Cloud-based transactions methods and systems
First Claim
Patent Images
1. A communication device comprising:
- a processor circuit; and
a non-transitory computer-readable storage medium coupled to the processor circuit and storing code executable by the processor circuit for implementing a method for communicating comprising;
receiving a first signal for a first transaction from a first wireless interface of a first access device, the first signal being received over a first wireless communication link and including a first transaction type indicator indicating a first type of transaction supported by the first access device and first terminal transaction data;
in response to receiving the first signal;
generating a first transaction cryptogram by encrypting the first terminal transaction data using a limited-use key (LUK); and
transmitting first transaction data including the first transaction cryptogram to the first wireless interface over the first wireless communication link, the first transaction data being formatted according to the first type of transaction;
receiving a second signal for a second transaction from a second wireless interface of a second access device, the second signal being received over a second wireless communication link and including a second transaction type indicator indicating a second type of transaction supported by the second access device and second terminal transaction data;
in response to receiving the second signal;
determining, based on the second transaction type indicator, that a second transaction cryptogram for the second transaction is to be generated by encrypting a predetermined numeric string without the second terminal transaction data;
generating a second transaction cryptogram by encrypting the predetermined numeric string without the second terminal transaction data using the LUK, wherein the second transaction cryptogram has a reduced length as compared to the first transaction cryptogram; and
storing the second transaction cryptogram in a memory location corresponding to an application file locator and sending the application file locator instead of the second transaction cryptogram to the second wireless interface over the second wireless communication link;
receiving the application file locator from the second wireless interface; and
in response to receiving the application file locator, transmitting second transaction data including the second transaction cryptogram to the second wireless interface over the second wireless communication link, the second transaction data being formatted according to the second type of transaction.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods provide for communication of transaction data that is formatted according to a transaction type that is support by an access device. First transaction data may be formatted according to a first type of transaction supported by a first access device and second transaction data may be formatted according to a second type of transaction supported by a second access device. The first transaction data may be transmitted over a first wireless communication link to the first access device and the second transaction data may be transmitted to the second access over a second wireless communication link.
-
Citations
20 Claims
-
1. A communication device comprising:
-
a processor circuit; and a non-transitory computer-readable storage medium coupled to the processor circuit and storing code executable by the processor circuit for implementing a method for communicating comprising; receiving a first signal for a first transaction from a first wireless interface of a first access device, the first signal being received over a first wireless communication link and including a first transaction type indicator indicating a first type of transaction supported by the first access device and first terminal transaction data; in response to receiving the first signal; generating a first transaction cryptogram by encrypting the first terminal transaction data using a limited-use key (LUK); and transmitting first transaction data including the first transaction cryptogram to the first wireless interface over the first wireless communication link, the first transaction data being formatted according to the first type of transaction; receiving a second signal for a second transaction from a second wireless interface of a second access device, the second signal being received over a second wireless communication link and including a second transaction type indicator indicating a second type of transaction supported by the second access device and second terminal transaction data; in response to receiving the second signal; determining, based on the second transaction type indicator, that a second transaction cryptogram for the second transaction is to be generated by encrypting a predetermined numeric string without the second terminal transaction data; generating a second transaction cryptogram by encrypting the predetermined numeric string without the second terminal transaction data using the LUK, wherein the second transaction cryptogram has a reduced length as compared to the first transaction cryptogram; and storing the second transaction cryptogram in a memory location corresponding to an application file locator and sending the application file locator instead of the second transaction cryptogram to the second wireless interface over the second wireless communication link; receiving the application file locator from the second wireless interface; and in response to receiving the application file locator, transmitting second transaction data including the second transaction cryptogram to the second wireless interface over the second wireless communication link, the second transaction data being formatted according to the second type of transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for communication comprising:
-
receiving, by a communication device, a first signal for a first transaction from a first wireless interface of a first access device, the first signal being received over a first wireless communication link and including a first transaction type indicator indicating a first type of transaction supported by the first access device and first terminal transaction data; in response to receiving the first signal; generating a first transaction cryptogram by encrypting the first terminal transaction data using a limited-use key (LUK); and transmitting, by the communication device, first transaction data including the first transaction cryptogram to the first wireless interface over the first wireless communication link, the first transaction data being formatted according to the first type of transaction; receiving, by the communication device, a second signal for a second transaction from a second wireless interface of a second access device, the second signal being received over a second wireless communication link and including a second transaction type indicator indicating a second type of transaction supported by the second access device and second terminal transaction data; in response to receiving the second signal; determining, based on the second transaction type indicator, that a second transaction cryptogram for the second transaction is to be generated by encrypting a predetermined numeric string without the second terminal transaction data; generating a second transaction cryptogram by encrypting the predetermined numeric string without the second terminal transaction data using the LUK, wherein the second transaction cryptogram has a reduced length as compared to the first transaction cryptogram; and storing the second transaction cryptogram in a memory location corresponding to an application file locator and sending the application file locator instead of the second transaction cryptogram to the second wireless interface over the second wireless communication link; receiving the application file locator from the second wireless interface; and in response to receiving the application file locator, transmitting, by the communication device, second transaction data including the second transaction cryptogram to the second wireless interface over the second wireless communication link, the second transaction data being formatted according to the second type of transaction. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification