LIMITED-USE KEYS AND CRYPTOGRAMS
First Claim
1. A method for enhancing security of a communication device when conducting a transaction using the communication device, the method comprising:
- encrypting, by a computer, account information with a first encryption key to generate a second encryption key;
encrypting key index information using the second encryption key to generate a limited-use key (LUK), wherein the key index information includes a key index having information pertaining to generation of the LUK; and
providing the LUK and the key index to the communication device to facilitate generation of a transaction cryptogram for the transaction conducted using the communication device, wherein the transaction is authorized based on the transaction cryptogram generated from the LUK.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include encrypting account information with a first encryption key to generate a second encryption key, and encrypting key index information using the second key to generate a limited-use key (LUK). The key index information may include a key index having information pertaining to generation of the LUK. The LUK and the key index can be provided to the communication device to facilitate generation of a transaction cryptogram for a transaction conducted using the communication device, and the transaction can be authorized based on the transaction cryptogram generated from the LUK.
-
Citations
24 Claims
-
1. A method for enhancing security of a communication device when conducting a transaction using the communication device, the method comprising:
-
encrypting, by a computer, account information with a first encryption key to generate a second encryption key; encrypting key index information using the second encryption key to generate a limited-use key (LUK), wherein the key index information includes a key index having information pertaining to generation of the LUK; and providing the LUK and the key index to the communication device to facilitate generation of a transaction cryptogram for the transaction conducted using the communication device, wherein the transaction is authorized based on the transaction cryptogram generated from the LUK. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer for enhancing security of a communication device when conducting transactions using the communication device, the computer comprising:
-
a processor; and a memory storing computer-readable code, which when executed by the processor, causes the computer to perform operations including; encrypting account information with a first encryption key to generate a second encryption key; encrypting key index information using the second encryption key to generate a limited-use key (LUK), wherein the key index information includes a key index having information pertaining to generation of the LUK; and providing the LUK and the key index to the communication device to facilitate generation of a transaction cryptogram for the transaction conducted using the communication device, wherein the transaction is authorized based on the transaction cryptogram generated from the LUK. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification