Secure digital communications
First Claim
Patent Images
1. A system for securing transactional communication messages, the system comprising:
- at least one hardware processor; and
a computer readable medium including instructions that, when executed by the at least one processor, cause the at least one processor to perform operations to;
divide a transactional message into a first transaction unit and a second transaction unit by extracting odd lines and even lines from the transactional message, wherein the first transaction unit includes the odd lines and the second transaction unit includes the even lines;
generate a first cryptographic key and a second cryptographic key;
encrypt the first transaction unit using the first cryptographic key and the second transaction unit using the second cryptographic key;
create a first data packet including the encrypted first transaction unit and the second cryptographic key and a second data packet including the encrypted second transaction unit and the first cryptographic key;
transmit the first data packet over a first transmission path and the second data packet over a second transmission path;
receive a request that indicates that one of the first data packet and the second data packet was not received by a recipient, andretransmit, in response to receipt of the request, the first data packet and the second data packet.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed in some examples are methods, systems, and machine readable mediums for secure end-to-end digital communications involving mobile wallets. The result is direct, secure, in-band messaging using mobile wallets that may be used to send messages such as payments, requests for money, financial information, or messages to authorize a debit or credit.
96 Citations
14 Claims
-
1. A system for securing transactional communication messages, the system comprising:
-
at least one hardware processor; and a computer readable medium including instructions that, when executed by the at least one processor, cause the at least one processor to perform operations to; divide a transactional message into a first transaction unit and a second transaction unit by extracting odd lines and even lines from the transactional message, wherein the first transaction unit includes the odd lines and the second transaction unit includes the even lines; generate a first cryptographic key and a second cryptographic key; encrypt the first transaction unit using the first cryptographic key and the second transaction unit using the second cryptographic key; create a first data packet including the encrypted first transaction unit and the second cryptographic key and a second data packet including the encrypted second transaction unit and the first cryptographic key; transmit the first data packet over a first transmission path and the second data packet over a second transmission path; receive a request that indicates that one of the first data packet and the second data packet was not received by a recipient, and retransmit, in response to receipt of the request, the first data packet and the second data packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. At least one non-transitory computer readable medium comprising instructions for securing transactional communication messages that, when executed by at least one processor, cause the at least one processor to perform operations to:
-
divide a transactional message into a first transaction unit and a second transaction unit by extracting odd lines and even lines from the transactional message, wherein the first transaction unit includes the odd lines and the second transaction unit includes the even lines; generate a first cryptographic key and a second cryptographic key; encrypt the first transaction unit using the first cryptographic key and the second transaction unit using the second cryptographic key; create a first data packet including the encrypted first transaction unit and the second cryptographic key and a second data packet including the encrypted second transaction unit and the first cryptographic key; transmit the first data packet over a first transmission path and the second data packet over a second transmission path; receive a request that indicates that one of the first data packet and the second data packet was not received by a recipient, and retransmit, in response to receipt of the request, the first data packet and the second data packet. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method for securing transactional communication messages, the method comprising:
-
dividing a transactional message into a first transaction unit and a second transaction unit by extracting odd lines and even lines from the transactional message, wherein the first transaction unit includes the odd lines and the second transaction unit includes the even lines; generating a first cryptographic key and a second cryptographic key; encrypting the first transaction unit using the first cryptographic key and the second transaction unit using the second cryptographic key; creating a first data packet including the encrypted first transaction unit and the second cryptographic key and a second data packet including the encrypted second transaction unit and the first cryptographic key; transmitting the first data packet over a first transmission path and the second data packet over a second transmission path; receiving a request indicating that one of the first data packet and the second data packet was not received by a recipient, and retransmitting, in response to receipt of the request, the first data packet and the second data packet.
-
Specification