PIN ENCRYPTION DEVICE SECURITY
First Claim
1. A method for securing transaction data, comprising:
- reading token data from a token using a read apparatus and encrypting the token data at the read apparatus;
sending the encrypted token data to a security module over a communication link; and
verifying the integrity of the communication link based on encrypted token data.
9 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method for securing transaction data, includes reading token data from a token using a read apparatus and encrypting the token data at the read apparatus, sending the encrypted token data to a security module over a communication link, and verifying the integrity of the communication link based on encrypted token data. The apparatus and method can further include receiving authentication data for the token and encrypting the authentication data within the security module, and combining the encrypted token data and encrypted authentication data into a transaction data stream. In various embodiments, a detection apparatus with plurality of read structures (for example, read gaps), can be used to provide additional information in verifying the integrity of the communication link comprises determining whether the read structures are detecting token data with a spatially diversity in accordance with a geometry of the read structures.
113 Citations
23 Claims
-
1. A method for securing transaction data, comprising:
-
reading token data from a token using a read apparatus and encrypting the token data at the read apparatus; sending the encrypted token data to a security module over a communication link; and verifying the integrity of the communication link based on encrypted token data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A transaction terminal, comprising:
-
a token data encryption module configured to encrypt data read from a token at the terminal; a communication link coupled to the encryption module and a verification module coupled to the communication link and configured to verify the integrity of the communication link. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product having a computer program embodied in a computer readable medium adapted to verify the integrity of token data read at a transaction terminal, the computer program comprising machine readable code adapted to cause a processing device to:
-
read token data from a token using a read apparatus and encrypting the token data at the read apparatus; send the encrypted token data to a security module over a communication link; and verify the integrity of the communication link based on encrypted token data. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification