Systems and methods for cryptographic authentication of contactless cards
First Claim
Patent Images
1. A system for secure communication comprising:
- a transmitting device having a processor and memory, the memory of the transmitting device containing a diversified master key, transmission data and a counter value;
an application comprising instructions for execution on a receiving device having a processor and memory, the memory of the receiving device containing a master key;
wherein the transmitting device is configured to;
generate a diversified key using the diversified master key, one or more cryptographic algorithms, and the counter value,generate a cryptographic result including the counter value using the one or more cryptographic algorithms and the diversified key,encrypt the transmission data using the one or more cryptographic algorithms and the diversified key to yield encrypted transmission data, andtransmit the cryptographic result and encrypted transmission data to the application;
wherein the application is configured to;
generate an authentication diversified key based on the master key and a unique identifier;
generate a session key based on the authentication diversified key and the cryptographic result; and
decrypt the encrypted transmission data and validate the received cryptographic result using the one or more cryptographic algorithms and the session key;
wherein, upon the initiation of an operation, the application is further configured to;
request a user identification;
pause the operation until the user identification has been authenticated;
upon authentication of the user identification, complete the operation,wherein the user identification is provided after entry of the transmitting device into a communication field of the receiving device.
2 Assignments
0 Petitions
Accused Products
Abstract
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.
542 Citations
20 Claims
-
1. A system for secure communication comprising:
-
a transmitting device having a processor and memory, the memory of the transmitting device containing a diversified master key, transmission data and a counter value; an application comprising instructions for execution on a receiving device having a processor and memory, the memory of the receiving device containing a master key; wherein the transmitting device is configured to; generate a diversified key using the diversified master key, one or more cryptographic algorithms, and the counter value, generate a cryptographic result including the counter value using the one or more cryptographic algorithms and the diversified key, encrypt the transmission data using the one or more cryptographic algorithms and the diversified key to yield encrypted transmission data, and transmit the cryptographic result and encrypted transmission data to the application; wherein the application is configured to; generate an authentication diversified key based on the master key and a unique identifier; generate a session key based on the authentication diversified key and the cryptographic result; and decrypt the encrypted transmission data and validate the received cryptographic result using the one or more cryptographic algorithms and the session key; wherein, upon the initiation of an operation, the application is further configured to; request a user identification; pause the operation until the user identification has been authenticated; upon authentication of the user identification, complete the operation, wherein the user identification is provided after entry of the transmitting device into a communication field of the receiving device. - View Dependent Claims (2, 3, 4)
-
-
5. A method of securing an operation, the method comprising the steps of:
-
providing a transmitting device comprising a processor and memory and the memory of the transmitting device containing a diversified master key, identification data and a counter value; providing an application comprising instructions for execution on the receiving device comprising a processor and a memory containing a master key; wherein the transmitting device is configured to; generate a diversified key using the diversified master key, one or more cryptographic algorithms, and the counter, generate a cryptographic result including the counter value using the one or more cryptographic algorithms and the diversified key, encrypt the identification data using one or more cryptographic algorithms and the diversified key to yield encrypted identification data, and transmit the cryptographic result and encrypted identification data to the application; wherein the application is configured to; generate an authentication diversified key based on the master key and a unique identifier; generate a session key based on the authentication diversified key and the cryptographic result; and decrypt the encrypted identification data and validate the received cryptographic result using the one or more cryptographic algorithms and the session key; initiating an operation; pausing the operation until a user identification has been authenticated; authenticating the user identification after entry of the transmitting device into a communication field of the receiving device thereby transmitting encrypted identification data from the transmitting device to the application, wherein the user identification is provided after entry of the transmitting device into the communication field; and completing the operation. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification