Pre-generation of session keys for electronic transactions and devices that pre-generate session keys for electronic transactions
First Claim
1. A method of securing a transaction between a user terminal and a transaction terminal, comprising:
- generating, using a processing circuit of the user terminal, a plurality of session cryptographic keys from a master cryptographic key on the user terminal and based on a plurality of possible values of a transaction counter;
securing the plurality of session cryptographic keys, wherein said securing comprises;
deleting the master cryptographic key from the user terminal after generating the plurality of session cryptographic keys to prevent regeneration of the plurality of session cryptographic keys; and
encrypting, using the processing circuit of the user terminal, the plurality of session cryptographic keys to provide a plurality of encrypted session cryptographic keys;
storing the plurality of encrypted session cryptographic keys and one of the plurality of possible values of the transaction counter in the user terminal;
generating, using the processing circuit of the user terminal after deleting the master cryptographic key from the user terminal, a cryptogram that is based on a first one of the plurality of encrypted session cryptographic keys and based on transaction data for the transaction;
transmitting the cryptogram to the transaction terminal over a computer network between the transaction terminal and the user terminal;
updating the transaction counter; and
deleting the first one of the plurality of encrypted session cryptographic keys from the user terminal after generating the cryptogram.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and devices for pre-generating session keys for securing transactions are provided. A plurality of session cryptographic keys are generated from a master cryptographic key and a respective plurality of possible values of a transaction counter. The session cryptographic keys are encrypted to provide a plurality of encrypted session cryptographic keys, which are stored in the user terminal. The master cryptographic key is deleted from the user terminal after the session keys are generated. To secure a transaction, a cryptogram is generated based on one of the encrypted session cryptographic keys and transaction data for the transaction, and the cryptogram is transmitted to a transaction terminal. The transaction counter is updated, and the encrypted session cryptographic key is deleted from the user terminal.
86 Citations
14 Claims
-
1. A method of securing a transaction between a user terminal and a transaction terminal, comprising:
-
generating, using a processing circuit of the user terminal, a plurality of session cryptographic keys from a master cryptographic key on the user terminal and based on a plurality of possible values of a transaction counter; securing the plurality of session cryptographic keys, wherein said securing comprises; deleting the master cryptographic key from the user terminal after generating the plurality of session cryptographic keys to prevent regeneration of the plurality of session cryptographic keys; and encrypting, using the processing circuit of the user terminal, the plurality of session cryptographic keys to provide a plurality of encrypted session cryptographic keys; storing the plurality of encrypted session cryptographic keys and one of the plurality of possible values of the transaction counter in the user terminal; generating, using the processing circuit of the user terminal after deleting the master cryptographic key from the user terminal, a cryptogram that is based on a first one of the plurality of encrypted session cryptographic keys and based on transaction data for the transaction; transmitting the cryptogram to the transaction terminal over a computer network between the transaction terminal and the user terminal; updating the transaction counter; and deleting the first one of the plurality of encrypted session cryptographic keys from the user terminal after generating the cryptogram. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13)
-
-
12. A computer program product for securing a transaction between a user terminal and a transaction terminal, comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied in the medium, the computer readable program code comprising; computer readable program code to generate a plurality of session cryptographic keys from a master cryptographic key on the user terminal and based on a plurality of possible values of a transaction counter; computer readable program code to secure the plurality of session cryptographic keys, wherein said securing comprises deleting the master cryptographic key from the user terminal after generating the plurality of session cryptographic keys to prevent regeneration of the plurality of session cryptographic keys; computer readable program code to store the session cryptographic keys and one of the plurality of transaction counters in the user terminal; computer readable program code to generate a cryptogram in response to deleting the master cryptographic key based on a first one of the plurality of session cryptographic keys and based on transaction data for the transaction; computer readable program code to transmit the cryptogram to the transaction terminal; computer readable program code to update the transaction counter; and computer readable program code to delete the first one of the plurality of session cryptographic keys from the user terminal after generating the cryptogram. - View Dependent Claims (14)
-
Specification