Method, apparatus, system and firmware for secure transactions
First Claim
Patent Images
1. An electronic data carrier used for secure transactions comprising:
- input/output circuitry for communicating to a data processing circuit;
math coprocessor circuitry electrically connected to said input/output circuitry where said math coprocessor performs encryption calculations;
microprocessor circuitry electrically connected to said input/output circuitry; and
memory circuitry electrically connected to said microprocessor circuitry, said electronic data carrier providing secure, encrypted data transfers between said electronic data carrier and said data processing circuit.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to an electronic module used for secure transactions. More specifically, the electronic module is capable of passing information back and forth between a service provider'"'"'s equipment via a secure, encrypted technique so that money and other valuable data can be securely passed electronically. The module is capable of being programmed, keeping track of real time, recording transactions for later review, and creating encryption key pairs.
-
Citations
27 Claims
-
1. An electronic data carrier used for secure transactions comprising:
-
input/output circuitry for communicating to a data processing circuit; math coprocessor circuitry electrically connected to said input/output circuitry where said math coprocessor performs encryption calculations; microprocessor circuitry electrically connected to said input/output circuitry; and memory circuitry electrically connected to said microprocessor circuitry, said electronic data carrier providing secure, encrypted data transfers between said electronic data carrier and said data processing circuit. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for communicating secure transactions, comprising:
a first module comprising; input/output circuitry; random number creating means for creating a random number; and a first transaction group for requesting said random number creating means to create said random number and for providing said random number to said input/output circuitry; and a service provider equipment comprising; means for reading said random number from said input/output circuitry of said first module; means for combining said random number with a first data and for encrypting the combination of said random number and said first data with a private key to produce a first certificate, whereby said input/output circuitry of said first module receives said first certificate. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
14. A method of communicating encrypted information between a data carrier and a service provider equipment, comprising the steps of:
-
a) creating a first random number in said data carrier; b) passing said random number to said service provider equipment; c) encrypting at least said random number with a private key in said service provider equipment thereby producing a certificate; d) passing at least said certificate to said data carrier; e) decrypting said certificate with a public key in said data carrier; f) comparing said first random number with a number found in the decrypted first certificate of step e) to determine if the two numbers match. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method of communicating encrypted information between a data carrier and a service provider equipment, comprising the steps of:
-
a) creating a first random number in said service provider equipment; b) passing said random number to said data carrier; c) encrypting at least said random number with a private key in said data carrier thereby producing a first certificate; d) passing at least said first certificate to said service provider equipment; e) decrypting said first certificate with a public key in said service provider equipment; f) comparing said first random number with a number found in the decrypted first certificate of step f) to determine if the two numbers match. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A method of decrypting encrypted data using a module, comprising the steps of:
-
receiving a first encrypted data and a second encrypted data; decrypting said first encrypted data with a private key stored in said module, whereby a first decryption key is created; providing said first decryption key to an electronic system; decrypting said second encrypted data with said first decryption key via said electronic system, whereby a useful information is created. - View Dependent Claims (26, 27)
-
Specification