1. Technical Field
The embodiments herein generally relate to a field of electronic transaction. The embodiments herein particularly relate to a dongle device for an electronic transaction and more particularly relates to dongle device with a tamper proof characteristic for a secure electronic transaction.
2. Description of the Related Art
Currently, there are hundreds of magnetic stripe readers/swipers on the market. All of them are at least as long as the credit card itself. There are different types of card readers/swipers exist in the market. One of the types is a traditional card swiper with a single rail, which allows a card to be held against a base of the reader by a user and moved across a read head of the reader. Another type of a card reader guides a card by a two sets of rails and a backstop. When the user has inserted the card against the backstop, the card is read as it is removed from the swiper. The magnetic stripe cards having the standard specifications can typically be read by the point-of-sale devices at a merchant location. When the card is swiped through an electronic card reader at a checkout counter in a merchant store, the reader usually uses a built-in modem to dial a number of a company that handles the credit authentication requests. After an account is verified, an approval signal is sent back to the merchant to complete a transaction.
The conventional swipe device using the magnetic card readers for an electronic payment is bulky. Further the merchant has to produce the printed receipts for the customer, which is very cumbersome for the merchant handling the multiple customers. Also the merchant has to keep a record of all the printed receipts, to avoid a dispute about the transactions. It is advantageous for an individual to make a payment to another individual or merchant by swiping his magnetic stripe card through a reader connected to a mobile device. The mobile device should include a communication medium such as GPRS, WiFi, Bluetooth, etc., to transmit the card data to the server. Further the mobile device should be carried everywhere.
At present, there were huge developments in providing the card reader for a mobile device. In the currently available systems, a portable swipe machine is provided for mobile devices and the card data is encrypted on the mobile device. Hence there is a chance of an insecure transaction over the mobile device. Further the existing systems communicate the relevant data through the electrical signals, which are extremely slow compared to the electromagnetic signals. In the current scenario, the communication is always performed on an IP network, since the IP networks are wide spread. Further the existing devices work only with the high end devices such as iPhone, iPad or any other smart phone, thereby making the system very costly for the prospective users. Further the swipe machines used presently are active devices, where the machines need to be charged with an external power supply or through a connected device.
In view of the above facts, there is a need for a secure electronic transaction. There is also a need for a system and method for providing a secure electronic transaction in a cost effective manner. Further there is a need for a system and method to enable a fast, efficient and secure electronic transaction by using a dongle device. Yet there is a need for a system and method to utilize the fast and efficient IP communication, thereby reducing the need for the use of electrical signal.
The above mentioned shortcomings, disadvantages and problems are addressed herein and which will be understood by reading and studying the following specification.
The primary object of the embodiments herein is to provide a dongle device for a secure electronic transaction.
Another object of the embodiments herein is to provide a dongle device with tamper proof characteristics for a secure electronic transaction.
Yet another object of the embodiments herein is to provide a dongle device with a security mesh to prevent a drilling to avoid a tampering of key board.
Yet another object of the embodiments herein is to provide a method to transform a card data into a token data and to transmit the token data without sending the card data from a computing device to a server.
Yet another object of the embodiments herein is to provide a method for converting the card data into audio data at supersonic frequencies.
Yet another object of the embodiments herein is to provide a method for converting the card data into noise like signals i.e. spread spectrum signals.
Yet another object of the embodiments herein is to provide a method and system for mutually authenticating the dongle device and the payment server.
These and other objects and advantages of the embodiments herein will become readily apparent from the following detailed description taken in conjunction with the accompanying drawings.
The various embodiments herein provide a dongle device with tamper proof characteristics for a secure electronic transaction. The dongle device comprises a housing which includes a first half and a second half. A main circuit board is placed in the first half and a secondary circuit board placed is the second half. The housing further includes a slot for swiping a magnetic stripe card, a slot for inserting a contact type card, a communication module, a key pad, a connector, a cover for safeguarding the connector, a stylus, a universal serial bus (USB) port, a processor and a display. The processor continuously monitors a connection between the main circuit board and the secondary circuit board and detects a tampering of the compressible connector between the main circuit board and the secondary circuit board. The processor kills the dongle device when the processor detects a tampering of the compressible connector between the main circuit board and the secondary circuit board. The first half and the second half of the dongle device are ultrasonically sealed together. The main circuit board and the secondary circuit board are electrically and electronically connected through a compressible connector. The connector is an audio jack.
According to an embodiment herein, the processor kills the device by destroying all the keys used for encryption and making the dongle device non operative, when a tampering of the dongle device is detected.
According to an embodiment herein, the processor kills the device by destroying a public key used for generating all the keys employed for an encryption and making the dongle device non operative, when a tampering of the dongle device is detected.
According to an embodiment herein, the dongle device further comprises a tamper detection circuit connected to the processor to detect a tampering of the compressible connector between the main circuit board and the secondary circuit board.
According to an embodiment herein, the dongle device further comprises a battery to supply an electrical power to the tamper detection circuit, when an external power supply to the dongle device is disconnected.
According to an embodiment herein, the secondary board of the dongle device includes four layers. The four layers are a first layer, a second layer, a third layer and a fourth layer.
According to an embodiment herein, the first layer of the secondary board includes NFC antenna and LED.
According to an embodiment herein, the second layer of the dongle device includes a capsense electrode layer. The capsense electrode layer is formed right under the keypad. The capsense electrode layer is formed in a form of a mesh.
According to an embodiment herein, the third layer of the secondary board includes a security mesh to prevent a drilling to avoid a tampering of the key board.
According to an embodiment herein, the fourth layer of the secondary board includes a plurality of resistors to form a resistor ladder to detect a tampering of the security mesh.
According to an embodiment herein, the security mesh of the dongle device has a plurality of patterns.
According to an embodiment herein, the security mesh provided at each cap sense electrode has a different pattern.
According to an embodiment herein, the pattern of the security mesh provided at each cap sense electrode is randomly selected at a time of manufacture. The pattern of the security mesh is provided at each capsense electrode at the time of manufacture is not known to a manufacturer.
According to an embodiment herein, the tamper detection circuit of the dongle device includes an input resistor and an output resistor connected at the two ends of each cap sense electrode.
According to an embodiment herein, the tamper detection circuit of the dongle device compares a voltage across the input resistor and a voltage across the output resistor to detect a tampering of the cap sense electrode.
According to an embodiment herein, a value of the input resistor and a value of the output resistor are set at the time of manufacture and the value of the input resistor and a value of the output resistor are not known for a manufacturer.
According to an embodiment herein, the value of the input resistor and a value of the output resistor are calibrated during a first use.
According to an embodiment herein, the dongle device comprises a magnetic card reader, a contact type card reader and a NFC reader.
According to an embodiment herein, a magnetic card reader or a contact type card reader or the NFC reader is activated accordingly when a magnetic card is inserted through the slot for inserting a magnetic stripe card or when a contact type card is inserted through the slot for inserting a contact type card or when a NFC card is tapped.
According to an embodiment herein, the connector of the dongle device comprises a power module, a line detector module and a line for establishing a bi-directional data communication.
According to an embodiment herein, a card is read and the card data are transmitted through supersonic frequencies to a payment gateway server.
The various embodiments herein provide a method for a secure electronic transaction using a dongle device. The method comprises the steps of logging in by a merchant into a client application installed on a computing device, inserting a card onto a dongle device, tracking a status of a card inserted, reading a card data on the dongle device, extracting a public key burnt on a flash of the dongle device, processing the card data by a processor for producing a cipher data, representing the cipher data and a PIN data as an audio signal, transmitting the cipher data and the PIN data to a mobile device through an audio jack of the mobile device, collecting a transaction information through a graphical user interface (GUI), collecting a part of a card number from the merchant, constructing a hash value out of the cipher data, transmitting the hash value along with the transaction information to a production server through a first communication network, processing the cipher data and the PIN data in a payment server of the production server, sending a transaction request to a third party system to perform an electronic transaction, transmitting a transaction information to the third party system through a second communication network, performing the electronic transaction by the third party system and indicating a transaction status.
According to an embodiment herein, the data communicated between the mobile device and the dongle is in a form of acoustic signals or audio tones.
According to an embodiment herein, the transaction information collected through the graphical user interface GUI is provided by the client application.
According to an embodiment herein, the hash value is collected out of the cipher data by using a hash algorithm. The hash algorithm is provided in the client application which is run on a mobile device. The hash algorithm is exchanged and stored between the mobile device and the payment server for a first time.
According to an embodiment herein, the transaction status is indicated by an audio tone or a colored light. The transaction status is one of a bad transaction and a good transaction.
According to an embodiment herein, the step processing the card data by a processor for producing a cipher data comprises generating a random number for avoiding a replay attack, decoding the swipe data by a comparator, converting the swipe data into a card data by a converter, tokenization of the card data by a tokenizer by Xoring the card data with a dongle ID, encrypting the card data into a cipher data by an encryption engine using a RSA algorithm, and wherein a public key is used in RSA algorithm for encrypting the card data and modulating the cipher data by a modulation engine using Frequency Shift Keying (FSK).
According to an embodiment herein, the dongle ID is a unique and secret ID related to the dongle.
According to an embodiment herein, the step of processing the cipher data in a payment server of the production server comprises decoding the hash value by a decoder of the payment server for producing the cipher data, decrypting the cipher data by a decryption engine of the payment server using a private key, retrieving a merchant information stored in a payment database of the production server, reproducing a complete card number by stitching a part of the card number entered by the merchant with a card data received from the dongle and authenticating the merchant.
According to an embodiment herein, the step of representing the cipher data as an audio signal comprises filtering the cipher data by a low pass filter and dividing a voltage of cipher data for producing amplitude for the audio signal.
According to an embodiment herein, the step of constructing the hash value out of the encrypted data by the hash function of the client application running on the mobile phone involves creating a date/time stamp.
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises sending an electronic receipt to the customer through a short message service (SMS) or an e-mail.
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises recording a transaction status by a counter of the microchip.
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises measuring a voltage level of a battery of the dongle by an analog-to-digital convertor (ADC) of the microprocessor, sending a measured voltage level along with the transaction data to the production server, collating a reading of the battery by the payment server, computing a remaining voltage level in the battery by the payment server and sending an information corresponding to the remaining voltage level in the battery to a user.
According to an embodiment herein, the transaction information includes an amount of the transaction, a unique PIN data of the card entered by the card holder, an additional data related to the transaction and a signature of a card holder.
According to an embodiment herein, the unique PIN data is any one of a scrambled PIN data or a PIN block or a onetime password (OTP).
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises an updating of the public key by inserting a non financial card on the dongle device, reading a swipe data by a reader head of the dongle device, extracting a public key from the card data and updating the public key associated with the dongle device.
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises mapping a merchant ID, a terminal ID, a user ID, an IMEI number of computing device, a serial number of the dongle device with a dongle ID for executing a secure electronic transaction.
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises mapping a dongle ID, a serial number of the dongle with IMEI number of a mobile phone for executing a secure electronic transaction.
According to an embodiment herein, the public key is burned into the dongle at a manufacturing time.
According to an embodiment herein, the dongle device generates a session key and a secret key at the beginning of the transaction. The secret key is used for authenticating the payment server. The session key and the secret key are encrypted by the public key and sent to the payment server.
According to an embodiment herein, the payment server further comprises a private key. The private key decrypts the secret key sent by the dongle device and sends back the decrypted secret key to the dongle for mutually authenticating the dongle device and the payment server.
According to an embodiment herein, the dongle device further comprises a NFC tag. The NFC tag of the dongle device includes a unique ID and a physical unclonable function (PUF).
According to an embodiment herein, the merchant device comprises a NFC tag. The NFC tag of the merchant device authenticates the dongle device by verifying the unique ID of the dongle NFC tag.
According to an embodiment herein, a card data is sent alone as an audio signal after tokenization and encryption.
These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing from the spirit thereof, and the embodiments herein include all such modifications.
The other objects, features and advantages will occur to those skilled in the art from the following description of the preferred embodiment and the accompanying drawings in which:
Although the specific features of the embodiments herein are shown in some drawings and not in others. This is done for convenience only as each feature may be combined with any or all of the other features in accordance with the embodiments herein.
In the following detailed description, a reference is made to the accompanying drawings that form a part hereof, and in which the specific embodiments that may be practiced is shown by way of illustration. These embodiments are described in sufficient detail to enable those skilled in the art to practice the embodiments and it is to be understood that the logical, mechanical and other changes may be made without departing from the scope of the embodiments. The following detailed description is therefore not to be taken in a limiting sense.
The various embodiments herein provide a dongle device with tamper proof characteristics for a secure electronic transaction. The dongle device comprises a housing which includes a first half and a second half. A main circuit board is placed in the first half and a secondary circuit board placed is the second half. The housing further includes a slot for swiping a magnetic stripe card, a slot for inserting a contact type card, a communication module, a key pad, a connector, a cover for safeguarding the connector, a stylus, a universal serial bus (USB) port, a processor and a display. The processor continuously monitors a connection between the main circuit board and the secondary circuit board and detects a tampering of the compressible connector between the main circuit board and the secondary circuit board. The processor kills the dongle device when the processor detects a tampering of the compressible connector between the main circuit board and the secondary circuit board. The first half and the second half of the dongle device are ultrasonically sealed together. The main circuit board and the secondary circuit board are electrically and electronically connected through a compressible connector. The connector is an audio jack.
According to an embodiment herein, the processor kills the device by destroying all the keys used for encryption and making the dongle device non operative, when a tampering of the dangle device is detected.
According to an embodiment herein, the processor kills the device by destroying a public key used for generating all the keys employed for an encryption and making the dongle device non operative, when a tampering of the dongle device is detected.
According to an embodiment herein, the dongle device further comprises a tamper detection circuit connected to the processor to detect a tampering of the compressible connector between the main circuit board and the secondary circuit board.
According to an embodiment herein, the dongle device further comprises a battery to supply an electrical power to the tamper detection circuit, when an external power supply to the dongle device is disconnected.
According to an embodiment herein, the secondary board of the dongle device includes four layers. The four layers are a first layer, a second layer, a third layer and a fourth layer.
According to an embodiment herein, the first layer of the secondary board includes NFC antenna and LED.
According to an embodiment herein, the second layer of the dongle device includes a capsense electrode layer. The capsense electrode layer is formed right under the keypad. The capsense electrode layer is formed in a form of a mesh.
According to an embodiment herein, the third layer of the secondary board includes a security mesh to prevent a drilling to avoid a tampering of the key board.
According to an embodiment herein, the fourth layer of the secondary board includes a plurality of resistors to form a resistor ladder to detect a tampering of the security mesh.
According to an embodiment herein, the security mesh of the dongle device has a plurality of patterns.
According to an embodiment herein, the security mesh provided at each cap sense electrode has a different pattern.
According to an embodiment herein, the pattern of the security mesh provided at each cap sense electrode is randomly selected at a time of manufacture. The pattern of the security mesh is provided at each capsense electrode at the time of manufacture is not known to a manufacturer.
According to an embodiment herein, the tamper detection circuit of the dongle device includes an input resistor and an output resistor connected at the two ends of each cap sense electrode.
According to an embodiment herein, the tamper detection circuit of the dongle device compares a voltage across the input resistor and a voltage across the output resistor to detect a tampering of the cap sense electrode.
According to an embodiment herein, a value of the input resistor and a value of the output resistor are set at the time of manufacture and the value of the input resistor and a value of the output resistor are not known for a manufacturer.
According to an embodiment herein, the value of the input resistor and a value of the output resistor are calibrated during a first use.
According to an embodiment herein, the dongle device comprises a magnetic card reader, a contact type card reader and a NFC reader.
According to an embodiment herein, a magnetic card reader or a contact type card reader or the NFC reader is activated accordingly when a magnetic card is inserted through the slot for inserting a magnetic stripe card or when a contact type card is inserted through the slot for inserting a contact type card or when a NFC card is tapped.
According to an embodiment herein, the connector of the dongle device comprises a power module, a line detector module and a line for establishing a bi-directional data communication.
According to an embodiment herein, a card is read and the card data are transmitted through supersonic frequencies to a payment gateway server.
