Electronic transaction systems and methods therefor
First Claim
1. In a portable electronic authorization device (PEAD) with inaccessible storage of a user'"'"'s private key, a method for approving a transaction request originating from an electronic transaction system, comprising:
- receiving at said portable electronic authorization device first digital data, said first digital data representing said transaction request; and
in response to receiving approval of said transaction request by a user of said portable electronic authorization device, decrypting the user private key that is inaccessibly stored by the PEAD using a decryption key stored at and transmitted to the PEAD from a remote server, and transmitting a second digital data to said electronic transaction system, said second digital data being encrypted by said user private key but without transmission of the private key alone.
5 Assignments
0 Petitions
Accused Products
Abstract
The method includes the steps of receiving at the PEAD first digital data representing the transaction request. The PEAD provides information to the user regarding an ability to approve the transaction request. When the transaction request is approved by the user, the PEAD receives second digital data representing the electronic service authorization token. A remote agent server may provide a bridge between the electronic transaction system and the PEAD. In another embodiment, the private key is stored on the portable device, encrypted. The decryption key is stored outside of the device, at a trusted 3rd party location. When the user attempts to make a signature the software sends a request for the decryption key, along with the user'"'"'s password or pass phrase keyed in at the keyboard of the PDA, smart phone, or cell phone, to a server belonging to the trusted 3rd party.
-
Citations
32 Claims
-
1. In a portable electronic authorization device (PEAD) with inaccessible storage of a user'"'"'s private key, a method for approving a transaction request originating from an electronic transaction system, comprising:
-
receiving at said portable electronic authorization device first digital data, said first digital data representing said transaction request; and in response to receiving approval of said transaction request by a user of said portable electronic authorization device, decrypting the user private key that is inaccessibly stored by the PEAD using a decryption key stored at and transmitted to the PEAD from a remote server, and transmitting a second digital data to said electronic transaction system, said second digital data being encrypted by said user private key but without transmission of the private key alone. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. In an electronic authorization system with inaccessible storage of a user'"'"'s private key, at a portable electronic authorization device (PEAD) a method for approving a transaction request originating from an electronic transaction system, comprising:
-
receiving at said electronic authorization system first digital data, said first digital data representing said transaction request; and in response to receiving approval of said transaction request by a user of said electronic authorization system, decrypting the user private key that is inaccessibly stored at the PEAD using a decryption key stored at and transmitted to the PEAD from a remote server, transmitting a second digital data to said electronic transaction system, said second digital data being encrypted by said user private key but without transmission of the private key alone. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer-readable medium whose contents are capable of causing a portable electronic authorization device (PEAD) with inaccessible storage of a user'"'"'s private key to perform a method for approving a transaction request originating from an electronic transaction system, the method comprising:
-
receiving at said portable electronic authorization device first digital data, said first digital data representing said transaction request; and in response to receiving approval of said transaction request by a user of said portable electronic authorization device, decrypting the user private key that is inaccessibly stored by the PEAD using a decryption key stored at and transmitted to the PEAD from a remote server, and transmitting a second digital data to said electronic transaction system, said second digital data being encrypted by said user private key but without transmission of the private key alone.
-
-
30. A computer-readable medium whose contents are capable of causing a portable electronic authorization device (PEAD) in an electronic authorization system with inaccessible storage of a user'"'"'s private key to perform a method for approving a transaction request originating from an electronic transaction system, the method comprising:
-
receiving at said electronic authorization system first digital data, said first digital data representing said transaction request; and in response to receiving approval of said transaction request by a user of said electronic authorization system, decrypting the user private key that is inaccessibly stored at the PEAD using a decryption key stored at and transmitted to the PEAD from a remote server, transmitting a second digital data to said electronic transaction system, said second digital data being encrypted by said user private key but without transmission of the private key alone.
-
-
31. A portable electronic authorization device (PEAD) with inaccessible storage of a user'"'"'s private key that approves a transaction request originating from an electronic transaction system, comprising:
-
a receiver that receives at said portable electronic authorization device first digital data, said first digital data representing said transaction request; and a decryption subsystem that, in response to receiving approval of said transaction request by a user of said portable electronic authorization device, decrypts the user private key that is inaccessibly stored by the PEAD using a decryption key stored at and transmitted to the PEAD from a remote server, and transmitting a second digital data to said electronic transaction system, said second digital data being encrypted by said user private key but without transmission of the private key alone.
-
-
32. A portable electronic authorization device (PEAD) in an electronic authorization system with inaccessible storage of a user'"'"'s private key that approves a transaction request originating from an electronic transaction system, comprising:
-
a receiver that receives at said electronic authorization system first digital data, said first digital data representing said transaction request; and a decryption subsystem that, in response to receiving approval of said transaction request by a user of said electronic authorization system, decrypts the user private key that is inaccessibly stored at the PEAD using a decryption key stored at and transmitted to the PEAD from a remote server, transmitting a second digital data to said electronic transaction system, said second digital data being encrypted by said user private key but without transmission of the private key alone.
-
Specification