Method and system for performing secure electronic monetary transactions
First Claim
1. A method for encrypting a numeric message comprising the steps of:
- a) converting each digit of the numeric message to a different value according to one of a plurality of formulae, wherein the plurality of formulae include nine formulae;
b) using a predetermined formula for each digit of the numeric message; and
c) using a numerical string to indicate which formula to use for each digit of the message, wherein each digit of the numerical string maps to one formula of the nine formulae;
d) inserting a random number in the cipher text if the numerical string contains a value that does not map to one of the nine formulae; and
e) using a succeeding value in the numerical string to indicate which formula to use for a current digit in the message.
8 Assignments
0 Petitions
Accused Products
Abstract
A secure electronic monetary transaction system (SEMTS) provides absolute security for electronic financial transactions. These transactions can be of any kind provided they are numeric in content and of known length. The SEMTS encrypts and decrypts source numeric data using a private, numeric key known only by both parties in the transaction. The secure distribution of these keys will be under the same methods that the financial institutions use to distribute the original source data such as credit cards, account numbers, etc. The system uses nine simple, open formulas for translating source numbers into encrypted cipher numbers. These formulas return every possible value, except the input value, and are completely dependent on the key. Because there are no hidden parts, the architecture of the SEMTS is completely available to anyone in the public sector. This open architecture makes stealing the cipher numbers worthless. The only way to break a number is to know the key. The only way to get the key is to physically steal it, which is the exact same risk entailed in the original source, e.g., a credit card. The total openness and absolute security delivered by the SEMTS is what is missing in all other available financial transaction schemes, and it is what is required by the public to have complete confidence in electronic financial transactions.
54 Citations
6 Claims
-
1. A method for encrypting a numeric message comprising the steps of:
-
a) converting each digit of the numeric message to a different value according to one of a plurality of formulae, wherein the plurality of formulae include nine formulae; b) using a predetermined formula for each digit of the numeric message; and c) using a numerical string to indicate which formula to use for each digit of the message, wherein each digit of the numerical string maps to one formula of the nine formulae; d) inserting a random number in the cipher text if the numerical string contains a value that does not map to one of the nine formulae; and e) using a succeeding value in the numerical string to indicate which formula to use for a current digit in the message.
-
-
2. A method for decrypting a cipher numeric into a source numeric comprising the steps of:
-
a) converting each digit of the cipher numeric to a different value according to one of a plurality of formulae, wherein the plurality of formulae include nine formulae; b) using a predetermined formula for each digit of the cipher numeric; and c) using a numerical string to indicate which formula to use for each digit of the cipher numeric, wherein each digit of the numerical string maps to one formula of the nine formulae; d) deleting a current value in the cipher numeric if the numerical string contains a value that does not map to one of the nine formulae; and e) using a succeeding value in the numerical string to indicate which formula to use for a succeeding digit in the cipher numeric.
-
-
3. A method for encrypting and decrypting a numerical string using an ideal key, comprising the steps of:
a) encrypting according to the following steps; (i) providing a key having at least n digits, wherein each digit in the key maps to one of nine formulae for converting a single digit into another single digit, each formula returns nine possible values based on an input value to the formula, and never returns the input value, but will return every other possible value; (ii) converting each digit of the numerical string into a cipher message using the key from step a)(i); (iii) detecting a tenth value in the key that does not map to one of the nine formulae; and (iv) inserting a random number in the cipher text upon detecting the tenth value in step a)(iii) and using a next digit in the key to convert a current digit in the source text thereby increasing a length of the cipher text relative to the source text. - View Dependent Claims (4, 5)
-
6. A method for decrypting a numerical string using an ideal key, comprising the steps of:
-
a) providing a key having at least n digits, wherein each digit in the key maps to one of nine formulae for converting a single digit into another single digit, each formula returns nine possible values based on an input value to the formula, and never returns the input value, but will return every other possible value; b) converting each digit of the numerical string into a source message using the key from step a); c) detecting a tenth value in the key that does not map to one of the nine formulae; and d) discarding a current value in the cipher text upon detecting the tenth value in step c) and using a next digit in the key to convert a next digit in the cipher text.
-
Specification