Generation of communication device signatures for use in securing nomadic electronic transactions
First Claim
Patent Images
1. A method for execution in a communication device, comprising:
- accessing an identifier stored in a memory;
receiving a first data set and a second data set over a first communication path, wherein the first data set and the second data set are distributed by a control server, wherein upon receipt, the first data set is included within first encrypted data obtained by encrypting the first data set using a first key and the second data set is included within second encrypted data obtained by encrypting the second data set using the first key;
decrypting the first data set from the first encrypted data using a second key that is complementary to the first key;
decrypting the second data set from the second encrypted data using the second key;
generating a first signature from the identifier and the decrypted first data set;
generating a second signature from the identifier and the decrypted second data set;
responding to a first request by releasing a first response including the first signature over a local communication path different from the first communication path; and
responding to a subsequent request by releasing a second response including the second signature over the local communication path.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for execution in a communication device, which comprises accessing an identifier stored in a memory; receiving a first data set and a second data set over a first communication path; generating a first signature from the identifier and the first data set; generating a second signature from the identifier and the second data set; responding to a first request by releasing a first response including the first signature over a local communication path different from the first communication path; and responding to a subsequent request by releasing a second response including the second signature over the local communication path.
82 Citations
33 Claims
-
1. A method for execution in a communication device, comprising:
-
accessing an identifier stored in a memory; receiving a first data set and a second data set over a first communication path, wherein the first data set and the second data set are distributed by a control server, wherein upon receipt, the first data set is included within first encrypted data obtained by encrypting the first data set using a first key and the second data set is included within second encrypted data obtained by encrypting the second data set using the first key; decrypting the first data set from the first encrypted data using a second key that is complementary to the first key; decrypting the second data set from the second encrypted data using the second key; generating a first signature from the identifier and the decrypted first data set; generating a second signature from the identifier and the decrypted second data set; responding to a first request by releasing a first response including the first signature over a local communication path different from the first communication path; and responding to a subsequent request by releasing a second response including the second signature over the local communication path. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A non-transitory computer-readable storage medium comprising a set of instructions for execution by a processing entity of a communication device, wherein execution of the set of instructions by the processing entity causes the processing entity to execute a method that includes:
-
accessing an identifier stored in a memory; receiving a first data set and a second data set over a first communication path, wherein the first data set and the second data set are distributed by a control server, wherein upon receipt, the first data set is included within first encrypted data obtained by encrypting the first data set using an encryption key and the second data set is included within second encrypted data obtained by encrypting the second data set using the encryption key; decrypting the first data set from the first encrypted data using a decryption key that is complementary to the encryption key; decrypting the second data set from the second encrypted data using the decryption key; generating a first signature from the identifier and the decrypted first data set; generating a second signature from the identifier and the decrypted second data set; responding to a first request by releasing a first response including the first signature over a local communication path different from the first communication path; and responding to a subsequent request by releasing a second response including the second signature over the local communication path.
-
-
33. A communication device, comprising:
-
a memory storing an identifier; an interface configured to communicate with a control server over a first communication path and with a local entity over a local communication path different from the first communication path, the local entity comprising a system-side receiver and a system-side transmitter; and a processing entity configured to; receive via the interface a first data set and a second data set distributed by the control server over the first communication path, wherein upon receipt, the first data set is included within first encrypted data obtained by encrypting the first data set using an encryption key and the second data set is included within second encrypted data obtained by encrypting the second data set using the encryption key; receive via the interface a first request and a subsequent request sent by the system-side transmitter over the local communication path; decrypt the first data set from the first encrypted data using a decryption key that is complementary to the encryption key; decrypt the second data set from the second encrypted data using the decryption key; generate a first signature from the identifier and the decrypted first data set; generate a second signature from the identifier and the decrypted second data set; respond to the first request by releasing a first response to the system-side receiver via the interface over the local communication path, the first response including the first signature; and respond to the second request by releasing a second response to the system-side receiver via the interface over the local communication path, the second response including the second signature.
-
Specification