A practical method and system for supplementing or replacing current
security protocols used on public networks involving the distribution of a
proprietary system for use on a public network access provider's network.
The proprietary system includes processing hardware and proprietary
software. The proprietary system transmits private data, outside the
internet, over proprietary lines to a back-end process. When a "sender"
sends private data it is sent over the proprietary system to a back-end
process. The back-end process returns a time sensitive token which the
"sender" sends to the "receiver". The "receiver" takes the time sensitive
token and uses it to either retrieve the private data, over a proprietary
system, or initiate a transaction with a financial institution. Encryption
is used to allow authentication of the participants. This method can be
used in conjunction with Secure Socket Layer (SSL) encryption and/or the
Secure Electronic Transaction (SET) protocol.