×

System and method of secure encryption for electronic data transfer

  • US 8,412,947 B2
  • Filed: 10/05/2006
  • Issued: 04/02/2013
  • Est. Priority Date: 10/05/2006
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable medium encoded with code segments for enabling a secure data transfer system, the computer-readable medium comprising:

  • a code segment for enabling a first computer to receive input from a first user identifying transfer data and a recipient identifier to initiate a transaction;

    a code segment for enabling the first computer to create a key for encoding and decoding the transfer data, wherein the key is unique for the transaction, encode the transfer data using the key, and communicate the key and the recipient identifier to a second computer;

    a code segment for enabling the first computer to receive sender authentication information from the first user and to communicate the sender authentication information to the second computer;

    a code segment for enabling the second computer to create a secure package identifier that uniquely identifies the transfer data, is unique for the transaction, and is associated with the recipient identifier and the key, to compare the sender authentication information received from the first computer with sender authentication information stored in a database, and to communicate the secure package identifier to the first computer only if the sender authentication information received from the first computer matches the sender authentication information stored in the database;

    a code segment for enabling the first computer to communicate the encoded transfer data and the secure package identifier to a third computer;

    a code segment for enabling the third computer to receive from a second user a user identifier and to communicate the user identifier and the secure package identifier to the second computer; and

    a code segment for enabling the second computer to communicate the key to the third computer only if the secure package identifier received from the third computer matches the secure package identifier created by the second computer and if the user identifier matches the recipient identifier.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×