Terminal data encryption
First Claim
Patent Images
1. A method comprising:
- receiving, with one or more servers of a payment processing network, an altered key and an identifier of a point of sale device, the altered key having first cryptographic properties resulting from being formed at least in part by an alteration of an initial key with a public key, the first cryptographic properties including an ability to obtain the initial key by further altering the altered key, the initial key having second cryptographic properties resulting from being generated based at least in part on an initialization interaction between the point of sale device and a first portable consumer device, the second cryptographic properties including the initial key being a terminal-specific symmetric key that is unavailable for interception prior to the initialization interaction, wherein the receiving of the altered key with the one or more servers of the payment processing network inhibits unauthorized interception of the unaltered initial key;
further altering, with the one or more servers, the altered key to obtain the initial key, the further altering of the altered key enabled at least in part by the altered key having been formed at least in part by the alteration of the initial key with the public key;
sending, with the one or more servers, the initial key to a key storage location;
associating the initial key that is stored at the key storage location with the received identifier of the point of sale device;
receiving, with the one or more servers, altered transaction data associated with a plurality of financial transactions that are conducted using the point of sale device;
determining, with the one or more servers, that the altered transaction data was altered with the initial key that is stored at the key storage location based at least in part on the associated identifier of the point of sale device; and
further altering, with the one or more servers, the altered transaction data using the initial key that is stored at the key storage location, the further altering of the altered transaction data enabled at least in part by the initial key having been generated based at least in part on the initialization interaction between the point of sale device and the first portable consumer device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is disclosed. The method includes generating an initial key after interacting with an access device, storing the initial key at a key storage location, altering the initial key with a public key to form an altered key, and sending the altered key to a server computer along with an identifier for the access device. The altered key is changed to the initial key at the server computer and is stored with the identifier in a database in operative communication with the server computer. The initial keys that are stored at the key storage location and in the database are used to alter and restore transaction data associated with multiple financial transactions that are conducted using the access device.
-
Citations
13 Claims
-
1. A method comprising:
-
receiving, with one or more servers of a payment processing network, an altered key and an identifier of a point of sale device, the altered key having first cryptographic properties resulting from being formed at least in part by an alteration of an initial key with a public key, the first cryptographic properties including an ability to obtain the initial key by further altering the altered key, the initial key having second cryptographic properties resulting from being generated based at least in part on an initialization interaction between the point of sale device and a first portable consumer device, the second cryptographic properties including the initial key being a terminal-specific symmetric key that is unavailable for interception prior to the initialization interaction, wherein the receiving of the altered key with the one or more servers of the payment processing network inhibits unauthorized interception of the unaltered initial key; further altering, with the one or more servers, the altered key to obtain the initial key, the further altering of the altered key enabled at least in part by the altered key having been formed at least in part by the alteration of the initial key with the public key; sending, with the one or more servers, the initial key to a key storage location; associating the initial key that is stored at the key storage location with the received identifier of the point of sale device; receiving, with the one or more servers, altered transaction data associated with a plurality of financial transactions that are conducted using the point of sale device; determining, with the one or more servers, that the altered transaction data was altered with the initial key that is stored at the key storage location based at least in part on the associated identifier of the point of sale device; and further altering, with the one or more servers, the altered transaction data using the initial key that is stored at the key storage location, the further altering of the altered transaction data enabled at least in part by the initial key having been generated based at least in part on the initialization interaction between the point of sale device and the first portable consumer device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification