Secure transactions using cryptographic processes
First Claim
Patent Images
1. A method comprising:
- obtaining data from a device for use as an input to a first cryptographic process;
creating an output of the first cryptographic process wherein the output is valid for a limited period of time; and
writing the output from the first cryptographic process to a storage location after the device is received by a user.
1 Assignment
0 Petitions
Accused Products
Abstract
Data is obtained from a device for use as an input to a first cryptographic process. An output of the first cryptographic process is created and the output is written to a storage location after the device is received by a user. The output is valid for a limited period of time.
-
Citations
57 Claims
-
1. A method comprising:
-
obtaining data from a device for use as an input to a first cryptographic process;
creating an output of the first cryptographic process wherein the output is valid for a limited period of time; and
writing the output from the first cryptographic process to a storage location after the device is received by a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 28, 29, 30, 31, 32, 33, 34, 35, 36, 38, 39, 40, 41, 42, 43, 44, 45, 46, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57)
-
-
14. A computer readable medium containing executable computer program instructions, which when executed by a data processing system, cause the data processing system to perform a method comprising:
-
obtaining data from a device for use as an input to a first cryptographic process;
creating an output of the first cryptographic process wherein the output is valid for a limited period of time; and
writing the output from the first cryptographic process to a storage location after the device is received by a user.
-
-
27. An apparatus comprising:
-
security logic used to perform a first cryptographic process wherein an input to the first cryptographic process results in an output of the first cryptographic process wherein the output is valid for a limited period of time; and
a device communicatively coupled with the security logic and configured to write the output of the first cryptographic process to a storage location after the device is received by a user.
-
-
37. An apparatus comprising:
a transaction terminal configured to communicate with a device wherein an output of a first cryptographic process is written from the device to the transaction terminal and the first cryptographic process and a second cryptographic process are used to validate a transaction.
-
47. An apparatus comprising:
a transaction terminal configured to communicate with a personal transaction card wherein an output of a first cryptographic process is written from the personal transaction card to the transaction terminal and the first cryptographic process and a second cryptographic process are used to validate a transaction.
Specification