The various embodiments herein provide a method for a secure electronic transaction using a dongle device. The method comprises the steps of logging in by a merchant into a client application installed on a computing device, inserting a card onto a dongle device, tracking a status of a card inserted, reading a card data on the dongle device, extracting a public key burnt on a flash of the dongle device, processing the card data by a processor for producing a cipher data, representing the cipher data and a PIN data as an audio signal, transmitting the cipher data and the PIN data to a mobile device through an audio jack of the mobile device, collecting a transaction information through a graphical user interface (GUI), collecting a part of a card number from the merchant, constructing a hash value out of the cipher data, transmitting the hash value along with the transaction information to a production server through a first communication network, processing the cipher data and the PIN data in a payment server of the production server, sending a transaction request to a third party system to perform an electronic transaction, transmitting a transaction information to the third party system through a second communication network, performing the electronic transaction by the third party system and indicating a transaction status.
According to an embodiment herein, the data communicated between the mobile device and the dongle is in a form of acoustic signals or audio tones.
According to an embodiment herein, the transaction information collected through the graphical user interface GUI is provided by the client application.
According to an embodiment herein, the hash value is collected out of the cipher data by using a hash algorithm. The hash algorithm is provided in the client application which is run on a mobile device. The hash algorithm is exchanged and stored between the mobile device and the payment server for a first time.
According to an embodiment herein, the transaction status is indicated by an audio tone or a colored light. The transaction status is one of a bad transaction and a good transaction.
According to an embodiment herein, the step processing the card data by a processor for producing a cipher data comprises generating a random number for avoiding a replay attack, decoding the swipe data by a comparator, converting the swipe data into a card data by a converter, tokenization of the card data by a tokenizer by Xoring the card data with a dongle ID, encrypting the card data into a cipher data by an encryption engine using a RSA algorithm, and wherein a public key is used in RSA algorithm for encrypting the card data and modulating the cipher data by a modulation engine using Frequency Shift Keying (FSK).
According to an embodiment herein, the dongle ID is a unique and secret ID related to the dongle.
According to an embodiment herein, the step of processing the cipher data in a payment server of the production server comprises decoding the hash value by a decoder of the payment server for producing the cipher data, decrypting the cipher data by a decryption engine of the payment server using a private key, retrieving a merchant information stored in a payment database of the production server, reproducing a complete card number by stitching a part of the card number entered by the merchant with a card data received from the dongle and authenticating the merchant.
According to an embodiment herein, the step of representing the cipher data as an audio signal comprises filtering the cipher data by a low pass filter and dividing a voltage of cipher data for producing an amplitude for the audio signal.
According to an embodiment herein, the step of constructing the hash value out of the encrypted data by the hash function of the client application running on the mobile phone involves creating a date/time stamp.
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises sending an electronic receipt to the customer through a short message service (SMS) or an e-mail.
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises recording a transaction status by a counter of the microchip.
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises measuring a voltage level of a battery of the dongle by an analog-to-digital convertor (ADC) of the microprocessor, sending a measured voltage level along with the transaction data to the production server, collating a reading of the battery by the payment server, computing a remaining voltage level in the battery by the payment server and sending an information corresponding to the remaining voltage level in the battery to a user.
According to an embodiment herein, the transaction information includes an amount of the transaction, a unique PIN data of the card entered by the card holder, an additional data related to the transaction and a signature of a card holder.
According to an embodiment herein, the unique PIN data is any one of a scrambled PIN data or a PIN block or a one time password (OTP).
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises an updating of the public key by inserting a non financial card on the dongle device, reading a swipe data by a reader head of the dongle device, extracting a public key from the card data and updating the public key associated with the dongle device.
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises mapping a merchant ID, a terminal ID, a user ID, an IMEI number of computing device, a serial number of the dongle device with a dongle ID for executing a secure electronic transaction.
According to an embodiment herein, the method for a secure electronic transaction using a dongle device further comprises mapping a dongle ID, a serial number of the dongle with IMEI number of a mobile phone for executing a secure electronic transaction.
According to an embodiment herein, the public key is burned into the dongle at a manufacturing time.
According to an embodiment herein, the dongle device generates a session key and a secret key at the beginning of the transaction. The secret key is used for authenticating the payment server. The session key and the secret key are encrypted by the public key and sent to the payment server.
According to an embodiment herein, the payment server further comprises a private key. The private key decrypts the secret key sent by the dongle device and sends back the decrypted secret key to the dongle for mutually authenticating the dongle device and the payment server.
According to an embodiment herein, the dongle device further comprises a NFC tag. The NFC tag of the dongle device includes a unique ID and a physical unclonable function (PUF).
According to an embodiment herein, the merchant device comprises a NFC tag. The NFC tag of the merchant device authenticates the dongle device by verifying the unique ID of the dongle NFC tag.
According to an embodiment herein, a card data is sent alone as an audio signal after tokenization and encryption.
According to an embodiment herein, the dongle device is connected to the computing device (i.e. mobile device) for transmitting a card data to the server. The card data comprises transaction information such as an amount of the transaction, a unique PIN of the card entered by the card holder, an additional data related to the transaction and a signature of a card holder.
The processor stores a dongle ID, a serial number of the dongle device 100 and a public key. The dongle ID and the serial number of the dongle device 100 are paired at a time of manufacturing the dongle device 100. The dongle ID is a unique and secret ID associated with the dongle device 100. The public key is used in RSA algorithm for encrypting the card data.
The user uses his/her card for initiating the electronic transaction by swiping the MSR card or inserting the EMV card or tapping the NFC card in the dongle device 100 and corresponding card reader module is activated for reading the card data. The activation of the card module is showcased by illuminating the indicator 104.
The dongle device 100 further comprises a method for composing a PG message (ISO 8583 or equivalent) and sending it directly through a WLAN or GPRS modem on the dongle device 100. The composed payment gateway message is sent to the mobile device and the mobile device sends it directly to the corresponding payment gateway and also the mobile device sends a parallel message to ezetap server.
According to an embodiment herein, the connector 110 comprises a power module, a line detector module and a line for establishing a bi-directional data communication. Further the connector 110 also provides a mechanical support for the communication modules connected to the dongle device 100.
According to an embodiment herein, the processor of the dongle device 100 is provided with software to convert the card data into audio data at supersonic frequencies.
According to an embodiment herein, the communication module connected to the dongle device 100 through the connector 110 interacts with a payment gateway server for completing a transaction.
According to an embodiment herein, the dongle device 100 is connected to the mobile device and a payment transaction is made through a mobile device connected to the dongle device through the audio jack. Further the audio jack supports a payment transaction during a listening of music by enabling transmission at audible and supersonic frequencies simultaneously. The communication module links a transaction originated in a cloud computing server with a payment gateway server through a mobile device to complete a financial transaction.
According to an embodiment herein, the processor of the dongle device 100 interacts with a ezetap server through a mobile device or with the ezetap server directly. The processor interacts not only with the ezetap server through a mobile device but also with the payment gate way server.
According to an embodiment herein, the audio jack supports both a data transmission and an audio transmission with the mobile device.
According to an embodiment herein, a communication over the audio jack is done through the noise like signals and wherein the noise like signals is spread spectrum signals and wherein the spread spectrum signals are generated using hardware and software.
According to an embodiment herein, the value of the input resistor and a value of the output resistor are calibrated during a first use.
The foregoing description of the specific embodiments herein will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments herein without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation.
Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the appended claims.
Although the embodiments herein are described with various specific embodiments, it will be obvious for a person skilled in the art to practice the invention with modifications. However, all such modifications are deemed to be within the scope of the claims.
It is also to be understood that the following claims are intended to cover all of the generic and specific features of the embodiments described herein and all the statements of the scope of the embodiments which as a matter of language might be said to fall there between.
Number | Date | Country | Kind |
---|---|---|---|
3415/CHE/2011 | Oct 2011 | IN | national |
The present application is a national phase application to the PCT Application entitled, “A DONGLE DEVICE WITH TAMPER PROOF CHARACTERISTICS FOR A SECURE ELECTRONIC TRANSACTION” with serial number PCT/IN 2012/000647, filed at Government of India Patent Office on Sep. 28, 2012, the content of which is incorporated by reference herein. The present application claims the benefit of an Indian Provisional patent application entitled, “SYSTEM AND METHOD FOR SECURE ELECTRONIC TRANSACTION” with serial number 3415/CHE/2011, filed at Government of India Patent Office on Oct. 3, 2011, the content of which is incorporated by reference herein.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IN2012/000647 | 9/28/2012 | WO | 00 | 4/21/2014 |