×

End-to-end security of transactions between a mobile terminal and an internet server at the application level

  • US 7,444,674 B1
  • Filed: 06/26/2000
  • Issued: 10/28/2008
  • Est. Priority Date: 06/26/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for end-to-end securing of transactions between a mobile terminal and an Internet server on an application level, in which method, for unambiguous identification of an application transaction, an Internet server application transmits transaction identification records to a transaction partner application and receives transaction identification records that are transmitted back to the Internet server application from the transaction partner application, for unambiguous identification of the application transaction, the method comprising:

  • transmitting a cryptographic transaction identification record, which is directed to transaction partner applications in the mobile terminal, from the Internet server to a proxy server;

    storing, on the proxy server assigned to the mobile terminal, the cryptographic transaction identification record;

    transmitting to the mobile terminal by the proxy server using a wireless protocol that does not support cookies, in each case, a first record identification corresponding to the stored cryptographic transaction identification record in the proxy server;

    transmitting to the mobile terminal a first proxy record from the proxy server, said first proxy record calculated by the proxy server from the stored cryptographic transaction identification record, and said first proxy record produced being of a different form from the stored cryptographic transaction identification record;

    taking in each case by the proxy server from messages directed by the mobile terminal to the Internet server application a second record identification and a second proxy record, said second proxy record based on the first proxy record received at the mobile terminal from the proxy server;

    checking for a correspondence of the second proxy record with the first proxy record; and

    transmitting, in a case of there being a positive correspondence between the first and second proxy records, to the Internet server application the stored cryptographic transaction identification record, determined through the first record identification.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×