Cloud-based transactions methods and systems
First Claim
1. A method for enhancing security of a communication device when conducting a transaction using the communication device, the method comprising:
- providing, by a remote computer, a first transaction cryptogram generation key to the communication device, wherein the first transaction cryptogram generation key is associated with a set of one or more limited-use thresholds that limits usage of the first transaction cryptogram generation key and the first transaction cryptogram generation key is usable for more than one transaction;
receiving, by the remote computer, transaction information for each transaction conducted by the communication device using the first transaction cryptogram generation key;
receiving, by the remote computer, a replenishment request for a second transaction cryptogram generation key, the replenishment request including transaction log information derived from transaction data stored in a transaction log on the communication device, the transaction data being unique for each transaction conducted by the communication device using the first transaction cryptogram generation key;
verifying, by the remote computer, that the transaction log information in the replenishment request is consistent with the previously received transaction information; and
providing, by the remote computer, the second transaction cryptogram generation key to the communication device in response to verifying the transaction log information in the replenishment request,wherein providing the second transaction cryptogram generation key to the communication device includes providing, to the communication device, a key index that includes information pertaining to generation of the second transaction cryptogram generation key.
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include receiving a cryptogram generation key replenishment request that includes transaction log information derived from transaction data stored in a transaction log on a communication device, verifying that the transaction log information in the replenishment request is consistent with the previously received transaction information, and providing a new cryptogram generation key to the communication device in response to verifying the transaction log information in the replenishment request.
898 Citations
18 Claims
-
1. A method for enhancing security of a communication device when conducting a transaction using the communication device, the method comprising:
-
providing, by a remote computer, a first transaction cryptogram generation key to the communication device, wherein the first transaction cryptogram generation key is associated with a set of one or more limited-use thresholds that limits usage of the first transaction cryptogram generation key and the first transaction cryptogram generation key is usable for more than one transaction; receiving, by the remote computer, transaction information for each transaction conducted by the communication device using the first transaction cryptogram generation key; receiving, by the remote computer, a replenishment request for a second transaction cryptogram generation key, the replenishment request including transaction log information derived from transaction data stored in a transaction log on the communication device, the transaction data being unique for each transaction conducted by the communication device using the first transaction cryptogram generation key; verifying, by the remote computer, that the transaction log information in the replenishment request is consistent with the previously received transaction information; and providing, by the remote computer, the second transaction cryptogram generation key to the communication device in response to verifying the transaction log information in the replenishment request, wherein providing the second transaction cryptogram generation key to the communication device includes providing, to the communication device, a key index that includes information pertaining to generation of the second transaction cryptogram generation key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A server computer comprising:
-
a hardware processor; and a memory coupled to the hardware processor and storing code implementing operations for enhancing security of a communication device when conducting transactions using the communication device, the operations including; providing a first transaction cryptogram generation key to the communication device, wherein the first transaction cryptogram generation key is associated with a set of one or more limited-use thresholds that limits usage of the first transaction cryptogram generation key and the first transaction cryptogram generation key is usable for more than one transaction; receiving transaction information for each transaction conducted by the communication device using the first transaction cryptogram generation key; receiving a replenishment request for a second transaction cryptogram generation key, the replenishment request including transaction log information derived from transaction data stored in a transaction log on the communication device, the transaction data being unique for each transaction conducted by the communication device using the first transaction cryptogram generation key; verifying that the transaction log information in the replenishment request is consistent with the previously received transaction information; and providing the second transaction cryptogram generation key to the communication device in response to verifying the transaction log information in the replenishment request, wherein providing the second transaction cryptogram generation key to the communication device includes providing, to the communication device, a key index that includes information pertaining to generation of the second transaction cryptogram generation key. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification