting a transaction via a self service terminal (SST), the method comprising the steps of:
- encrypting transaction data stored in a first device, the data including security identification information;
transferring the encrypted data to a device of a third party;
allowing the third party to transfer the encrypted data to an SST; and
allowing the SST to decrypt the data, verify the security identification information, and execute the transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided of authorizing third parties to conduct financial transactions via an ATM (12). A user (16) firstly encrypts details of a transaction to be performed on a personal digital assistant (PDA) or similar device, and then transfers the encrypted data to a third party device (18). The third party lacks the decryption key, and is unable to access the transaction details or details of the user'"'"'s account. The third party then accesses an ATM (12) and transfers the encrypted data to the ATM. The ATM operator (14) is able to decrypt the data, and performs the transaction. The transaction may include data limiting its performance to specific time periods, location, or repetitions.
-
Citations
13 Claims
-
1. A method of conducting a transaction via a self service terminal (SST), the method comprising the steps of:
-
encrypting transaction data stored in a first device, the data including security identification information;
transferring the encrypted data to a device of a third party;
allowing the third party to transfer the encrypted data to an SST; and
allowing the SST to decrypt the data, verify the security identification information, and execute the transaction. - View Dependent Claims (2, 3)
-
-
4. A method of conducting a transaction via a self service terminal (SST), the method comprising the steps of:
-
receiving on a device encrypted transaction data from a device of a third party, the data including security identification information;
transferring the encrypted data from the receiving device to an SST; and
allowing the SST to decrypt the data, verify the security identification information, and execute the transaction.
-
-
5. A method of operating a financial service, the method comprising the steps of:
-
providing a user with an encryption key and an identification token for use with a user device;
providing a self service terminal (SST) with a corresponding decryption key;
accepting encrypted transaction data including the identification token from a device of a third party;
decrypting the transaction data;
verifying the decrypted identification token; and
executing the requested transaction.
-
-
6. A method of using a financial service, the method comprising the steps of:
-
encrypting using a device transaction data and an identification token with an encryption key; and
presenting the encrypted data to a financial service operator via a device of a third party.
-
-
7. A method of purchasing goods or services, the method comprising the steps of:
-
encrypting transaction data stored in a first device, the data including security identification information;
transferring the encrypted data to a device of a third party;
allowing the third party to transfer the encrypted data to a merchant or service provider; and
allowing the merchant or service provider to decrypt the data, verify the security identification information, and execute the transaction.
-
-
8. A method of operating a self-service terminal to allow a user to carry out a desired transaction through a third party, the method comprising the steps of:
-
receiving encrypted transaction data including security identification information from the third party;
decrypting the encrypted transaction data from the third party;
verifying the security identification information received from the third party; and
executing the desired transaction of the user based upon the decrypted transaction data and the verified security identification information received from the third party. - View Dependent Claims (9)
-
-
10. A method of operating an automated teller machine (ATM) to allow an ATM customer to carry out a desired financial transaction through a device operated by a third party, the method comprising the steps of:
-
receiving encrypted transaction data including security identification information from the third party device which has received the encrypted transaction data from a device operated by the ATM customer;
decrypting the encrypted transaction data including security identification information received from the third party device;
verifying the security identification information received from the third party device; and
executing the desired financial transaction of the ATM customer based upon the decrypted transaction data and the verified security identification information received from the third party device. - View Dependent Claims (11, 13)
-
-
12. A method of operating a retail facility to allow a retail customer to carry out a desired retail transaction through a device operated by a third party, the method comprising the steps of:
-
receiving encrypted transaction data including security identification information from the third party device which has received the encrypted transaction data from a device operated by the retail customer;
decrypting the encrypted transaction data including security identification information received from the third party device;
verifying the security identification information received from the third party device; and
executing the desired retail transaction of the retail customer based upon the decrypted transaction data and the verified security identification information received from the third party device.
-
Specification