Abstract
An apparatus, system and method for establishing a transaction between first and second parties including a first signing step in which a transaction message including a request and a transaction identifier is cryptographically signed by the first party to form a first cryptographically signed message. The first signed message is transmitted from the first party to the second party. The second party then cryptographically signs the first message to form a second cryptographically signed message. The second message is also transmitted from one or more of a plurality of parties having the second message to a trusted third party. The trusted third party is able to verify that the second message was cryptographically signed by the second party and can also verify that the first message in the second message was cryptographically signed by the first party.
Claims
-
A machine-implemented method for establishing a transaction between a first party and a second party, the method comprising:
a first signing step in which a transaction message comprising a request and a transaction identifier is cryptographically signed by said first party to form a first cryptographically signed message;
a first transmitting step in which said first cryptographically signed message is transmitted from said first party to said second party;
a second signing step in which said second party cryptographically signs said first cryptographically signed message to form a second cryptographically signed message;
a third transmitting step in which said second cryptographically signed message is transmitted from one or more of a plurality of parties having said second cryptographically signed message to a trusted third party;
a first verification step in which said trusted third party verifies that said second cryptographically signed message was cryptographically signed by said second party;
a second verification step in which said trusted third party verifies that said first cryptographically signed message in said second cryptographically signed message was cryptographically signed by said first party; and
a transaction execution step in which, in response to positive verifications from said first verification step and said second verification step, said trusted third party manages execution of said request specified by said second cryptographically signed message.
-
A method according to claim 1, further comprising:
a second transmitting step in which said second cryptographically signed message is transmitted from said second party to said first party.
-
A method according to claim 1, further comprising:
a first presence detecting step in which a physical presence of a first authorised user is detected by said first party prior to said first signing step.
-
A method according to claim 1, further comprising:
a second presence detecting step in which a physical presence of a second authorised user is detected by said second party prior to said second signing step.
-
A method according to claim 1, wherein
said plurality of parties are respective independent sources for a plurality of routes for said second cryptographically signed message to reach said trusted third party.
- A method according to claim 1, wherein said transaction execution step takes place in dependence on a predetermined condition being met.
- A method according to claim 1, wherein said third transmitting step is performed by at least one of said first party and said second party.
- A method as claimed in claim 1, wherein at least one of said first party and said second party provide to said trusted third party additional information separate from said second cryptographically signed message to further specify said transaction.
- A method as claimed in claim 1, wherein said execution of said transaction is performed as an atomic operation.
- A method as claimed in claim 9, wherein said atomic operation is performed using a two-phase commit protocol.
- A method as claimed in claim 1, wherein said transaction is transfer of a monetary amount between said first party and said second party.
-
A method according to claim 1, wherein
said transaction message comprises a payload.
-
A method according to claim 12, wherein
said payload comprises encrypted data; and
said trusted third party stores a decrypting means for decrypting said encrypted data.
-
A method according to claim 13, further comprising:
a resolution step in which said decrypting means is transmitted to said second party by said trusted third party in response to positive verifications from said first verification step and said second verification step.
-
A method according to claim 1, wherein
said transaction identifier is generated using a random or pseudo-random number generator.
-
A method according to claim 1, wherein
said first cryptographically signed message comprises a unique identifier for said first party.
-
A method according to claim 16, wherein
said unique identifier for said first party is selected by said first party from a first plurality of unique identifiers.
-
A method according to claim 1, wherein
said second cryptographically signed message comprises a unique identifier for said second party.
-
A method according to claim 18, wherein
said unique identifier for said second party is selected by said second party from a second plurality of unique identifiers.
-
A method according to claim 1, wherein
said second party verifies that said first cryptographically signed message was cryptographically signed by said first party.
-
A method according to claim 2, wherein
said first party verifies that said second cryptographically signed message was cryptographically signed by said second party.
