Systems and methods for cryptographic authentication of contactless cards
First Claim
Patent Images
1. A transmitting device comprising:
- a memory including a counter value, and a plurality of keys;
a communication interface; and
one or more processors in communication with the memory and communication interface,wherein the one or more processors is configured to;
update the counter value when the communication interface is within a range of a first active communication field of a first receiving device;
create a first cryptogram based on the plurality of keys and the counter value;
transmit the first cryptogram, via the first active communication field, to the first receiving device;
receive, from the first receiving device, an authentication request for sensitive data;
update the counter value when the communication interface is within a range of a second active communication field of a second receiving device;
create a second cryptogram based on the plurality of keys and the counter value; and
transmit an authentication response responsive to the authentication request for sensitive data via the second active communication field, the authentication response comprising the second cryptogram transmitted to the second receiving device, wherein the second cryptogram authorizes access to the sensitive data.
1 Assignment
0 Petitions
Accused Products
Abstract
Example embodiments of systems and methods for data transmission between transmitting and receiving devices are provided. These systems and methods may provide for the secure transmission of sensitive information, such as personally-identifiable information. In some examples, the sensitive information may be requested and securely shared when cryptographically signed by the user, and the user may control the access of viewers to the personally identifiable information or end users.
498 Citations
20 Claims
-
1. A transmitting device comprising:
-
a memory including a counter value, and a plurality of keys; a communication interface; and one or more processors in communication with the memory and communication interface, wherein the one or more processors is configured to; update the counter value when the communication interface is within a range of a first active communication field of a first receiving device; create a first cryptogram based on the plurality of keys and the counter value; transmit the first cryptogram, via the first active communication field, to the first receiving device; receive, from the first receiving device, an authentication request for sensitive data; update the counter value when the communication interface is within a range of a second active communication field of a second receiving device; create a second cryptogram based on the plurality of keys and the counter value; and transmit an authentication response responsive to the authentication request for sensitive data via the second active communication field, the authentication response comprising the second cryptogram transmitted to the second receiving device, wherein the second cryptogram authorizes access to the sensitive data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for secure data transmission, the method comprising the steps of:
-
updating, by one or more processors of a transmitting device, a counter value when the communication interface is within a range of a first active communication field of a first receiving device, the transmitting device comprising;
a memory including the counter value, and a plurality of keys;
a communication interface, the one or more processors in communication with the memory and communication interface;creating, by the one or more processors, a first cryptogram based on the plurality of keys and the counter value; transmitting, by the one or more processors, the first cryptogram via the first active communication field to the first receiving device; receiving, from the first receiving device, an authentication request for sensitive data; updating, by the one or more processors, the counter value when the communication interface is within a range of a second active communication field of a second receiving device; creating, by the one or more processors, a second cryptogram based on the plurality of keys and the counter value; and transmitting, by the one or more processors, an authentication response responsive to the authentication request for sensitive data via the second active communication field, the authentication response comprisingthe second cryptogram transmitted to the second receiving device, wherein the second cryptogram authorizes access to the sensitive data. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A first device comprising:
-
a memory including a counter value, and a plurality of keys; a communication interface; and one or more processors in communication with the memory and communication interface, wherein the one or more processors is configured to; update the counter value when the communication interface is within a range of a first communication field of a second device; create a first cryptogram based on the plurality of keys and the counter value; transmit the first cryptogram, via the first communication field, to a first application comprising instructions for execution on the second device; receive, from the first application, an authentication request for sensitive data; update the counter value when the communication interface is within a range of a second communication field of a third device; create a second cryptogram based on the plurality of keys and the counter value; and transmit an authentication response responsive to the authentication request for sensitive data via the second communication field, the authentication response comprising the second cryptogram transmitted to a second application comprising instructions for execution on the third device, wherein the second cryptogram authorizes access to the sensitive data.
-
Specification