SECURED TRANSACTION SYSTEM AND METHOD
First Claim
1. A method for processing token based financial transactions, comprising:
- receiving a token information;
performing a non-security task on the token information using a first processor, wherein the non-security task includes one or more tasks from the group of encryption determination, encryption-decryption request, key management, token information delivery, or transactional data delivery;
sending a job request to the second processor through a defined interface using the first processor; and
performing a security-related task based on the on the token information using a second processor based on the job request from the first microprocessor, wherein the security-related task includes one or more tasks from the group of token information authentication, token information decryption, or token information encryption, wherein, the second processor is configured to only accept the job request if it is for one of the security-related tasks.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for performing financial transactions are provided. In one embodiment, the invention provides for method for bank card transactions, including: reading the token information at the point of swipe for traditional and non-traditional POS platforms; performing a low-security task on the token information using a first microprocessor, wherein the non-security task includes one or more tasks from the group of encryption determination, encryption-decryption request, key management, token information delivery, or transactional data delivery; and performing a security-related task on the token information using a second microprocessor based on a request from the first microprocessor, wherein the security-related task includes one or more tasks from the group of token information authentication, token information decryption, or token information encryption. Formatting the encrypted information such that it is compatible with the format of the current POS system.
379 Citations
73 Claims
-
1. A method for processing token based financial transactions, comprising:
-
receiving a token information; performing a non-security task on the token information using a first processor, wherein the non-security task includes one or more tasks from the group of encryption determination, encryption-decryption request, key management, token information delivery, or transactional data delivery; sending a job request to the second processor through a defined interface using the first processor; and performing a security-related task based on the on the token information using a second processor based on the job request from the first microprocessor, wherein the security-related task includes one or more tasks from the group of token information authentication, token information decryption, or token information encryption, wherein, the second processor is configured to only accept the job request if it is for one of the security-related tasks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A secure transaction apparatus configured to process financial transactions, the secure transaction apparatus comprising:
-
a first processor configured to receive a token information from a token card and to determine whether the token information is encrypted; a communication channel configured to allow the first processor to send a job request to another processor, wherein the communication channel is configured to allow a job request for decryption, encryption, authentication, and keys management functions; and a second processor configured to decrypt an encrypted token information based on a request to decrypt the token information from the first microprocessor and to authenticate the decrypted token information using an authentication information. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 46)
-
-
31. A secure transaction apparatus configured to process financial transactions, the secure transaction apparatus comprising:
-
a token reader configured to extract token data from a token card, the card reader having a first security module; a user interface module having a third security module; a communication interface coupled to the card reader, the display module, and the user interface; wherein each of the security modules comprises; a first microprocessor configured to perform a non-security task on a token information, wherein the non-security task includes one or more tasks from the group of encryption determination, encryption-decryption request, key management, token information delivery, or transactional data delivery; and a second microprocessor configured to perform a security-related task on the token information based on a request from the first microprocessor, wherein the security-related task includes one or more tasks from the group of token information authentication, token information decryption, or token information encryption. - View Dependent Claims (32, 33, 34, 35, 36, 37)
-
-
38. A method for updating secure transaction information comprising:
-
receiving a token information; performing a non-security task on the token information using a first processor, wherein the non-security task includes at least one task from the group including;
encryption determination, encryption-decryption request, key management, token information delivery, and transactional data delivery;sending a job request to a second processor through a register using the first processor; and performing a security-related task based on the on the token information using the second processor based on the job request from the first microprocessor, wherein the security-related task includes at least one task from the group including token information authentication, token information decryption, or token information encryption, wherein both the first and second processors are within a same security housing, wherein the second processor is configured to accept the job request only if it is for one of the security-related tasks. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45)
-
-
47. A method for sending compliance and status information, comprising:
-
performing a non-security task on a token information using a first processor, wherein the non-security task includes at least one task from the group including;
encryption determination, encryption-decryption request, key management, token information delivery, or transactional data delivery;sending a job request to the second processor through a register using the first processor; and performing a security-related task based on the on the token information using a second processor based on the job request from the first microprocessor, wherein the security-related task includes at least one task from the group including token information authentication, token information decryption, or token information encryption, wherein both the first and second processors are within a same security housing, wherein the second processor is configured to accept the job request only if it is for one of the security-related tasks. - View Dependent Claims (48, 49, 50)
-
- 51. The method of using a COTS (commercial off the shlef) processor to provide the accurate analog magnetic peak location detector wherein the peak detector comprises two signal paths, both representing the analog head amplified by in fixed gain increment and in addition one signal path being delayed by a fixed amount, whereby each of the two signals representing an input to a comparator, wherein the output of the comparator changes as the delayed signal has a higher magnitude then the non-delayed signal, and further wherein the changing output of the comparator representing the position of the input waveform where the peak transition occurs.
- 61. A magstripe reader comprising multiple communications interfaces, one for mobile devices where a headphone jack reader is required and a second for devices requiring an USB communication channel.
-
63. A method for processing customer payments through a customer'"'"'s bank (issuer) in exchange for a seller'"'"'s goods or services, comprising:
-
receiving or capturing, token information identifying the customer, the customer'"'"'s bank account, the seller, and the sale transaction, performing one or more non-security tasks on that information using a first (application) processor, wherein those tasks are drawn from the group of data transforms, encryption method determinations, encryption-decryption requests, key management, token information delivery, localized secure transport, and non-secure business logic; sending a request to a second (security) processor to perform security-related tasks based on the token information received from the first microprocessor, wherein the security-related tasks are drawn from the group of confidentiality (encryption, decryption), user authentication, data authentication, data origin authentication, non-repudiation of origin, identity of keys and methods, and the return of the secured data to the first processor. - View Dependent Claims (64, 65, 66, 67, 68, 69, 70, 71, 72, 73)
-
Specification