System and method for secure mobile commerce
First Claim
1. A method for secure mobile commerce within a mobile commerce system having a pre-defined communications protocol, the mobile commerce system including a plurality of readers and a plurality of transponders, the plurality of transponders including first transponders having an unencrypted communications format and second transponders having an encrypted communications format, the method comprising the steps of:
- transmitting a trigger signal from one of said plurality of readers;
receiving a response signal from one of said transponders;
testing said response signal to determine whether said response signal is from one of said first transponders or one of said second transponders;
engaging in unencrypted communications with said one of said transponders in accordance with the unencrypted communications format if said response signal was received from one of said first transponders; and
engaging in encrypted communications with said one of said transponders in accordance with the encrypted communications format if said response signal was received from one of said second transponders.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and system for secure communications in a mobile commerce system having a pre-defined communications protocol. The method and system are backward compatible, providing reader configured to distinguish between a first type of transponder using an unencrypted protocol and a second type of transponder using an encrypted protocol. The reader determines the type of transponder and alters its communications protocol accordingly. The encrypted protocol provides for encrypted communications within the constraints of the existing pre-defined communications protocol.
-
Citations
34 Claims
-
1. A method for secure mobile commerce within a mobile commerce system having a pre-defined communications protocol, the mobile commerce system including a plurality of readers and a plurality of transponders, the plurality of transponders including first transponders having an unencrypted communications format and second transponders having an encrypted communications format, the method comprising the steps of:
-
transmitting a trigger signal from one of said plurality of readers; receiving a response signal from one of said transponders; testing said response signal to determine whether said response signal is from one of said first transponders or one of said second transponders; engaging in unencrypted communications with said one of said transponders in accordance with the unencrypted communications format if said response signal was received from one of said first transponders; and engaging in encrypted communications with said one of said transponders in accordance with the encrypted communications format if said response signal was received from one of said second transponders. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system for secure mobile commerce within a mobile commerce system having a pre-defined communications protocol, said system comprising:
-
a reader, including a transmitter for transmitting a trigger signal and a program signal, and a receiver for receiving a response signal; and a plurality of transponders, each of said transponders including a transceiver for transmitting said response signal, and said transponders including first transponders having an unencrypted communications format and second transponders having an encrypted communications format, said reader including a tag type analyzer coupled to said receiver for testing said response signal to determine whether said response signal is from one of said first transponders or one of said second transponders, and said reader including a communications module for reading said response signal and generating said program signal, wherein said communications module operates in accordance with said unencrypted communication format or said encrypted communications format in response to said tag type analyzer. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
Specification