Method of providing assured transactions using secure transaction appliance and watermark verification
First Claim
1. A method comprising:
- receiving at a secure transaction device electronic content and a tag relating to a known portion of the electronic content;
associating with the tag first electronic data for use in verifying the known portion of the electronic content;
establishing a first communication path between the secure transaction device and a security module;
establishing a second communication path between the secure transaction device and a second other system; and
initiating an authorization process for being performed at least in conjunction with the security module.
3 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a method of improving electronic security by establishing a path between a user and a secure transaction appliance. The secure transaction appliance receiving information destined for the user which includes a tagged portion, said tagged portion triggering the secure transaction appliance to forward the information to the computer from which the request was issued, and to seeking an electronic signature to verify the content or transaction by transmitting a watermark, tagged portion of the content, or similar electronic content. The secure trusted path providing the user with the tagged portion incorporating additional elements such as a watermark, or in some embodiments only the additional elements, upon a personalized security device associated with the user making interception or manipulation more complex and difficult.
-
Citations
26 Claims
-
1. A method comprising:
-
receiving at a secure transaction device electronic content and a tag relating to a known portion of the electronic content; associating with the tag first electronic data for use in verifying the known portion of the electronic content; establishing a first communication path between the secure transaction device and a security module; establishing a second communication path between the secure transaction device and a second other system; and initiating an authorization process for being performed at least in conjunction with the security module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
providing a transactor in communication with a network and comprising a memory for storing information relating to a transaction; providing a user system associated with a user, the user system having at least a primary computer and a security module, the primary computer in communication with the network and providing the user with a process for allowing the user to view the transaction; providing a secure transaction device, the secure transaction device disposed within a first communication path between the transactor and the primary computer of the user; establishing a trusted path between the secure transaction device and the security module, establishing a first transaction between the transactor and the user comprising providing a request having a tag associated therewith from the transactor to the user for a digital signature via the secure transaction device and the first communication path relating to the first transaction; receiving the request at the secure transaction device and associating first electronic data with the request and the tag; providing the request to the user system for display on the primary computer via a first communications path; and providing via the trusted path the first electronic data to the user system for display on the security module. - View Dependent Claims (15, 16)
-
-
17. A method comprising:
-
providing a memory device having a processor therein and a display; providing a first communication path between a server and a user system associated with a user, the first communication path including a secure transaction device disposed between the server and the user system; providing a trusted path between the secure transaction device and the memory device via a second communication path; providing to the memory device from the secure transaction device at least one of a watermark and a first predetermined portion of a first document, the watermark associated with a tag provided by the server and referencing a second predetermined portion of the first document; and providing to the user system the first document for display and for at least one of verification and authorization thereof. - View Dependent Claims (18)
-
-
19. A method comprising:
-
receiving from a transactor at a secure transaction device electronic content and a tag associated with a known portion of the electronic content, the electronic content for transmission to a user system associated with a user; modifying at least the known portion of the electronic content by the addition of first electronic data determined in dependence upon at least one of the transactor, the user, the tag, and the electronic content; associating with the tag second electronic data, the second electronic data providing the user an association with the first electronic data; and storing within a memory of the secure transaction device the modified electronic content and second electronic data. - View Dependent Claims (20)
-
-
21. A secure transaction device comprising:
-
a first input port for receiving electronic content from a transactor for transmission to a user system associated with a user, the electronic content received via a first communication path and intended for display by the user system; a first output port for transmitting via a second communication path at least one of a verification and an authentication of the electronic content to the transactor from the user; a plurality of processors electrically connected to the first input port and the first output port, the plurality of processors for identifying at least a predetermined portion of the electronic content, modifying the predetermined portion of the electronic content by the addition of first electronic data, associating with the first electronic data second electronic data, transmitting the first and second electronic data, receiving at least one of a verification and authentification of the electronic content from the user, and transmitting the at least one of a verification and authentification of the electronic content to the transactor;
the first and second electronic data determined in dependence upon at least one of the user and the electronic content;a second output port supporting a third communication path for transmission of at least the modified electronic data to the user; a third output port supporting a fourth communication path for transmission of at least the second electronic data to the user; and a second input port for receiving at least one of a verification and authentification of the electronic content from the user. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification