A practical method and system for supplementing or replacing current security protocols used on public networks involving the distribution of a proprietary system for use on a public network access provider's network. The proprietary system includes processing hardware and proprietary software. The proprietary system transmits private data, outside the internet, over proprietary lines to a back-end process. When a "sender" sends private data it is sent over the proprietary system to a back-end process. The back-end process returns a time sensitive token which the "sender" sends to the "receiver". The "receiver" takes the time sensitive token and uses it to either retrieve the private data, over a proprietary system, or initiate a transaction with a financial institution. Encryption is used to allow authentication of the participants. This method can be used in conjunction with Secure Socket Layer (SSL) encryption and/or the Secure Electronic Transaction (SET) protocol.

 
Web www.patentalert.com

< (none)

< Execution unit and method for using architectural and working register files to reduce operand bypasses

> System, method and article of manufacture for a payment gateway system architecture for processing encrypted payment transactions utilizing a multichannel, extensible, flexible architecture

> (none)

~ 00002