Method and apparatus for performing a secure transaction in a trusted network
First Claim
1. A method of enabling respective users of first and second devices of a trusted network to perform a secure transaction between them, comprising:
- establishing a communications channel between the users;
communicating a verification identifier for the transaction between the users using the communications channel;
storing the verification identifier at the first device as a reference identifier for the transaction;
opening a secure connection between the two devices over the trusted network, the secure connection being different to the communications channel between the users;
sending the verification identifier from the second device to the first device over the secure connection;
comparing the verification identifier received over the secure connection with the reference identifier at the first device; and
performing the secure transaction over the secure connection in dependence upon the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided of enabling respective users (A, B) of first and second devices (12, 2) of a trusted network to perform a secure transaction between them. A communications channel, such as a telephone conversation, is established between the users (A, B). A verification identifier for the transaction is communicated between the users (A, B) using the communications channel (A6). The verification identifier is stored (A3) at the first device (12) as a reference identifier for the transaction. A secure connection is opened between the two devices (12, 2) over the trusted network (A10), the secure connection being different to the communications channel between the users (A, B). The verification identifier is sent (A11) from the second device (2) to the first device (12) over the secure connection. The verification identifier received over the secure connection is compared (A12) with the reference identifier at the first device (12). The secure transaction is performed over the secure connection (A15) in dependence upon the comparison.
83 Citations
43 Claims
-
1. A method of enabling respective users of first and second devices of a trusted network to perform a secure transaction between them, comprising:
-
establishing a communications channel between the users;
communicating a verification identifier for the transaction between the users using the communications channel;
storing the verification identifier at the first device as a reference identifier for the transaction;
opening a secure connection between the two devices over the trusted network, the secure connection being different to the communications channel between the users;
sending the verification identifier from the second device to the first device over the secure connection;
comparing the verification identifier received over the secure connection with the reference identifier at the first device; and
performing the secure transaction over the secure connection in dependence upon the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for use by a first device of a trusted network for enabling a user of the first device to perform a secure transaction with a user of a second device of the trusted network, comprising:
-
indicating a verification identifier for the transaction to the user of the first device for communication to the user of the second device using a communications channel established between the users, or inputting a verification identifier for the transaction communicated to the user of the first device from the user of the second device using a communications channel established between the users;
storing the verification identifier as a reference identifier for the transaction;
opening a secure connection between the two devices over the trusted network, the secure connection being different to the communications channel between the users;
receiving the verification identifier from the second device over the secure connection;
comparing the verification identifier received over the secure connection with the reference identifier; and
performing the secure transaction over the secure connection in dependence upon the comparison. - View Dependent Claims (40, 41)
-
-
32. A method for use by a second device of a trusted network for enabling a user of the second device to perform a secure transaction with a user of a first device of the trusted network, comprising:
-
indicating a verification identifier for the transaction to the user of the second device for communication to the user of the first device using a communications channel established between the users, or inputting a verification identifier for the transaction communicated to the user of the second device from the user of the first device using a communications channel established between the users, the verification identifier being stored at the first device as a reference identifier for the transaction;
opening a secure connection between the two devices over the trusted network, the secure connection being different to the communications channel between the users;
sending the verification identifier to the first device over the secure connection for use by the first device in comparing with the reference identifier; and
performing the secure transaction over the secure connection in dependence upon the comparison. - View Dependent Claims (42, 43)
-
-
33. A system for enabling respective users of first and second devices of a trusted network to perform a secure transaction between them, comprising:
-
means for establishing a communications channel between the users;
means for communicating a verification identifier for the transaction between the users using the communications channel;
means for storing the verification identifier at the first device as a reference identifier for the transaction;
means for opening a secure connection between the two devices over the trusted network, the secure connection being different to the communications channel between the users;
means for sending the verification identifier from the second device to the first device over the secure connection;
means for comparing the verification identifier received over the secure connection with the reference identifier at the first device; and
means for performing the secure transaction over the secure connection in dependence upon the comparison.
-
-
34. A device for use in a trusted network for enabling a user of the device to perform a secure transaction with a user of another device of the trusted network, comprising:
-
means for indicating a verification identifier for the transaction to the user of the device for communication to the user of the other device using a communications channel established between the users, or inputting a verification identifier for the transaction communicated to the user of the device from the user of the other device using a communications channel established between the users;
means for storing the verification identifier as a reference identifier for the transaction;
means for opening a secure connection between the two devices over the trusted network, the secure connection being different to the communications channel between the users;
means for receiving the verification identifier from the other device over the secure connection;
means for comparing the verification identifier received over the secure connection with the reference identifier; and
means for performing the secure transaction over the secure connection in dependence upon the comparison. - View Dependent Claims (36, 37)
-
-
35. A device for use in a trusted network for enabling a user of the device to perform a secure transaction with a user of another device of the trusted network, comprising:
-
means for indicating a verification identifier for the transaction to the user of the device for communication to the user of the other device using a communications channel established between the users, or inputting a verification identifier for the transaction communicated to the user of the device from the user of the other device using a communications channel established between the users, the verification identifier being stored at the other device as a reference identifier for the transaction;
means for opening a secure connection between the two devices over the trusted network, the secure connection being different to the communications channel between the users;
means for sending the verification identifier to the other device over the secure connection for use by the other device in comparing with the reference identifier; and
means for performing the secure transaction over the secure connection in dependence upon the comparison. - View Dependent Claims (38, 39)
-
Specification