METHODS FOR SECURE TRANSMISSION OF SENSITIVE DATA AND DEVICES THEREOF
First Claim
Patent Images
1. A method for managing sensitive data comprising:
- receiving by a transaction management device data encrypted using a public asymmetric key and a symmetric key from a mobile computing device, wherein the public asymmetric key and the symmetric key is shared between the transaction management device and the mobile computing device prior to receiving the data;
decrypting by the transaction management device the received data using the received symmetric key and an asymmetric private key, wherein the asymmetric private key is generated by the transaction management device prior to receiving the data; and
performing by the transaction management device one or more actions on the decrypted data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, non-transitory computer readable medium and transaction management device comprising receiving data encrypted using a public asymmetric key and a symmetric key from a mobile computing device, wherein the public asymmetric key and the symmetric key is shared between the transaction management device and the mobile computing device prior to receiving the data. The received data is decrypted using the received symmetric key and an asymmetric private key, wherein the asymmetric private key is generated by the transaction management device prior to receiving the data. One or more actions are performed on the decrypted data
-
Citations
33 Claims
-
1. A method for managing sensitive data comprising:
-
receiving by a transaction management device data encrypted using a public asymmetric key and a symmetric key from a mobile computing device, wherein the public asymmetric key and the symmetric key is shared between the transaction management device and the mobile computing device prior to receiving the data; decrypting by the transaction management device the received data using the received symmetric key and an asymmetric private key, wherein the asymmetric private key is generated by the transaction management device prior to receiving the data; and performing by the transaction management device one or more actions on the decrypted data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable medium having stored thereon instructions for managing sensitive data comprising machine executable code which when executed by at least one processor, causes the processor to perform steps comprising:
-
receiving data encrypted using a public asymmetric key and a symmetric key from a mobile computing device, wherein the public asymmetric key and the symmetric key is shared between a transaction management device and the mobile computing device prior to receiving the data; decrypting the received data using the received symmetric key and an asymmetric private key, wherein the asymmetric private key is generated by the transaction management device prior to receiving the data; and performing one or more actions on the decrypted data. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A transaction management device comprising:
-
at least one of configurable hardware logic configured to be capable of implementing or a processor coupled to a memory and configured to execute programmed instructions stored in the memory comprising; receiving data encrypted using a public asymmetric key and a symmetric key from a mobile computing device, wherein the public asymmetric key and the symmetric key is shared between the transaction management device and the mobile computing device prior to receiving the data; decrypting the received data using the received symmetric key and an asymmetric private key, wherein the asymmetric private key is generated by the transaction management device prior to receiving the data; and performing one or more actions on the decrypted data. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method for encrypting data comprising:
-
receiving by a mobile computing device an encrypted data from a card reader; encrypting by the mobile computing device the encrypted data using a public asymmetric key and a symmetric key; and sending by the mobile computing device the encrypted data to a transaction management device for authorization. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A non-transitory computer readable medium having stored thereon instructions for encrypting data comprising machine executable code which when executed by at least one processor, causes the processor to perform steps comprising:
-
receiving an encrypted data from a card reader; encrypting the received data using a public asymmetric key and a symmetric key; and sending the encrypted data to a transaction management device for authorization. - View Dependent Claims (25, 26, 27, 28)
-
-
29. A mobile computing device comprising:
-
a card reader communicably coupled to a processor and a memory, wherein the card reader is configured to obtain one or more information from a financial data card; and at least one of configurable hardware logic configured to be capable of implementing or the processor coupled to the memory and configured to execute programmed instructions stored in the memory comprising; receiving an encrypted data from the card reader; encrypting the received data using a public asymmetric key and a symmetric key; and sending the encrypted data to a transaction management device for authorization. - View Dependent Claims (30, 31, 32, 33)
-
Specification