DECENTRALIZED SECURE TRANSACTION SYSTEM
First Claim
Patent Images
1. A secure transaction system comprising:
- a terminal;
a secure access module coupled to the terminal, wherein the secure access module includes a first set of business rules for performing a transaction; and
a secure embedded device coupled to the terminal during the transaction, wherein the embedded device includes a second set of business rules for performing the transaction;
wherein the terminal routes messages between the secure access module and the secure embedded device.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure transaction system in accordance with one exemplary embodiment comprising a terminal; a secure access module coupled to the terminal; and a secure embedded device coupled to the secure access module during a transaction; wherein the business logic for controlling flow of the transaction is contained within the secure access module and the secure embedded device.
130 Citations
15 Claims
-
1. A secure transaction system comprising:
-
a terminal;
a secure access module coupled to the terminal, wherein the secure access module includes a first set of business rules for performing a transaction; and
a secure embedded device coupled to the terminal during the transaction, wherein the embedded device includes a second set of business rules for performing the transaction;
wherein the terminal routes messages between the secure access module and the secure embedded device.
-
-
2. A secure transaction system comprising:
-
a terminal;
a secure access module coupled to the terminal; and
an secure embedded device coupled to the secure access module during a transaction;
wherein the business logic for controlling flow of the transaction is contained on the secure access module and the secure embedded device.
-
-
3. A method of performing a secure transaction comprising:
-
detecting a secure embedded device that has been coupled to a terminal;
sending an operate command from the terminal to a secure access module;
executing, at the secure access module, a first set of business rules and generating a first message for the secure embedded device, wherein the first message is at least partially encrypted;
sending the first message to the secure embedded device;
executing, at the secure embedded device, a second set of business rules in response to receiving the first message and generating a second message for the secure access module, wherein the second message is at least partially encrypted; and
sending a command from the secure access module to the terminal indicating to the terminal to perform an intended function. - View Dependent Claims (4)
-
-
5. A method of updating a secure embedded device in a transaction system comprising:
-
coupling a secure access module to a terminal;
coupling a secure embedded device to the terminal; and
receiving a message from the secure access module at the secure embedded device; and
updating at least one business rule of the secure embedded device in response to receiving the message. - View Dependent Claims (6)
-
-
7. A method of updating a secure access module in a transaction system comprising:
-
coupling the secure access module to a terminal;
coupling a back end to the terminal; and
receiving a message from the back end at the secure access module; and
updating at least one business rule of the secure access module in response to receiving the message. - View Dependent Claims (8)
-
-
9. A method of updating a device in a transaction system comprising:
-
coupling a secure access module to a terminal;
coupling a secure embedded device to the terminal;
receiving a message from the secure embedded device; and
updating at least one business rule of the secure access module in response to receiving the message. - View Dependent Claims (10)
-
-
11. A method of updating a device in a transaction system comprising:
-
coupling a secure access module to a terminal;
coupling a secure embedded device to the terminal;
receiving a message from the secure access module; and
updating at least one business rule of the secure embedded device in response to receiving the message. - View Dependent Claims (12)
-
-
13. A method of updating a device in a transaction system comprising:
-
coupling a secure access module to a terminal;
coupling a secure embedded device to the terminal;
coupling a back end to the terminal; and
receiving a message from the back end at the secure embedded device; and
updating at least one business rule of the secure embedded device in response to receiving the message. - View Dependent Claims (14)
-
-
15. A method of communication comprising:
-
creating a data structure in a first application layer, the data structure indicating to a first transport layer a list of addresses that correspond to data stored in a first device and an indication of whether the data located at the list of addresses will be sent to a second transport layer in encrypted or unencrypted form;
sending the data in the list of addresses from the first transport layer to the second transport layer in unencrypted or encrypted form as indicated in the data structure;
storing the data sent from the first transport layer in memory of a second device; and
decrypting the data in a second application layer.
-
Specification