Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Telecommunication method for securely exchanging data

Active Publication Date: 2016-05-05
SAP AG
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent describes a method where a telecommunications device can securely send unencrypted data to a server without storing it on the device. The server provides more confidence that the data is authentic, preventing malicious software from being installed on the device. The data is only accessible for a set amount of time to prevent it from being stolen. The method also allows for the deletion of the unencrypted data to provide higher security. Overall, this invention enhances data security and prevents data from being compromised.

Problems solved by technology

It is not safe to store this information on the telecommunications device its self, because it can be stolen.
Likewise it is inconvenient for the user to always enter data into their telecommunications device when completing a transaction or using a secure website.
These devices typically have touch screens, and it can be time consuming to enter the same data for similar transactions which are repeatedly performed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Telecommunication method for securely exchanging data
  • Telecommunication method for securely exchanging data
  • Telecommunication method for securely exchanging data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048]Like numbered elements in these figures are either equivalent elements or perform the same function. Elements which have been discussed previously will not necessarily be discussed in later figures if the function is equivalent.

[0049]FIG. 1 shows an example of a telecommunications system. The system comprises a telecommunications device 100 which is connected via a wireless telecommunications connection 102 to a base station 104. For instance the telecommunications device could be a mobile telephone or a smart phone. The base station 104 is connected via a wired network connection 106 to a first server 108 and a second server 110. The first server 108 and the second server 110 may be computer processing devices for computer systems.

[0050]The telecommunications device 100 is shown as comprising a transceiver 112, a processor 114 and a battery 120, storage 118, and memory 120. The storage 118 is shown as containing unencrypted data 122, an encryption key 124, an order request 12...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides for a telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer system via a digital cellular wireless telecommunications network, wherein the telecommunications device is a battery powered mobile end user telecommunications device, wherein the method comprises the steps of: encrypting the unencrypted data using a first encryption algorithm into first encrypted data, sending the first encrypted data to a second server computer system via a first network connection of the digital cellular wireless telecommunications network, storing the first encrypted data by the second server computer system, sending an order request to the first server computer system via a second network connection of the digital cellular wireless telecommunications network by the telecommunications device, sending a data publishing request to the second server computer system, generating a cryptographic key pair, sending the first encrypted data, the public key, and the private key to the telecommunications device, decrypting the first encrypted data into the unencrypted data, encrypting the unencrypted data into second encrypted data using the public key, sending the second encrypted data to the second, generating a web service for providing the second encrypted data via an URL, sending the URL to the telecommunications device, sending the URL and the private key, requesting the second encrypted data from the second server computer system, sending the second encrypted data to the first server computer system by the second server computer system using the wired network connection, decrypting the second encrypted data by the first server computer system into the unencrypted data, and combining the order request with the unencrypted data.

Description

BACKGROUND OF THE DISCLOSURE[0001]1. Field of the Disclosure[0002]The invention relates to the exchange of data securely, in particular to the exchange of data using a digital cellular wireless communications network.[0003]2. Description of the Related Art[0004]An increasing number of people are exchanging sensitive data using telecommunication devices over digital cellular wireless communication networks. It is not safe to store this information on the telecommunications device its self, because it can be stolen. Likewise it is inconvenient for the user to always enter data into their telecommunications device when completing a transaction or using a secure website. These devices typically have touch screens, and it can be time consuming to enter the same data for similar transactions which are repeatedly performed.SUMMARY OF THE PRESENT DISCLOSURE[0005]The invention provides for a method and a server in the independent claims. Embodiments are given in the dependent claims.[0006]As...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/04
CPCH04L63/0428H04W12/04H04L63/061H04L63/168H04L2463/102H04W12/033
Inventor LIN, WEI
Owner SAP AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products