×

Security framework and protocol for universal pervasive transactions

  • US 7,353,382 B2
  • Filed: 06/11/2003
  • Issued: 04/01/2008
  • Est. Priority Date: 08/08/2002
  • Status: Active Grant
First Claim
Patent Images

1. A computer system securely transmitting and verifying a two-party agreement, said system comprising:

  • a first device, operated by the first party, developing and transmitting a first view of the two-party agreement based upon first device respective non-transmitted and transmitted transaction time dependent and device dependent parameters, the first view including an encrypted part based upon the first device non-transmitted time dependent and device dependent parameters and an unencrypted plaintext part including the first device transmitted transaction time dependent and device dependent parameters,wherein the first device encrypts the encrypted part of the first view using a first device encryption key according to a deterministic algorithm based on a non-stored Private Identification Entry (PIE) input to the first device and a deterministic algorithm based on the first device non-transmitted transaction time dependent and device dependent parameters;

    a second device, operated by the second party, developing and transmitting a second view of the two-party agreement, the second view including an encrypted part encrypted by a second device encryption key and an unencrypted plaintext part including second device transmitted transaction time dependent and device dependent parameters; and

    a third device comprising a verification partyreceiving the first view and the second view,generating the first device encryption key based upon the first device transmitted transaction time dependent and device dependent parameters and information known by the third device about the first device PIE and the first device non-transmitted time dependent and device dependent parameters,generating the second device encryption key based upon the second device transmitted transaction time dependent and device dependent parameters,decrypting the encrypted part of the first and second views, based upon the respective first and second device encryption keys,comparing the first view with the second view, andtransmitting a signal based on the comparing,wherein the first device PIE and the first and second device encryption keys are not communicated among the first, second and third devices.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×