PIN BLOCK REPLACEMENT
First Claim
1. A method for debit card transactions, comprising:
- receiving encrypted PIN information for a debit card transaction, wherein the PIN information was encrypted using encrypted debit-card information;
decrypting the PIN information using encrypted debit-card information for the debit card;
re-encrypting the PIN using actual debit-card information for the debit card; and
forwarding the re-encrypted PIN for subsequent transaction processing.
11 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for performing token transactions are provided. In one embodiment, the invention provides for processing token transactions, including receiving an encrypted password for a debit card transaction, wherein the password was secured using encrypted debit-card information, decrypting the password using encrypted debit-card information for the debit card, recreating the password using actual debit-card information for the debit card, and forwarding the recreated password for subsequent transaction processing. The invention is suitable for implementation with other types of tokens in addition to debit-card tokens as well. The invention can be implemented in a scenario where the password includes a PIN block that is created by combining a clear or encrypted PIN for the token with token information.
-
Citations
40 Claims
-
1. A method for debit card transactions, comprising:
-
receiving encrypted PIN information for a debit card transaction, wherein the PIN information was encrypted using encrypted debit-card information; decrypting the PIN information using encrypted debit-card information for the debit card; re-encrypting the PIN using actual debit-card information for the debit card; and forwarding the re-encrypted PIN for subsequent transaction processing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for secure token transactions, comprising:
-
receiving an encrypted password for a token transaction, wherein the password was encrypted using encrypted token information; decrypting the password using encrypted token information; re-encrypting the password using actual token information; and forwarding the re-encrypted password for subsequent transaction processing. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A token transaction system, comprising:
-
a decryption module configured to receive encrypted token information and to decrypt the received encrypted token information to generate decrypted token information; and a re-encryption module configured to receive decrypted token information from the decryption module and to receive a password that was secured with the encrypted token information, and further configured to decrypt the password using the encrypted token information and to recreate the password using the decrypted token information. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A computer program product comprising a computer useable medium having computer program logic embodied therein configured to cause a computer system to process token transactions, said computer program logic comprising:
-
first computer readable program code for receiving an encrypted password for a token transaction, wherein the password was encrypted using encrypted token information; second computer readable program code for decrypting the password using encrypted token information; third computer readable program code for re-encrypting the password using actual token information; and fourth computer readable program code for forwarding the re-encrypted password for subsequent transaction processing. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39)
-
-
40. A method for debit card transactions, comprising:
-
receiving encrypted PIN information for a debit card transaction, wherein the PIN was encrypted using encrypted debit-card information; and decrypting the PIN information using encrypted debit-card information for the debit card.
-
Specification