IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0286890
(2005-11-23)
|
등록번호 |
US-7725404
(2010-06-14)
|
발명자
/ 주소 |
- Sellars, William
- Malina, Richard
- Cochran, William
|
출원인 / 주소 |
|
대리인 / 주소 |
Michael Best & Friedrich LLP
|
인용정보 |
피인용 횟수 :
5 인용 특허 :
66 |
초록
▼
Methods and systems for performing electronic commerce using mutating identifiers. One method can include encrypting buyer transaction data with a first mutating identifier, transmitting the buyer transaction data to an authenticator device, decrypting the buyer transaction data, generating a paymen
Methods and systems for performing electronic commerce using mutating identifiers. One method can include encrypting buyer transaction data with a first mutating identifier, transmitting the buyer transaction data to an authenticator device, decrypting the buyer transaction data, generating a payment request, encrypting the payment request with a third mutating identifier, and transmitting the payment request to a payment authenticator device.
대표청구항
▼
The invention claimed is: 1. A method of performing electronic commerce using symmetric-key mutating identifiers for a digital content delivery system that includes a buyer device, a vendor device, an authenticator device, and a payment authenticator device, the method comprising: initiating, by th
The invention claimed is: 1. A method of performing electronic commerce using symmetric-key mutating identifiers for a digital content delivery system that includes a buyer device, a vendor device, an authenticator device, and a payment authenticator device, the method comprising: initiating, by the buyer device, a commercial transaction between the buyer device and the vendor device; encrypting, in a processor of the buyer device, buyer transaction data with a first symmetric-key mutating identifier, and buyer credentials with a first transaction key; transmitting, by a buyer device communication interface, the encrypted buyer transaction data to an authenticator device, and the encrypted buyer credentials to a payment authenticator device; encrypting, in a processor of the vendor device, vendor transaction data with a second symmetric-key mutating identifier, and vendor credentials with a second transaction key; transmitting, by a vendor device communication interface, the encrypted vendor transaction data to the authenticator device, and the encrypted vendor credentials to the payment authenticator device; receiving, by an authenticator device communication interface, the encrypted buyer transaction data and the encrypted vendor transaction data at the authenticator device; decrypting, in a processor of the authenticator device, the encrypted buyer transaction data and the encrypted vendor transaction data; generating, by the authenticator device, a payment request based on the decrypted transaction data for the payment authenticator device; encrypting, in the processor of the authenticator device, the payment request with a third symmetric-key mutating identifier; transmitting, by the authenticator device communication interface, the encrypted payment request to the payment authenticator device; receiving, by a payment authenticator device communication interface, the encrypted payment request, the encrypted buyer credentials, and the encrypted vendor credentials at the payment authenticator device; decrypting, in a processor of the payment authenticator device, the encrypted payment request, the encrypted buyer credentials, and the encrypted vendor credentials; generating, by the payment authenticator device, a first response based on the decrypted buyer credentials, the decrypted vendor credentials, and the decrypted payment request; generating, by the payment authenticator device, a second response based on the decrypted buyer credentials, the decrypted vendor credentials, and the decrypted payment request; transmitting, by the payment authenticator device communication interface, the first response to the buyer device and the second response to the vendor device. 2. The method of claim 1, wherein the vendor transaction data includes a bill of sale and a price. 3. The method of claim 1, wherein the payment request includes an identity of the vendor device and an identity of the buyer device. 4. The method of claim 1, further comprising verifying the buyer credentials and verifying the vendor credentials. 5. The method of claim 1, wherein the payment request includes a first receipt for the buyer device. 6. The method of claim 5, wherein the first response includes the first receipt. 7. The method of claim 1, wherein the payment request includes a fourth symmetric-key mutating identifier for the buyer device. 8. The method of claim 7, wherein the first response includes the fourth symmetric-key mutating identifier. 9. The method of claim 1, wherein the first response includes at least one of an approved message and a declined message for the buyer device. 10. The method of claim 1, wherein the buyer transaction data includes a bill of sale and a price. 11. The method of claim 1, wherein the buyer transaction data includes an identity of the payment authenticator device. 12. The method of claim 1, wherein the payment request includes a second receipt for the vendor device. 13. The method of claim 12, wherein the second response includes the second receipt. 14. The method of claim 1, wherein the payment request includes a fifth symmetric-key mutating identifier for the vendor device. 15. The method of claim 14, wherein the second response includes the fifth symmetric-key mutating identifier. 16. The method of claim 1, wherein second response includes at least one of an approved message and a declined message for the vendor device. 17. The method of claim 1, wherein the payment request includes a third receipt for the payment authenticator device. 18. The method of claim 1, wherein the payment request includes a sixth symmetric-key mutating identifier for the payment authenticator device. 19. The method of claim 1, further comprising transferring funds from a first account to a second account if the payment authenticator device approves the payment request. 20. The method of claim 1, further comprising providing an escrow service if the payment authenticator device approves the payment request.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.