SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SECURE PEER-TO-PEER TRANSACTIONS
First Claim
1. A method, comprising:
- receiving, at an application stored on a first mobile device, a first set of user data, the first set of user data including one or more of;
a user identification, a password, at least a portion of a social security number associated with the user, at least a portion of an account number associated with an issuing authority, and an activation code;
submitting the first set of user data to a server;
generating a public-private key pair for the application and the user;
preparing application credentials, the application credentials including at least one of;
a unique identifier associated with the application credentials, the public key generated for the application, a version of the application, and a hardware address for a network connection;
preparing user credentials, the user credentials including at least one of;
a first name of the user, a last name of the user, the public key generated for the user, a unique personal identification number (PIN) assigned to the to the user by an issuing authority, and a photograph of the user;
authenticating the user credentials and the application credentials;
storing the user credentials and the application credentials;
sending a copy of the application credentials and the user credentials to an issuing authority;
receiving the copy of the application credentials and the user credentials authenticated by the issuing authority; and
storing the copy of the application credentials and the user credentials signed by issuing authority on the first mobile device.
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for secure peer to peer transactions. In use, a peer to peer secured transaction is initiated between a first device and a second device. A request is prepared with signed keys at the first device, and the request may be received at the second device. Next, signed keys at the second device are validated and a response is prepared with signed keys at the second device and sent to the first device. Further, the response is cleared via issuer/broker/clearing house at the first device. Lastly, a receipt is prepared and signed at the first device, and the signed receipt is sent to the second device. Additional systems, methods, and computer program products are also presented.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, at an application stored on a first mobile device, a first set of user data, the first set of user data including one or more of;
a user identification, a password, at least a portion of a social security number associated with the user, at least a portion of an account number associated with an issuing authority, and an activation code;submitting the first set of user data to a server; generating a public-private key pair for the application and the user; preparing application credentials, the application credentials including at least one of;
a unique identifier associated with the application credentials, the public key generated for the application, a version of the application, and a hardware address for a network connection;preparing user credentials, the user credentials including at least one of;
a first name of the user, a last name of the user, the public key generated for the user, a unique personal identification number (PIN) assigned to the to the user by an issuing authority, and a photograph of the user;authenticating the user credentials and the application credentials; storing the user credentials and the application credentials; sending a copy of the application credentials and the user credentials to an issuing authority; receiving the copy of the application credentials and the user credentials authenticated by the issuing authority; and storing the copy of the application credentials and the user credentials signed by issuing authority on the first mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computing apparatus including a processor and a memory storing instructions that, when executed by the processor, configure the apparatus to perform a method comprising:
-
receiving, at an application stored on a first mobile device, a first set of user data, the first set of user data including one or more of;
a user identification, a password, at least a portion of a social security number associated with the user, at least a portion of an account number associated with an issuing authority, and an activation code;storing the first set of user data; generating a public-private key pair for the application and the user; preparing application credentials, the application credentials including at least one of;
a unique identifier associated with the application credentials, the public key generated for the application, a version of the application, a hardware address for a network connection;preparing user credentials, the user credentials including at least one of;
a first name of the user, a last name of the user, the public key generated for the user, a unique personal identification number (PIN) assigned to the to the user by an issuing authority, and a photograph of the user;authenticating the user credentials and the application credentials; storing the user credentials and the application credentials; sending a copy of the application credentials and the user credentials to an issuing authority; receiving the copy of the application credentials and the user credentials authenticated by the issuing authority; and storing the copy of the application credentials and the user credentials signed by issuing authority on the first mobile device.
-
-
20. A non-transitory computer-readable storage medium having stored thereon instructions including instructions that, when executed by a processor, configure the processor to perform a method comprising:
-
receiving, at an application stored on a first mobile device, a first set of user data, the first set of user data including one or more of;
a user identification, a password, at least a portion of a social security number associated with the user, at least a portion of an account number associated with an issuing authority, and an activation code;storing the first set of user data; generating a public-private key pair for the application and the user; preparing application credentials, the application credentials including at least one of;
a unique identifier associated with the application credentials, the public key generated for the application, a version of the application, a hardware address for a network connection;preparing user credentials, the user credentials including at least one of;
a first name of the user, a last name of the user, the public key generated for the user, a unique personal identification number (PIN) assigned to the to the user by an issuing authority, and a photograph of the user;authenticating the user credentials and the application credentials; storing the user credentials and the application credentials; sending a copy of the application credentials and the user credentials to an issuing authority; receiving the copy of the application credentials and the user credentials authenticated by the issuing authority; and storing the copy of the application credentials and the user credentials signed by issuing authority on the first mobile device.
-
Specification