Systems and methods for cryptographic authentication of contactless cards
First Claim
Patent Images
1. A data transmission system comprising:
- a transmitting device having a processor and memory, the memory of the transmitting device containing a diversified master key, transmission data and a counter value;
an application comprising instructions for execution on a receiving device having a processor and memory, the memory of the receiving device containing the master key;
wherein the transmitting device is configured to;
generate a diversified key using the diversified master key, one or more cryptographic algorithms, and the counter value,generate a cryptographic result including the counter value using the one or more cryptographic algorithms and the diversified key,encrypt the transmission data using the one or more cryptographic algorithms and the diversified key to yield encrypted transmission data, andtransmit the cryptographic result and encrypted transmission data to the application; and
wherein the application is configured to;
generate an authentication diversified key based on the master key and a unique identifier;
generate a session key based on the authentication diversified key and the cryptographic result;
decrypt the encrypted transmission data and validate the received cryptographic result using the one or more cryptographic algorithms and the session key;
wherein the application is configured to initiate, upon authentication of at least one user credential, one or more processes, the one or more processes comprising authenticating one or more electronically generated images associated with transportation ticketing information.
2 Assignments
0 Petitions
Accused Products
Abstract
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.
543 Citations
20 Claims
-
1. A data transmission system comprising:
-
a transmitting device having a processor and memory, the memory of the transmitting device containing a diversified master key, transmission data and a counter value; an application comprising instructions for execution on a receiving device having a processor and memory, the memory of the receiving device containing the master key; wherein the transmitting device is configured to; generate a diversified key using the diversified master key, one or more cryptographic algorithms, and the counter value, generate a cryptographic result including the counter value using the one or more cryptographic algorithms and the diversified key, encrypt the transmission data using the one or more cryptographic algorithms and the diversified key to yield encrypted transmission data, and transmit the cryptographic result and encrypted transmission data to the application; and wherein the application is configured to; generate an authentication diversified key based on the master key and a unique identifier; generate a session key based on the authentication diversified key and the cryptographic result; decrypt the encrypted transmission data and validate the received cryptographic result using the one or more cryptographic algorithms and the session key; wherein the application is configured to initiate, upon authentication of at least one user credential, one or more processes, the one or more processes comprising authenticating one or more electronically generated images associated with transportation ticketing information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of securing one or more processes using a transmitting device and an application comprising instructions for execution on a receiving device, the method comprising the steps of:
-
generating a diversified key using a diversified master key, one or more cryptographic algorithms, and a counter value, the transmitting device comprising a processor and memory, the memory of the transmitting device containing the diversified master key, transmission data, and the counter value generating a cryptographic result including the counter value using the one or more cryptographic algorithms and the diversified key; encrypting the transmission data using the one or more cryptographic algorithms and the diversified key to yield encrypted transmission data; transmitting the cryptographic result and encrypted transmission data to an application, the application comprising instructions for execution on a receiving device; generating an authentication diversified key based on the master key and a unique identifier; generating a session key based on the authentication diversified key and the cryptographic result; decrypting the encrypted transmission data and validating the received cryptographic result using the one or more cryptographic algorithms and the session key; and initiating, upon authentication of at least one user credential, one or more processes, the one or more processes comprising authenticating one or more electronically generated images associated with transportation ticketing information. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification