DYNAMICALLY REACTING POLICIES AND PROTECTIONS FOR SECURING MOBILE FINANCIAL TRANSACTIONS
First Claim
1. A method for securing mobile financial transactions, the method comprising:
- receiving a list of protection methods from an external terminal over a communication network;
creating a matrix of protection methods based on at least one of the protection methods, the matrix corresponding to the external terminal;
receiving security-related information from one or more trust mediator agents over the communication network;
retrieving, from a master list of rules, rules corresponding to the received security-related information;
selecting at least one protection method from the matrix of protection methods based on the rules obtained by the retrieving; and
transmitting the at least one selected protection method to the one or more trust mediator agents,wherein at least one of the above steps is performed by a processor.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure mobile financial transaction is provided by receiving a list of protection methods from an external terminal over a communication network. A matrix of protection methods corresponding to the external terminal is created based on the identified protection methods. Security-related information is received from one or more trust mediator agents over the communication network. Rules corresponding to the received security related information are retrieved, and at least one protection method is selected from the matrix of protection methods based on the retrieved rules. The selected protection method is transmitted to the trust mediator agents for implementation.
105 Citations
18 Claims
-
1. A method for securing mobile financial transactions, the method comprising:
-
receiving a list of protection methods from an external terminal over a communication network; creating a matrix of protection methods based on at least one of the protection methods, the matrix corresponding to the external terminal; receiving security-related information from one or more trust mediator agents over the communication network; retrieving, from a master list of rules, rules corresponding to the received security-related information; selecting at least one protection method from the matrix of protection methods based on the rules obtained by the retrieving; and transmitting the at least one selected protection method to the one or more trust mediator agents, wherein at least one of the above steps is performed by a processor. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for securing mobile financial transactions, the system comprising:
a trust mediator including a processor coupled to a memory, operable to; receive a list of protection methods from an external terminal over a communication network; create a matrix of protection methods based on at least one of the protection methods, the matrix corresponding to the external terminal; receive security-related information from one or more trust mediator agents over the communication network; retrieve, from a master list of rules stored in the memory, rules corresponding to the received security-related information; select at least one protection method from the matrix of protection methods based on the rules obtained by the retrieving; and transmit the at least one selected protection method to the one or more trust mediator agents. - View Dependent Claims (7, 8, 9, 10)
-
11. A computer-readable medium having stored thereon sequences of instructions, the sequences of instructions including instructions, which, when executed by a computer system, cause the computer system to perform:
-
receiving a list of protection methods from an external terminal over a communication network; creating a matrix of protection methods based on at least one of the protection methods, the matrix corresponding to the external terminal; receiving security-related information from one or more trust mediator agents over the communication network; retrieving, from a master list of rules, rules corresponding to the received security-related information; selecting at least one protection method from the matrix of protection methods based on the rules obtained by the retrieving; and transmitting the at least one selected protection method to the one or more trust mediator agents. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method for completing secure mobile financial transactions, the method comprising:
-
transmitting a list of protection methods available for an external terminal to a trust mediator over a communication network; transmitting security-related information to the trust mediator over the communication network, the security-related information including sensor data received from a plurality of sensors; and receiving, in response to the transmitting of the security-related information, at least one protection method from the trust mediator for implementation; and completing a financial transaction by using the external terminal and the at least one received protection method, wherein at least one of the above steps is performed by a processor.
-
-
17. A system for completing secure mobile financial transactions, the system comprising:
an external terminal including a processor coupled to a memory, operable to; transmit a list of protection methods available for an external terminal to a trust mediator over a communication network; transmit security-related information to the trust mediator over the communication network, the security-related information including sensor data received from a plurality of sensors; and receive, in response to the transmitting of the security-related information, at least one protection method from the trust mediator; and complete a financial transaction by using the external terminal and the at least one received protection method.
-
18. A computer-readable medium having stored thereon sequences of instructions, the sequences of instructions including instructions, which, when executed by a computer system, cause the computer system to perform:
-
transmitting a list of protection methods available for an external terminal to a trust mediator over a communication network; transmitting security-related information to the trust mediator over the communication network, the security-related information including sensor data received from a plurality of sensors; and receiving, in response to the transmitting of the security-related information, at least one protection method from the trust mediator; and completing a financial transaction by using the external terminal and the at least one received protection method.
-
Specification