×

Telecommunication method for securely exchanging data

  • US 9,344,410 B1
  • Filed: 10/31/2014
  • Issued: 05/17/2016
  • Est. Priority Date: 10/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. A telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer system via a digital cellular wireless telecommunications network, wherein the telecommunications device is a battery powered mobile end user telecommunications device, wherein the method comprises:

  • encrypting the unencrypted data using a first encryption algorithm into first encrypted data by the telecommunications device;

    sending the first encrypted data to a second server computer system via a first network connection of the digital cellular wireless telecommunications network by the telecommunications device;

    storing the first encrypted data by the second server computer system;

    sending an order request to the first server computer system via a second network connection of the digital cellular wireless telecommunications network by the telecommunications device;

    sending a data publishing request to publish the unencrypted data to the second server computer system via the first network connection by the telecommunications device;

    generating a cryptographic key pair by the second server computer system in response to the data publishing request, wherein the cryptographic key pair comprises a public key and a private key;

    sending the first encrypted data, the public key, and the private key to the telecommunications device in response to the data publishing request via the first network connection by the second server computer system;

    decrypting the first encrypted data into the unencrypted data by the telecommunications device;

    encrypting the unencrypted data into second encrypted data using the public key by the telecommunications device;

    sending the second encrypted data to the second server computer system via the first network connection by the telecommunications device;

    generating a web service for providing the second encrypted data via an URL by the second server computer system;

    sending the URL to the telecommunications device via the first network connection by the second server computer system;

    sending the URL and the private key to the first server computer system via the second network connection by the telecommunications device;

    requesting the second encrypted data from the second server computer system by the first server computer system using a wired network connection to access the web service at the URL;

    sending the second encrypted data to the first server computer system by the second server computer system using the wired network connection in response to the request of the second encrypted data by the second server computer system;

    decrypting the second encrypted data by the first server computer system into the unencrypted data using the private key; and

    combining the order request with the unencrypted data by the first server computer system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×