| CPC G06F 21/6209 (2013.01) [G06F 21/35 (2013.01); G06F 21/602 (2013.01)] | 16 Claims |

|
1. A computer-implemented method, comprising:
receiving, at a host server from a user device, a public key, a user identifier, and a first request identifier, the first request identifier generated by the user device utilizing details of an interaction between a near-field communication (NFC) terminal and the user device;
receiving, at the host server from a third-party server, a public key request that includes a second request identifier, the second request identifier generated by the third-party server utilizing the details of the interaction; comparing, by the host server, the first request identifier to the second request identifier; transmitting, by the host server, the public key to the third-party server in response to determining a match between the first request identifier and the second request identifier; receiving, at the host server from the third-party server, an encrypted document and the second request identifier, the encrypted document being encrypted utilizing the public key;
and transmitting, by the host server, the encrypted document to the user device based at least in part on the user identifier, wherein the user device is configured to: receive the encrypted document from the host; decrypt the encrypted document to obtain a decrypted document utilizing a private key corresponding to the public key; and present the decrypted document on a user interface of the user device, wherein the host server does not have access to the private key corresponding to the public key, and wherein the host server is unable to decrypt the encrypted document.
|