ENCAPSULATED SECURITY TOKENS FOR ELECTRONIC TRANSACTIONS
6 Assignments
0 Petitions
Accused Products
Abstract
Functional data for use in one or more digital transactions are secured by using an encapsulated security token (EST). In certain embodiments, the EST is created by encapsulating digital data including the functional data using at least two cryptographic systems of two parties. The encapsulation and subsequent de-encapsulation can utilize cryptographic systems of the parties that involve a private key for signing and decryption and a public key for encryption and signature verification. If constructed carefully over a series of rigorous events, the resulting EST can be practically impossible to counterfeit. In addition, a propagation of rights can be tracked for auditing and rights can be easily terminated or modified.
-
Citations
81 Claims
-
1-25. -25. (canceled)
-
26. A method for use in executing a digital transaction using one or more processors, comprising the steps of:
-
obtaining an encapsulated security token generated by encapsulating at least digital data using at least first and second cryptographic systems respectively including first and second digital signatures and first and second signature verifications; and electronically presenting, in connection with a digital transaction, said encapsulated security token and transaction functional data for said digital transaction. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A method for use in authenticating functional data presented in connection with a digital transaction, comprising the steps of:
-
receiving first functional data for a proposed digital transaction from a first user; receiving an encapsulated security token from said first user, said encapsulated security token having been generated by encapsulating at least first digital data using at least first and second cryptographic systems including first and second digital signatures and first and second signature verifications respectively; de-encapsulating said encapsulated security token using at least said first and second signature verifications to obtain said first digital data; and using said first functional data and said first digital data to control said proposed digital transaction. - View Dependent Claims (41, 42, 43)
-
-
44. A method for use in propagating authority to use functional data in connection with a digital transaction, comprising the steps of:
-
receiving first digital data including at least functional data; adding to said first digital data at least first authorization data at least sufficient to identify an authorized party; generating an encapsulated security token by encapsulating at least said first digital data and said first authorization data using at least first and second cryptographic systems including first and second digital signatures and first and second signature verifications respectively; and propagating said encapsulated security token to said authorized party.
-
-
45-69. -69. (canceled)
-
70. An apparatus for use in executing a digital transaction comprising:
-
one or more processors operative for; 1) obtaining an encapsulated security token generated by encapsulating at least digital data using at least first and second cryptographic systems respectively including first and second digital signatures and first and second signature verifications; and 2) electronically presenting, in connection with a digital transaction, said encapsulated security token and transaction functional data for said digital transaction. - View Dependent Claims (71, 72, 73, 74, 75, 76, 77, 78)
-
-
79. An apparatus for use in authenticating functional data presented in connection with a digital transaction, comprising:
-
one or more processors operative for; 1) receiving first functional data for a proposed digital transaction from a first user; 2) receiving an encapsulated security token from said first user, said encapsulated security token having been generated by encapsulating at least first digital data using at least first and second cryptographic systems including first and second digital signatures and first and second signature verifications respectively; 3) de-encapsulating said encapsulated security token using at least said first and second signature verifications to obtain said first digital data; and 4) using said first functional data and said first digital data to control said proposed digital transaction. - View Dependent Claims (80)
-
-
81. An apparatus for use in propagating authority to use functional data in connection with a digital transaction, comprising:
-
one or more processors operative for; 1) receiving first digital data including at least functional data; 2) adding to said first digital data at least first authorization data at least sufficient to identify an authorized party; 3) generating an encapsulated security token by encapsulating at least said first digital data and said first authorization data using at least first and second cryptographic systems including first and second digital signatures and first and second signature verifications respectively; and 4) propagating said encapsulated security token to said authorized party.
-
Specification