Method and systems for securely exchanging data in an electronic transaction
First Claim
Patent Images
1. A method of ensuring secure data exchange, comprising:
- transmitting, via a communication interface, one or more public key certificates from a user device to a point of transaction terminal;
performing one or more first encryption algorithms using the one or more public key certificates and one or more keys to produce an encrypted data block at the point of transaction terminal;
transmitting, via the communication interface, the encrypted data block from the point of transaction terminal to the user device;
performing a first decryption algorithm on the encrypted data block using a device private key to decrypt a random session key on the user device;
performing a second encryption algorithm using transaction data and the random session key to produce encrypted transaction data on the user device;
transmitting, via the communication interface, the encrypted transaction data from the user device to the point of transaction terminal; and
performing a second decryption algorithm on the encrypted transaction data to decrypt the transaction data at the point of transaction terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems of encrypting and authenticating transaction data via the use of encryption and authentication algorithms are disclosed. Encryption and decryption algorithms are stored within a computer-readable storage medium and executed by a processor on a user device. These algorithms are used when a transaction is initiated by the user device with a point of transaction terminal across a communication interface to establish a secure connection for the transmission of data. Data relating to the transaction is then sent across the communication interface through the secure connection.
62 Citations
18 Claims
-
1. A method of ensuring secure data exchange, comprising:
-
transmitting, via a communication interface, one or more public key certificates from a user device to a point of transaction terminal;
performing one or more first encryption algorithms using the one or more public key certificates and one or more keys to produce an encrypted data block at the point of transaction terminal;
transmitting, via the communication interface, the encrypted data block from the point of transaction terminal to the user device;
performing a first decryption algorithm on the encrypted data block using a device private key to decrypt a random session key on the user device;
performing a second encryption algorithm using transaction data and the random session key to produce encrypted transaction data on the user device;
transmitting, via the communication interface, the encrypted transaction data from the user device to the point of transaction terminal; and
performing a second decryption algorithm on the encrypted transaction data to decrypt the transaction data at the point of transaction terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A user device for ensuring secure data exchange, comprising:
-
a processor;
a communication interface operably connected to the processor; and
a computer-readable storage medium operably connected to the processor, wherein the computer-readable storage medium contains one or more programming instructions for performing a method for ensuring secure data exchange, the method comprising;
transmitting, via the communication interface, one or more public key certificates, receiving, via the communication interface, an encrypted data block, performing a decryption algorithm on the encrypted data block using a device private key to decrypt a random session key, performing an encryption algorithm using transaction data and the random session key to produce encrypted transaction data, and transmitting, via the communication interface, the encrypted transaction data. - View Dependent Claims (10, 11, 12)
-
-
13. A point of transaction terminal for ensuring secure data exchange, comprising:
-
a processor;
a communication interface operably connected to the processor; and
a computer-readable storage medium operably connected to the processor, wherein the computer-readable storage medium contains one or more programming instructions for performing a method for ensuring secure data exchange, the method comprising;
receiving, via the communication interface, one or more public key certificates, performing one or more encryption algorithms using the one or more public key certificates and one or more keys to produce an encrypted data block, transmitting, via the communication interface, the encrypted data block, receiving, via the communication interface, encrypted transaction data from, and performing a decryption algorithm on the encrypted transaction data to decrypt the transaction data. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system for securing data exchange, comprising:
-
a user device, wherein the user device comprises;
a device processor, a device communication interface operably connected to the device processor, and a device computer-readable storage medium operably connected to the device processor, wherein the device computer-readable storage medium contains one or more programming instructions for performing a method of securing data exchange, the method comprising;
transmitting, via the device communication interface, one or more public key certificates, receiving, via the device communication interface, an encrypted data block, performing a decryption algorithm on the encrypted data block using a device private key to decrypt a random session key, performing an encryption algorithm using transaction data and the random session key to produce encrypted transaction data, and transmitting, via the device communication interface, the encrypted transaction data; and
a point of transaction terminal, wherein the point of transaction terminal comprises;
a terminal processor, a terminal communication interface operably connected to the terminal processor and the device communication interface, and a terminal computer-readable storage medium operably connected to the terminal processor, wherein the terminal computer-readable storage medium contains one or more programming instructions for performing a method for ensuring secure data exchange, the method comprising;
receiving, via the terminal communication interface, one or more public key certificates, performing one or more encryption algorithms using the one or more public key certificates and one or more keys to produce an encrypted data block, transmitting, via the terminal communication interface, the encrypted data block, receiving, via the terminal communication interface, encrypted transaction data from, and performing a decryption algorithm on the encrypted transaction data to decrypt the transaction data.
-
Specification