Data processing: financial – business practice – management – or co – Business processing using cryptography – Secure transaction
Reexamination Certificate
2003-05-29
2009-02-10
Fischer, Andrew J. (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Secure transaction
C705S079000, C713S180000
Reexamination Certificate
active
07490069
ABSTRACT:
The present invention relates to a method for verifying an anonymous payment by a defined party in a communication system providing a public key infrastructure. The method comprising the steps of (a) receiving a validation message from a merchant party, the validation message comprising a proof signature produced by a customer party and an encrypted payment message, the proof signature being derived from a customer secret key, a customer certificate, at least one customer attribute, and the encrypted payment message; (b) verifying the validity of the proof signature based on an issuing public key, a verification public key, and the encrypted payment message; (c) decrypting at least part of the encrypted payment message based on a verification secret key corresponding to the verification public key, thereby obtaining a customer information related to the at least one customer attribute. In the event of the validity of the proof signature (d) the obtained customer information is used for initializing the authorization of the payment.
REFERENCES:
patent: 4748668 (1988-05-01), Shamir et al.
patent: 5214702 (1993-05-01), Fischer
patent: 5373558 (1994-12-01), Chaum
patent: 5943424 (1999-08-01), Berger et al.
patent: 6154841 (2000-11-01), Oishi
patent: 7181017 (2007-02-01), Nagel et al.
patent: 7225156 (2007-05-01), Fisher et al.
patent: 7360080 (2008-04-01), Camnisch et al.
patent: 2001/0029496 (2001-10-01), Otto et al.
patent: 2004/0133782 (2004-07-01), Sander et al.
patent: 2005/0065799 (2005-03-01), Dare et al.
patent: 2001-188757 (2001-07-01), None
Macgregor, Rob et al., Secure Electronic Transactions: Credit Card Payment on the Web in Theory and Practice, Jun. 1997, IBM, http://www.redbooks.ibm.com/redbooks/pdfs/sg244978.pdf.
Gleick. A New Approach to Protecting Secrets is Discovered. The New York Times, Feb. 17, 1987 [online], [retrieved on Sep. 8, 2008]. Retrieved from the Internet: <http://query.nytimes.com/gst/fullpage.html?res=9B0DE2D9173AF934A25751C0A961948260>.
Gustavus et al. Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts. Springer-Verlag, 1988 [online], [retrieved on Sep. 8, 2008]. Retrieved from the Internet: <http://www.springerlink.com.content.82dbec4d3mmga4a4/fulltext.pdf>.
Ford and Baum. Secure Electronic Commerce. New Jersey, Prentice Hall PTR, 1997. pp. 173-175. QA76.9.A25F655.
Isao Taniguch, “Introduction to Visual Technologies, Digest of Cryptography Technology”, Nippon Jitsugyo Publishing Co., Sep. 30, 2000, pp. 128-131.
Zenji Katagata, “E-Commerc System Technology”, Fujitec Corporation, May 16 2001, First Edition, pp. 251-253, 810, and 819-823.
Fischer Andrew J.
International Business Machines - Corporation
Kaufman, Esq. Stephen C.
Kucab Jamie
McGinn IP Law Group PLLC
LandOfFree
Anonymous payment with a verification possibility by a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Anonymous payment with a verification possibility by a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Anonymous payment with a verification possibility by a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4131818