SYSTEMS AND METHODS FOR REMOTELY LOADING ENCRYPTION KEYS IN CARD READER SYSTEMS
First Claim
1. A method for remotely loading encryption keys into a card reader system, the method comprising:
- storing, at a card reader, a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein each of the first and second magnetic fingerprints comprises an intrinsic magnetic characteristic of the data card;
encrypting, using a first encryption key derived from the second magnetic fingerprint, information comprising the device identification number and the first magnetic fingerprint;
sending the encrypted information to an authentication server;
receiving, from the authentication server, a score indicative of a degree of correlation between the first magnetic fingerprint and the second magnetic fingerprint; and
receiving, when the score is above a preselected threshold, a second encryption key from the authentication server, the second encryption key encrypted using a third encryption key derived from the first magnetic fingerprint.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for remotely loading encryption keys in card reader systems are provided. One such method includes storing, at a card reader, a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein each of the first and second fingerprints includes an intrinsic magnetic characteristic of the data card, encrypting, using a first encryption key derived from the second fingerprint, information including the device identification number and first fingerprint, sending the encrypted information to an authentication server, receiving, from the authentication server, a score indicative of a degree of correlation between the first fingerprint and second fingerprint, and receiving, when the score is above a preselected threshold, a second encryption key from the authentication server, the second encryption key encrypted using a third encryption key derived from the first fingerprint.
34 Citations
28 Claims
-
1. A method for remotely loading encryption keys into a card reader system, the method comprising:
-
storing, at a card reader, a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein each of the first and second magnetic fingerprints comprises an intrinsic magnetic characteristic of the data card; encrypting, using a first encryption key derived from the second magnetic fingerprint, information comprising the device identification number and the first magnetic fingerprint; sending the encrypted information to an authentication server; receiving, from the authentication server, a score indicative of a degree of correlation between the first magnetic fingerprint and the second magnetic fingerprint; and receiving, when the score is above a preselected threshold, a second encryption key from the authentication server, the second encryption key encrypted using a third encryption key derived from the first magnetic fingerprint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15)
-
-
12. The method of claim 12, wherein the transaction key is a base key for DUKPT.
-
16. A system for remotely loading encryption keys, the system comprising:
-
a card reader system comprising a card reader; and an authentication server in communication with the card reader system; the card reader system configured to; store a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein each of the first and second magnetic fingerprints comprises an intrinsic magnetic characteristic of the data card; encrypt, using a first encryption key derived from the second magnetic fingerprint, information comprising the device identification number and the first magnetic fingerprint; send the encrypted information to the authentication server; receive, from the authentication server, a score indicative of a degree of correlation between the first magnetic fingerprint and the second magnetic fingerprint; and receive, when the score is above a preselected threshold, a second encryption key from the authentication server, the second encryption key encrypted using a third encryption key derived from the first magnetic fingerprint. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification