Technique for securely communicating information
First Claim
1. A method for communicating information securely between a client device and a computer, comprising:
- receiving one or more encryption keys at the computer through a first wireless communication technique that includes near field communication, wherein the first wireless communication technique operates over a first distance;
communicating a document to the client device from the computer through a second wireless communication technique that includes a technique other than near field communication, wherein the second wireless communication technique operates over a second distance which is greater than the first distance, and wherein the document is associated with a financial transaction conducted with a commercial establishment;
receiving the document at the client device through the second wireless communication technique;
authorizing the document by a consumer at the client device to generate an authorized document, wherein the authorized document includes an authorization by the consumer for the financial transaction, and wherein the authorized document is, at least in part, encrypted using the one or more encryption keys;
communicating the authorized document from the client device to the computer through the second wireless communication technique; and
receiving the authorized document at the computer through the second wireless communication technique,wherein the authorized document is used to authenticate the consumer and to approve the financial transaction by a financial institution.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that communicates information is described. During operation, this system receives an encryption key through a first wireless communication technique, wherein the first wireless communication technique includes near field communication. Then, the system communicates a document through a second wireless communication technique, where the document is associated with a financial transaction being conducted with a commercial establishment. Next, the system receives encrypted information through the second wireless communication technique, where the encrypted information is, at least in part, encrypted using the encryption key, and where the second wireless communication technique includes a technique other than near field communication.
-
Citations
26 Claims
-
1. A method for communicating information securely between a client device and a computer, comprising:
-
receiving one or more encryption keys at the computer through a first wireless communication technique that includes near field communication, wherein the first wireless communication technique operates over a first distance; communicating a document to the client device from the computer through a second wireless communication technique that includes a technique other than near field communication, wherein the second wireless communication technique operates over a second distance which is greater than the first distance, and wherein the document is associated with a financial transaction conducted with a commercial establishment; receiving the document at the client device through the second wireless communication technique; authorizing the document by a consumer at the client device to generate an authorized document, wherein the authorized document includes an authorization by the consumer for the financial transaction, and wherein the authorized document is, at least in part, encrypted using the one or more encryption keys; communicating the authorized document from the client device to the computer through the second wireless communication technique; and receiving the authorized document at the computer through the second wireless communication technique, wherein the authorized document is used to authenticate the consumer and to approve the financial transaction by a financial institution. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer system, comprising:
-
a processor; a memory; a program module, wherein the program module is stored in the memory and configurable to be executed by the processor, the program module including; instructions for receiving one or more encryption keys at a computer through a first wireless communication technique that includes near field communication, wherein the first wireless communication technique operates over a first distance; instructions for communicating a document to a client device from the computer through a second wireless communication technique that includes a technique other than near field communication, wherein the second wireless communication technique operates over a second distance which is greater than the first distance, and wherein the document is associated with a financial transaction conducted with a commercial establishment; instructions for receiving the document at the client device through the second wireless communication technique; instructions for authorizing the document by a consumer at the client device to generate an authorized document, wherein the authorized document includes an authorization by the consumer for the financial transaction, and wherein the authorized document is, at least in part, encrypted using the one or more encryption keys; instructions for communicating the authorized document from the client device to the computer through the second wireless communication technique; and instructions for receiving the authorized document at the computer through the second wireless communication technique, wherein the authorized document is used to authenticate the consumer and to approve the financial transaction by a financial institution.
-
-
23. A computer program product for use in conjunction with a computer system, the computer program product comprising a computer-readable storage medium and a computer-program mechanism embedded therein communicating information, the computer-program mechanism including:
-
instructions for receiving one or more encryption keys at a computer through a first wireless communication technique that includes near field communication, wherein the first wireless communication technique operates over a first distance; instructions for communicating a document to a client device from the computer through a second wireless communication technique that includes a technique other than near field communication, wherein the second wireless communication technique operates over a second distance which is greater than the first distance, and wherein the document is associated with a financial transaction conducted with a commercial establishment; instructions for receiving the document at the client device through the second wireless communication technique; instructions for authorizing the document by a consumer at the client device to generate an authorized document, wherein the authorized document includes an authorization by the consumer for the financial transaction, and wherein the authorized document is, at least in part, encrypted using the one or more encryption keys; instructions for communicating the authorized document from the client device to the computer through the second wireless communication technique; and instructions for receiving the authorized document at the computer through the second wireless communication technique, wherein the authorized document is used to authenticate the consumer and to approve the financial transaction by a financial institution. - View Dependent Claims (24, 25)
-
-
26. A wireless device, comprising:
-
a transceiver configured to communicate information; a processor; a memory configured to store one or more encryption keys and encrypted information; and a program module, wherein the program module is stored in the memory and configurable to be executed by the processor, the program module including; instructions for initiating a session by communicating the one or more encryption keys between the wireless device and a computer through a first wireless communication technique that includes near field communication, wherein the first wireless communication technique operates over a first distance; instructions for receiving a document at the wireless device from the computer through a second wireless communication technique that includes a technique other than near field communication, wherein the second wireless communication technique operates over a second distance which is greater than the first distance, and wherein the document is associated with a financial transaction conducted with a commercial establishment; instructions for requesting a token from a consumer conducting the financial transaction; instructions for receiving the token; instructions for receiving the document at the wireless device through the second wireless communication technique; instructions for authorizing the document by the consumer at the wireless device to generate an authorized document, wherein the authorized document includes an authorization by the consumer for the financial transaction, and wherein the authorized document is, at least in part, encrypted using the one or more encryption keys; instructions for communicating the authorized document from the wireless device to the computer through the second wireless communication technique; and instructions for providing the authorized document through the second wireless communication technique after the token is received, wherein the authorized document is used to authenticate the consumer and to approve the financial transaction by a financial institution.
-
Specification