Secure electronic commerce using mutating identifiers
First Claim
Patent Images
1. A method of performing electronic commerce using mutating identifiers.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for performing electronic commerce using mutating identifiers. One method can include encrypting buyer transaction data with a first mutating identifier, transmitting the buyer transaction data to an authenticator device, decrypting the buyer transaction data, generating a payment request, encrypting the payment request with a third mutating identifier, and transmitting the payment request to a payment authenticator device.
163 Citations
78 Claims
- 1. A method of performing electronic commerce using mutating identifiers.
-
19. A method for establishing communication between a first device and a second device, the method comprising:
-
generating a request for a transaction key;
encrypting the request for a transaction key with a first mutating identifier of the first device;
transmitting the encrypted request for a transaction key to an authenticator device;
generating a transaction key;
generating a first message including the transaction key; and
encrypting the first message with the first mutating identifier of the first device. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of performing electronic commerce using mutating identifiers, the method comprising:
-
encrypting buyer transaction data with a first mutating identifier;
transmitting the buyer transaction data to an authenticator device;
encrypting buyer credentials with a first transaction key;
transmitting the buyer credentials to a payment authenticator device;
encrypting vendor transaction data with a second mutating identifier;
transmitting the vendor transaction data to an authenticator device;
encrypting vendor credentials with a second transaction key;
transmitting the vendor credentials to a payment authenticator device;
decrypting the buyer transaction data;
decrypting the vendor transaction data;
generating a payment request for a payment authenticator device;
encrypting the payment request with a third mutating identifier;
transmitting the payment request to the payment authenticator device;
decrypting the payment request;
decrypting the buyer credentials;
decrypting the vendor credentials;
generating a first response based on the buyer credentials, the vendor credentials, and the payment request;
generating a second response based on the buyer credentials, the vendor credentials, and the payment request;
transmitting the first response to a buyer device; and
transmitting the second response to a vendor device. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. An electronic commerce system comprising:
-
a vendor device;
a buyer device configured to encrypt buyer transaction data with a first mutating identifier and to transmit the buyer transaction data to an authenticator device; and
a payment authenticator device configured to approve or decline a payment request, to generate a first response for the buyer device, to generate a second response for the vendor device, to transmit the first response to the buyer device, and to transmit the second response to the vendor device;
whereinthe authenticator device is configured to decrypt the buyer transaction data, to generate a payment request for the payment authenticator device, to encrypt the payment request with a third mutating identifier of the payment authenticator device, and to transmit the payment request to the payment authenticator device. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69)
-
-
70. A method of performing electronic commerce using mutating identifiers, the method comprising:
-
encrypting transaction data with a first mutating identifier;
transmitting the transaction data to an authenticator device; and
receiving a response from a payment authenticator device.
-
-
71. A method of performing electronic commerce using mutating identifiers, the method comprising:
-
obtaining a payment request from an authenticator device including transaction data, the payment request encrypted with a first mutating identifier;
decrypting the payment request;
verifying the transaction data; and
transmitting a response.
-
-
72. A method of performing electronic commerce using mutating identifiers, the method comprising:
-
obtaining transaction data encrypting with a first mutating identifier;
decrypting the transaction data;
generating a payment request including at least a portion of the transaction data; and
transmitting the payment request to a payment authenticator device.
-
-
73. A method of establishing communication between a first device and a second device, the method comprising:
-
generating a request for a transaction key;
encrypting the request for a transaction key with a first mutating identifier of the first device;
transmitting the encrypted request for a transaction key to an authenticator device; and
receiving a message including a transaction key encrypting with the first mutating identifier.
-
-
74. A method of establishing communication between a first device and a second device, the method comprising:
-
obtaining a request for a transaction key from the first device, the request for a transaction key encrypted in a first mutating identifier;
decrypting the request for a transaction key;
generating a first message including the transaction key;
encrypting the first message with the first mutating identifier of the first device; and
transmitting the first message to the first device.
-
-
75. A method of conducting electronic commerce, the method comprising:
-
encrypting buyer transaction data with a first buyer key;
transmitting the buyer transaction data to an authenticator device;
encrypting buyer credentials with a first transaction key; and
transmitting the buyer credentials to a payment authenticator device. - View Dependent Claims (76, 77, 78)
-
Specification