Please download the dossier by clicking on the dossier button x
×

Electronic commerce with cryptographic authentication

  • US 9,189,777 B1
  • Filed: 09/20/2000
  • Issued: 11/17/2015
  • Est. Priority Date: 09/20/1999
  • Status: Active Grant
First Claim
Patent Images

1. A method of implementing a cryptographic transaction related to an electronic transaction between a vendor device and a user device, the method comprising:

  • storing, by a secure server, one or more private keys of a user from a plurality of private cryptographic keys, first one or more authentication data of the user, and a first user identifier of the user, wherein the one or more private keys of the user is unknown to the user;

    receiving, by the vendor device, a transaction request and a second user identifier from the user device;

    generating, by the vendor device, a unique transaction identifier (TID) of the current transaction, wherein the TID uniquely identifies the current transaction between the vendor and the user;

    sending from the vendor device a cryptographic transaction request, the TID, and a current authentication data request to the user device;

    sending from the vendor device the TID and the second user identifier to the secure server;

    querying the user for second one or more authentication data based on the current authentication data request using the user device;

    receiving from the user the second one or more authentication data; and

    sending from the user device the TID sent from the vendor device and the second one or more authentication data to the secure server;

    retrieving, by the secure server, the first one or more authentication data using the first user identifier and the second user identifier;

    comparing, by the secure server, the first one or more authentication data and the second one or more authentication data; and

    retrieving, by the secure server, the one or more private keys of the user and performing, by the secure server, one or more cryptographic functions employing the one or more private keys based on the comparison.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×