TECHNIQUE FOR SECURELY COMMUNICATING INFORMATION
First Claim
1. A method for communicating information, comprising:
- receiving an encryption key through a first wireless communication technique, wherein the first wireless communication technique includes near field communication;
communicating a document through a second wireless communication technique, wherein the document is associated with a financial transaction being conducted with a commercial establishment; and
receiving encrypted information through the second wireless communication technique,wherein the encrypted information is, at least in part, encrypted using the encryption key; and
wherein the second wireless communication technique includes a technique other than near field communication.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that communicates information is described. During operation, this system receives an encryption key through a first wireless communication technique, wherein the first wireless communication technique includes near field communication. Then, the system communicates a document through a second wireless communication technique, where the document is associated with a financial transaction being conducted with a commercial establishment. Next, the system receives encrypted information through the second wireless communication technique, where the encrypted information is, at least in part, encrypted using the encryption key, and where the second wireless communication technique includes a technique other than near field communication.
-
Citations
26 Claims
-
1. A method for communicating information, comprising:
-
receiving an encryption key through a first wireless communication technique, wherein the first wireless communication technique includes near field communication; communicating a document through a second wireless communication technique, wherein the document is associated with a financial transaction being conducted with a commercial establishment; and receiving encrypted information through the second wireless communication technique, wherein the encrypted information is, at least in part, encrypted using the encryption key; and wherein the second wireless communication technique includes a technique other than near field communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer system, comprising:
-
a processor; memory; a program module, wherein the program module is stored in the memory and configurable to be executed by the processor, the program module including; instructions for receiving an encryption key through a first wireless communication technique, wherein the first wireless communication technique includes near field communication; instructions for communicating a document through a second wireless communication technique, wherein the document is associated with a financial transaction being conducted with a commercial establishment; and instructions for receiving encrypted information through the second wireless communication technique, wherein the encrypted information is, at least in part, encrypted using the encryption key; and wherein the second wireless communication technique includes a technique other than near field communication. - View Dependent Claims (24, 25)
-
-
23. A computer program product for use in conjunction with a computer system, the computer program product comprising a computer-readable storage medium and a computer-program mechanism embedded therein communicating information, the computer-program mechanism including:
-
instructions for receiving an encryption key through a first wireless communication technique, wherein the first wireless communication technique includes near field communication; instructions for communicating a document through a second wireless communication technique, wherein the document is associated with a financial transaction being conducted with a commercial establishment; and instructions for receiving encrypted information through the second wireless communication technique, wherein the encrypted information is, at least in part, encrypted using the encryption key; and wherein the second wireless communication technique includes a technique other than near field communication.
-
-
26. A wireless device, comprising:
-
a transceiver configured to communicate information; a processor; memory configured to store an encryption key and encrypted information; and a program module, wherein the program module is stored in the memory and configurable to be executed by the processor, the program module including; instructions for initiating a session by communicating the encryption key through a first wireless communication technique, wherein the first wireless communication technique includes near field communication; instructions for receiving a document through a second wireless communication technique, wherein the document is associated with a financial transaction that is to be conducted with a commercial establishment; instructions for requesting a token from a consumer conducting the financial transaction; instructions for receiving the token; and instructions for providing the encrypted information through the second wireless communication technique after the token is received, wherein the encrypted information is, at least in part, encrypted using the encryption key; and wherein the second wireless communication technique includes a technique other than near field communication.
-
Specification