Telecommunication method for securely exchanging data
First Claim
1. A telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer system via a digital cellular wireless telecommunications network, wherein the telecommunications device is a battery powered mobile end user telecommunications device, wherein the method comprises:
- encrypting the unencrypted data using a first encryption algorithm into first encrypted data by the telecommunications device;
sending the first encrypted data to a second server computer system via a first network connection of the digital cellular wireless telecommunications network by the telecommunications device;
storing the first encrypted data by the second server computer system;
sending an order request to the first server computer system via a second network connection of the digital cellular wireless telecommunications network by the telecommunications device;
sending a data publishing request to publish the unencrypted data to the second server computer system via the first network connection by the telecommunications device;
generating a cryptographic key pair by the second server computer system in response to the data publishing request, wherein the cryptographic key pair comprises a public key and a private key;
sending the first encrypted data, the public key, and the private key to the telecommunications device in response to the data publishing request via the first network connection by the second server computer system;
decrypting the first encrypted data into the unencrypted data by the telecommunications device;
encrypting the unencrypted data into second encrypted data using the public key by the telecommunications device;
sending the second encrypted data to the second server computer system via the first network connection by the telecommunications device;
generating a web service for providing the second encrypted data via an URL by the second server computer system;
sending the URL to the telecommunications device via the first network connection by the second server computer system;
sending the URL and the private key to the first server computer system via the second network connection by the telecommunications device;
requesting the second encrypted data from the second server computer system by the first server computer system using a wired network connection to access the web service at the URL;
sending the second encrypted data to the first server computer system by the second server computer system using the wired network connection in response to the request of the second encrypted data by the second server computer system;
decrypting the second encrypted data by the first server computer system into the unencrypted data using the private key; and
combining the order request with the unencrypted data by the first server computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides for a telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer system via a digital cellular wireless telecommunications network, wherein the telecommunications device is a battery powered mobile end user telecommunications device, wherein the method comprises the steps of: encrypting the unencrypted data using a first encryption algorithm into first encrypted data, sending the first encrypted data to a second server computer system via a first network connection of the digital cellular wireless telecommunications network, storing the first encrypted data by the second server computer system, sending an order request to the first server computer system via a second network connection of the digital cellular wireless telecommunications network by the telecommunications device, sending a data publishing request to the second server computer system, generating a cryptographic key pair, sending the first encrypted data, the public key, and the private key to the telecommunications device, decrypting the first encrypted data into the unencrypted data, encrypting the unencrypted data into second encrypted data using the public key, sending the second encrypted data to the second, generating a web service for providing the second encrypted data via an URL, sending the URL to the telecommunications device, sending the URL and the private key, requesting the second encrypted data from the second server computer system, sending the second encrypted data to the first server computer system by the second server computer system using the wired network connection, decrypting the second encrypted data by the first server computer system into the unencrypted data, and combining the order request with the unencrypted data.
-
Citations
15 Claims
-
1. A telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer system via a digital cellular wireless telecommunications network, wherein the telecommunications device is a battery powered mobile end user telecommunications device, wherein the method comprises:
-
encrypting the unencrypted data using a first encryption algorithm into first encrypted data by the telecommunications device; sending the first encrypted data to a second server computer system via a first network connection of the digital cellular wireless telecommunications network by the telecommunications device; storing the first encrypted data by the second server computer system; sending an order request to the first server computer system via a second network connection of the digital cellular wireless telecommunications network by the telecommunications device; sending a data publishing request to publish the unencrypted data to the second server computer system via the first network connection by the telecommunications device; generating a cryptographic key pair by the second server computer system in response to the data publishing request, wherein the cryptographic key pair comprises a public key and a private key; sending the first encrypted data, the public key, and the private key to the telecommunications device in response to the data publishing request via the first network connection by the second server computer system; decrypting the first encrypted data into the unencrypted data by the telecommunications device; encrypting the unencrypted data into second encrypted data using the public key by the telecommunications device; sending the second encrypted data to the second server computer system via the first network connection by the telecommunications device; generating a web service for providing the second encrypted data via an URL by the second server computer system; sending the URL to the telecommunications device via the first network connection by the second server computer system; sending the URL and the private key to the first server computer system via the second network connection by the telecommunications device; requesting the second encrypted data from the second server computer system by the first server computer system using a wired network connection to access the web service at the URL; sending the second encrypted data to the first server computer system by the second server computer system using the wired network connection in response to the request of the second encrypted data by the second server computer system; decrypting the second encrypted data by the first server computer system into the unencrypted data using the private key; and combining the order request with the unencrypted data by the first server computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A second server computer system for exchanging unencrypted data between a telecommunications device and a first server computer system via a digital cellular wireless telecommunications network, wherein the telecommunications device is a battery powered mobile end user telecommunications device, wherein the second server computer system comprises:
-
a memory for storing machine executable instructions and a processor for executing the machine executable instructions, wherein execution of the machine executable instructions causes the processor to; receive first encrypted data via a first network connection of the digital cellular wireless telecommunications network from the telecommunications device; store the first encrypted data; receive a data publishing request to publish the unencrypted data via the first network connection from the telecommunications device; generate a cryptographic key pair by the second server computer system in response to the data publishing request, wherein the cryptographic key pair comprises a public key and a private key; sending the first encrypted data, the public key, and the private key to the telecommunications device in response to the data publishing request via the first network connection; receiving second encrypted data from the second server computer system via the first network connection from the communications device; generating a web service for providing the second encrypted data via an URL; sending the URL to the telecommunications device via the first network connection; receiving a request for the second encrypted data from the second server computer system from the first server computer system using a wired network connection to access the web service at the URL; and sending the second encrypted data to the first server computer system using the wired network connection in response to the request of the second encrypted data by the second server computer system.
-
Specification