Embedding cloud-based functionalities in a communication device
First Claim
Patent Images
1. A portable communication device comprising:
- a processor device;
a contactless transceiver coupled to the processor device;
a memory including multiple memory regions and storing a first application and an application agent, wherein the multiple memory regions comprising a first memory region and a second memory region,wherein the application agent receives, from the application executing in the first memory region, a cryptogram key generated by a remote computer, stores the cryptogram key in the second memory region, receives a request to conduct a transaction from the application, generates a transaction cryptogram using the cryptogram key, accesses the contactless transceiver, and transmits the transaction cryptogram to an access device via the contactless transceiver, andwherein the application agent sends a replenishment request for a second cryptogram key to the first application, the replenishment request including transaction log information derived from a transaction log stored in the second memory region, receives the second cryptogram key from the first application when the transaction log information in the replenishment request matches transaction log information at the remote computer, and stores the second cryptogram key in the second memory region.
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques for enhancing the security of a communication device may include providing an application agent and a transaction application that executes on a communication device. The application agent may receive, from the application, a cryptogram key generated by a remote computer, and store the cryptogram key on the communication device. When the application agent receives a request to conduct a transaction from the application, the application agent may generate a transaction cryptogram using the cryptogram key, and provides the transaction cryptogram to an access device.
-
Citations
20 Claims
-
1. A portable communication device comprising:
-
a processor device; a contactless transceiver coupled to the processor device; a memory including multiple memory regions and storing a first application and an application agent, wherein the multiple memory regions comprising a first memory region and a second memory region, wherein the application agent receives, from the application executing in the first memory region, a cryptogram key generated by a remote computer, stores the cryptogram key in the second memory region, receives a request to conduct a transaction from the application, generates a transaction cryptogram using the cryptogram key, accesses the contactless transceiver, and transmits the transaction cryptogram to an access device via the contactless transceiver, and wherein the application agent sends a replenishment request for a second cryptogram key to the first application, the replenishment request including transaction log information derived from a transaction log stored in the second memory region, receives the second cryptogram key from the first application when the transaction log information in the replenishment request matches transaction log information at the remote computer, and stores the second cryptogram key in the second memory region. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for enhancing security of a portable communication device, the method comprising:
-
receiving, from a remote computer by an application installed on a first memory region of the portable communication device, a cryptogram key; sending, by the application, the cryptogram key to an application agent installed on a second memory region of the portable communication device; receiving, by the application, a request to conduct a transaction; sending, by, the application, the request to conduct the transaction to the application agent, wherein the application agent generates a transaction cryptogram using the cryptogram key, and accesses a contactless interface of the portable communication device to transmit the transaction cryptogram to an access device to conduct the transaction; receiving, from the application agent, a replenishment request for a second cryptogram key, the replenishment request including transaction log information derived from a transaction log stored in second memory region; sending, by, the application, the replenish request to the remote computer; receiving, by the application, the second cryptogram key from the remote computer when the transaction log information in the replenishment request matches transaction log information at the remote computer; sending, by, the application, the second cryptogram key to the application agent for storage. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method for enhancing security of a portable communication device, the method comprising:
-
receiving, by an application agent installed on a second memory region of the portable communication device, a cryptogram key from an application installed on a first memory region of the portable communication device, the cryptogram key provided to the application from a remote computer; storing, by the application agent, the cryptogram key; receiving, by the application agent, a request to conduct a transaction from the application; generating, by the application agent executing in the second memory region, a transaction cryptogram using the cryptogram key; accessing a contactless interface of the portable communication device to transmit the transaction cryptogram to an access device to conduct the transaction; sending a replenishment request for a second cryptogram key, the replenishment request including transaction log information derived from a transaction log stored in second memory region; receiving the second cryptogram key when the transaction log information in the replenishment request matches transaction log information at the remote computer; and storing the second cryptogram key in the second memory region. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification