Method, Server, And Storage Medium For Verifying Transactions Using A Smart Card
First Claim
1. A method of verifying a transaction using a smart card, the method comprising:
- receiving a transaction request from a first terminal to perform a transaction with a user of the smart card, wherein the transaction request includes card identification information and encrypted card data extracted by the first terminal from the smart card, and transaction information;
determining a respective user account linked to the card identification information;
performing a first verification process to authenticate the smart card, including;
verifying that the smart card possesses a correct decryption key corresponding to the card identification information;
performing a second verification process to authenticate the smart card, including;
verifying that the encrypted card data extracted from the smart card encodes stored card data corresponding to the respective user account linked to the card identification information; and
in accordance with successful completion of the first and the second verification processes, processing the transaction in accordance with the transaction information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, server and storage medium for verifying a transaction using a smart card are disclosed. A server receives a transaction request to perform a transaction with a user of the smart card. The transaction request includes identification information and encrypted data extracted from the smart card, and transaction information. The server determines a user account linked to the identification information. The server performs a first verification process to authenticate the smart card by verifying that the smart card possesses a correct decryption key corresponding to the identification information. The server performs a second verification process to authenticate the smart card by verifying that the encrypted data extracted from the smart card encodes stored data corresponding to the respective user account linked to the identification information. If the first and the second verification processes are successful, the server processes the transaction in accordance with the transaction information.
-
Citations
20 Claims
-
1. A method of verifying a transaction using a smart card, the method comprising:
-
receiving a transaction request from a first terminal to perform a transaction with a user of the smart card, wherein the transaction request includes card identification information and encrypted card data extracted by the first terminal from the smart card, and transaction information; determining a respective user account linked to the card identification information; performing a first verification process to authenticate the smart card, including;
verifying that the smart card possesses a correct decryption key corresponding to the card identification information;performing a second verification process to authenticate the smart card, including;
verifying that the encrypted card data extracted from the smart card encodes stored card data corresponding to the respective user account linked to the card identification information; andin accordance with successful completion of the first and the second verification processes, processing the transaction in accordance with the transaction information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A server, comprising:
-
one or more processors; and memory storing one or more programs to be executed by the one or more processors, the one or more programs comprising instructions for; receiving a transaction request from a first terminal to perform a transaction with a user of the smart card, wherein the transaction request includes card identification information and encrypted card data extracted by the first terminal from the smart card, and transaction information; determining a respective user account linked to the card identification information; performing a first verification process to authenticate the smart card, including;
verifying that the smart card possesses a correct decryption key corresponding to the card identification information;performing a second verification process to authenticate the smart card, including;
verifying that the encrypted card data extracted from the smart card encodes stored card data corresponding to the respective user account linked to the card identification information; andin accordance with successful completion of the first and the second verification processes, processing the transaction in accordance with the transaction information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which, when executed by a server with one or more processors, cause the server to perform operations comprising:
-
receiving a transaction request from a first terminal to perform a transaction with a user of the smart card, wherein the transaction request includes card identification information and encrypted card data extracted by the first terminal from the smart card, and transaction information; determining a respective user account linked to the card identification information; performing a first verification process to authenticate the smart card, including;
verifying that the smart card possesses a correct decryption key corresponding to the card identification information;performing a second verification process to authenticate the smart card, including;
verifying that the encrypted card data extracted from the smart card encodes stored card data corresponding to the respective user account linked to the card identification information; andin accordance with successful completion of the first and the second verification processes, processing the transaction in accordance with the transaction information. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification