×

Method and apparatus for secured transmission of confidential data over an unsecured network

  • US 5,781,632 A
  • Filed: 10/30/1997
  • Issued: 07/14/1998
  • Est. Priority Date: 02/08/1995
  • Status: Expired due to Fees
First Claim
Patent Images

1. Over a network where unique encryption keys are forwarded to users on an off-network basis, said encryption keys being randomly generated and assigned to said users by an automated processing system, said encryption keys having corresponding unique customer numbers assigned thereto, a method of securely transmitting a customer request for goods or services to a merchant via an intermediary switch, the method comprising the steps of:

  • (a) encrypting the customer request, customer number and encryption key and electronic address of at least one merchant to create an unintelligible electronic message;

    (b) attaching the customer'"'"'s unique number in clear format to the unintelligible message to create a message request;

    (c) accessing the network;

    (d) transmitting the message request to the switch via the network;

    (e) verifying the integrity of the message request by performing a bit stream check on the message request data stream;

    (f) logging any errors found in the message request data stream;

    (g) de-encrypting the message request if it is error free to reveal the customer request, the encryption key, the customer number and the electronic address of the merchant;

    (h) comparing the de-encrypted customer number to the customer'"'"'s unique number in clear format to verify that they match;

    (i) logging an error if the de-encrypted customer number does not match the customer'"'"'s unique number in clear format;

    (j) retrieving the customer'"'"'s velocity file if the de-encrypted encryption key matches the encryption key in clear format;

    (k) verifying that the customer request does not violate any customer specified transaction limits contained in the velocity file;

    (l) logging an error if the customer request violates any customer specified transaction limits;

    (m) retrieving the merchant'"'"'s encryption key and unique number if no violation of the velocity file is encountered;

    (n) using the merchant'"'"'s unique encryption key to re-encrypt the customer request; and

    (o) transmitting the re-encrypted message to the merchant.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×