Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Business method for secure installation of a credit authorization key on a remote tcpa compliant system

a credit authorization key and remote installation technology, applied in the field of data processing systems, can solve the problems of stealing a large amount of credit cards and losing half of the monetary loss of credit card companies, and achieve the effect of reducing the amount of fraud and being easy to check

Inactive Publication Date: 2003-06-05
LENOVO (SINGAPORE) PTE LTD
View PDF11 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009] An advantage of the present invention is that only one user computer can use the encrypted bundle sent by the credit card company, which will reduce the amount of fraud by useof credit cards in e-commerce transactions. Another advantage of the present invention is that thecertificate can easily be checked against the credit card company's database for revocation. Usingthis type of signature instead of a credit card number precludes someone from charging a creditcard multiple times, and also precludes someone keeping a database of credit card numbers to beexposed to a hacker accessing such numbers.
[0010] The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the

Problems solved by technology

However, creditcard theft is abundant, and according to some reports, accounts for half of the monetary loss ofthe credit card companies.
However, the problem with a smartcard is one ofexpense, since use of a smartcard requires a smartcard reader to be installed on the user'scomputer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business method for secure installation of a credit authorization key on a remote tcpa compliant system
  • Business method for secure installation of a credit authorization key on a remote tcpa compliant system
  • Business method for secure installation of a credit authorization key on a remote tcpa compliant system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In the following description, numerous specific details are set forth such as encryption methods or key lengths, etc. to provide a thorough understanding of the present invention. However, it will be obvious to those skilled in the art that the present invention may be practicedwithout such specific details. In other instances, well-known circuits have been shown in blockdiagram form in order not to obscure the present invention in unnecessary detail. For the mostpart, details concerning timing considerations and the like have been omitted in as much as suchdetails are not necessary to obtain a complete understanding of the present invention and arewithin the skills of persons of ordinary skill in the relevant art.

[0017] Referring to FIGURE 3, there is illustrated a configuration of a network 300 in accordance with the present invention where a user (customer) computer 301 applies for a creditcard authorization from a credit card company server 302 over the Internet 303.

[0018...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Abstract of the Disclosure A business method employing hardware complaint to the Trusted Computing Platform Alliance (TCPA) Specification is implemented to allow a credit card company to remotely install a credit card private key into a TCPA module to create a Trusted Platform Module (TPM). More specifically, when a credit worthy user applies for a credit card, the user will send the credit card company a public portion of a "non-migratable storage key," which is accredited a TPM endorsed by a Certification Authority. The credit card company will create its own public / private key pair according to the TCPA Specification, to create a TCPA header, and wrap the full structure by encrypting it with the public portion of the TCPA non-migratable storage key. The credit card company then sends by email the encrypted bundle with a certificate for it, and sends a corresponding pass phrase by regular mail.

Description

Cross Reference to Related Applications[0001] This application is a continuation-in-part of application Serial No. 09 / 851956 entitled System andMethod for Installing a Remote Credit Card Authorization on a System with a TCPA ComplaintChipset.Technical Field[0002] The present invention relates in general to data processing systems, and in particular, toenabling secure communications over data processing networks.Background Information[0003] The Internet provides a new arena for electronic commerce in which credit card companies are very interested. Quite naturally, since "commerce" is a necessary part ofe-commerce, it stands to note that providing for the transfer of funds and credit duringe-commerce transactions bodes well for those credit card companies that can securely provide forsuch transactions. One of the main concerns that continues with respect to e-commerce is thelack of trust that the consuming public has in the security of such transactions to protect theircredit card an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/10G06Q20/12G06Q20/24G06Q20/34G06Q20/38G06Q30/06G07F7/02G07F7/10
CPCG06Q20/10G07F7/1016G06Q20/105G06Q20/12G06Q20/24G06Q20/342G06Q20/3552G06Q20/3558G06Q20/3821G06Q20/38215G06Q30/0609G06Q40/025G06Q40/04G07F7/025G07F7/1008G06Q20/102G06Q40/03
Inventor CHALLENER , DAVID CARROLL
Owner LENOVO (SINGAPORE) PTE LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products