« PreviousContinue »
Related U.S. Application Data
Continuation of application No. 09/792,224, filed on Feb. 23,2001, which is a continuation-in-part of application No. 09/668,213, filed on Sep. 22,2000, which is a continuation-in-part of application No. 09/523,825, filed on Mar. 13,2000, now Pat. No. 6,175,922, which is a continuation-in-part of application No. 09/067, 176, filed on Apr. 27, 1998, now Pat. No. 6,282,656, which is a continuation of application No. 08/759,555, filed on Dec. 4, 1996, now Pat. No. 5,917,913.
(56) References Cited
U.S. PATENT DOCUMENTS 4,701,601 A 10/1987 Francini et al.
(Continued) FOREIGN PATENT DOCUMENTS AU 2000/77342 4/2001
Haber, et al. "Secure Names for Bitstrings" Proceedings of the 4th ACM Conference on Computer & Communications Security pp. 28-35 (Apr. 1997).
Primary Examiner—Edwyn Labaze
(74) Attorney, Agent, or Firm—Patterson & Sheridan, LLP
The method includes the steps of receiving at the PEAD first digital data representing the transaction request. The PEAD provides information to the user regarding an ability to approve the transaction request. When the transaction request is approved by the user, the PEAD receives second digital data representing the electronic service authorization token. A remote agent server may provide a bridge between the electronic transaction system and the PEAD. In another embodiment, the private key is stored on the portable device, encrypted. The decryption key is stored outside of the device, at a trusted 3rd party location. When the user attempts to make a signature the software sends a request for the decryption key, along with the user's password or pass phrase keyed in at the keyboard of the PDA, smart phone, or cell phone, to a server belonging to the trusted 3rd party.
30 Claims, 20 Drawing Sheets
Brandon, "What you should know about wire-transfer liabilities"
Financial Executive, v6 pp. 39(5), Nov.-Dec. 1990.
Carol H. Fancher "In your pocket smartcards, Electronic Payments"
IEEE Spectrum, Feb. 1997 Motorola Inc., pp. 47-53.
Price, Wyn L. "The NPL Intelligent Token and its Application"
Krivachy, T "The Chipcard—An Identification Card with Cryptographic Protection" Eurocrypt '85.
Schaumeller-Bichi, "IC-Card in High Security Applications" Eurocrypt '87.
Noor, Arshad "PGP: Pretty Good Privacy" Unix Review Journal vl3n2 pp. 31-38 Feb. 1995.
Fung, et al. "Protection of Keys agains Modification Attack" IEEE 2001 pp. 26-36.
US. Office Action. U.S. Appl. No. 09/792,224. Dated Oct. 15, 2008. * cited by examiner