A Method, Device and System for Secure Transactions
First Claim
1. A method for operating a security device comprising the steps of:
- receiving a request for a transaction from an application programmable device executing an application obtained from an application controlling institute, in which the transaction between the application and the application controlling institute has been initialized;
verifying a validity of the transaction;
alerting a user of receiving a valid request, in which the user indicates an acceptance of the request by signaling the security device;
generating a first one-time identifier, the first one-time identifier at least comprising a security device identification, a transaction number, a date and a time; and
communicating to the application programmable device the first one-time identifier, in which the application verifies a validity of the security device identification and, upon verification of the validity, instructs the application programmable device to communicate the first one-time identifier and transaction to the application controlling institute for processing, in which the application controlling institute verifies a validity of the first one-time identifier and, upon verification of the validity, processes the transaction, wherein said security device, application programmable device and application controlling institute securely processes the transaction.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for operating a security device comprises receiving a request for a transaction from a programmable device executing an application obtained from an application controlling institute, and verifying a validity of the transaction. A user is alerted, in which the user indicates an acceptance of the request. A one-time identifier is generated. The one-time identifier comprises a security device identification, a transaction number, a date and a time. The one-time identifier is communicated to the programmable device, in which the application verifies a validity of the security device identification and instructs the programmable device to communicate the one-time identifier and transaction to the application controlling institute for processing. The application controlling institute verifies validity of the one-time identifier and processes the transaction, wherein said security device, application programmable device and application controlling institute securely processes the transaction.
244 Citations
20 Claims
-
1. A method for operating a security device comprising the steps of:
-
receiving a request for a transaction from an application programmable device executing an application obtained from an application controlling institute, in which the transaction between the application and the application controlling institute has been initialized; verifying a validity of the transaction; alerting a user of receiving a valid request, in which the user indicates an acceptance of the request by signaling the security device; generating a first one-time identifier, the first one-time identifier at least comprising a security device identification, a transaction number, a date and a time; and communicating to the application programmable device the first one-time identifier, in which the application verifies a validity of the security device identification and, upon verification of the validity, instructs the application programmable device to communicate the first one-time identifier and transaction to the application controlling institute for processing, in which the application controlling institute verifies a validity of the first one-time identifier and, upon verification of the validity, processes the transaction, wherein said security device, application programmable device and application controlling institute securely processes the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A security device comprising:
-
a housing; means for communicating with an application programmable device executing an application obtained from an application controlling institute; a processing unit being configured to be operable for; verifying a validity of a request for a transaction from the application;
issuing an alert of receiving a valid request;acknowledging a user'"'"'s indication of an acceptance of the request; generating, upon the acknowledgment, a first one-time identifier, the first one-time identifier at least comprising a security device identification, a transaction number, a date and a time; and instructing said communicating means to communicate the first one-time identifier, in which the application verifies a validity of the security device identification and, upon verification of the validity, instructs the application programmable device to communicate the first one-time identifier and transaction to the application controlling institute for processing, in which the application controlling institute verifies a validity of the first one-time identifier and, upon verification of the validity, processes the transaction; an indicator being configured to be operable for receiving the alert from said processor unit to alert the user; and a sensor unit being configured to be operable for receiving the user'"'"'s indication of an acceptance and transmitting the indication to said processor unit, wherein said security device, application programmable device and application controlling institute securely processes the transaction. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a security device unit comprising; a housing; means for communicating wirelessly using technology to limit a separable distance for operation; a processing unit being configured to be operable for; verifying a validity of a request for a transaction; issuing an alert of receiving a valid request; acknowledging a user'"'"'s indication of an acceptance of the request; generating a first one-time identifier, upon the acknowledgment, the first one-time identifier at least comprising a security device identification, a transaction number, a date and a time; storing the request and transaction number to form an audit trail; incrementing the transaction number for each subsequent transaction; instructing said communicating means to communicate the first one-time identifier; verifying a validity of a second one-time identifier for a processed transaction; and instructing said communicating means to communicate an acceptance of the transaction upon the second one-time identifier being validated; an indicator being configured to be operable for receiving the alert from said processor unit to alert the user; and a sensor unit being configured to be operable for receiving the user'"'"'s indication of an acceptance and transmitting the indication to said processor unit; an application programmable device executing an application, said application programmable device being configured to be operable for; communicating with said communicating means; communicating the request for the transaction to said communicating means; receiving the first one-time identifier from said communicating means; verifying a validity of the security device identification; sending, the first one-time identifier and transaction for processing, upon verification of the validity; receiving a second one-time identifier indicating the transaction processed; and communicating the second on-time identifier to said security device; and an application controlling institute being configured to be operable for; communicating with said application programmable device; supplying the application to said application programmable device; receiving the first one-time identifier and transaction for processing; verifying a validity of the first one-time identifier; processing the transaction using the security device identification to determine account information, upon verification of the validity; generating the second one-time identifier; and sending the second one-time identifier to said application programmable device, wherein said security device, application programmable device and application controlling institute securely processes the transaction. - View Dependent Claims (20)
-
Specification