-
A method according to claim 1, further comprising:
a witnessing step in which a witness receives said second cryptographically signed message and cryptographically signs said second cryptographically signed message to form a third cryptographically signed message; and
a witness verification step in which said trusted third party verifies that said third cryptographically signed message was cryptographically signed by said witness,
wherein said second cryptographically signed message is transmitted to said third trusted party as part of said third cryptographically signed message.
- A method as claimed in claim 22, wherein said witness is one of said plurality of parties and transmits said third cryptographically signed message to said trusted third party.
-
A method according to claim 1, wherein
said first signing step uses a first private key from a first public/private key pair; and
said second signing step uses a second private key from a second public/private key pair
said first verification step uses a first public key from said first public/private key pair; and
said second verification step uses a second public key from said second public/private key pair.
-
A system for establishing a transaction comprising:
a first party comprising:
first signing circuitry configured to cryptographically sign a transaction message comprising a request and a transaction identifier to form a first cryptographically signed message; and
first transmitting circuitry configured to transmit said first cryptographically signed message to a second party;
said second party comprising:
second signing circuitry configured to cryptographically sign said first cryptographically signed message to form a second cryptographically signed message; and
a trusted third party comprising:
receiving circuitry configured to receive said second cryptographically signed message transmitted from one or more of a plurality of parties having said second cryptographically signed message to said trusted third party;
first verification circuitry configured to verify that said second cryptographically signed message was cryptographically signed by said second party; and
second verification circuitry configured to verify that said first cryptographically signed message in said second cryptographically signed message was cryptographically signed by said first party
transaction executing circuitry configured to execute said request specified by said second cryptographically signed message in response to positive verifications from said first verification circuitry and second verification circuitry.
-
An apparatus for establishing a transaction with a second party comprising:
signing circuitry configured to cryptographically sign a transaction message comprising a request and a transaction identifier to form a first cryptographically signed message; and
first transmitting circuitry configured to transmit said first cryptographically signed message to said second party;
receiving circuitry configured to receive a second cryptographically signed message, said second cryptographically signed message comprising said first cryptographically signed message, wherein said second cryptographically signed message is cryptographically signed by said second party; and
second transmitting circuitry configured to transmit said second cryptographically signed message to a trusted third party.
-
An apparatus for establishing a transaction with a first party comprising:
receiving circuitry configured to receive a first cryptographically signed message, said first cryptographically signed message comprising a request and a transaction identifier, wherein said first cryptographically signed message is cryptographically signed by said first party;
signing circuitry configured to cryptographically sign said first cryptographically signed message to form a second cryptographically signed message; and
second transmitting circuitry configured to transmit said second cryptographically signed message to a trusted third party.
-
An apparatus for verifying validity of a transaction between a first party and a second party comprising:
receiving circuitry configured to receive a second cryptographically signed message comprising a first cryptographically signed message comprising a request and a transaction identifier;
first verification circuitry configured to verify that said second cryptographically signed message is cryptographically signed by said second party; and
second verification circuitry configured to verify that said first cryptographically signed message in said second cryptographically signed message is cryptographically signed by said first party;
transaction executing circuitry configured to execute said request specified by said second cryptographically signed message in response to positive verifications from said first verification circuitry and second verification circuitry.
Owners (US)
-
Arm Ip Limited
(Dec 20 2013)
Explore more patents:
-
Arm Tdo Limited
(Oct 08 2013)
Explore more patents:
Applicants
-
Arm Ip Ltd
Explore more patents:
Inventors
-
Vincent Hugo John Martin
Explore more patents:
-
Flautner Krisztian
Explore more patents:
-
Phillips Amyas Edward Wykes
Explore more patents:
CPC Classifications
-
G06Q20/38215
Explore more patents:
-
G06Q30/06
Explore more patents:
IPC Classifications
-
G06Q20/38
Explore more patents:
US Classifications
-
705/76
Explore more patents:
Document Preview
- Publication: Feb 19, 2015
-
Application:
Aug 16, 2013
US 201313968733 A
-
Priority:
Aug 16, 2013
US 201313968733 A