Terminal data encryption
First Claim
Patent Images
1. A method comprising:
- generating at an access device an initial key, wherein the step of generating the initial key is based on a first interaction between the access device and a first portable consumer device, and wherein the access device includes a point of sale device;
sending the initial key to a key storage location, wherein the initial key is sent by the access device;
altering the initial key with a public key to form an altered key, wherein the initial key is altered by the access device;
sending the altered key from the access device to a server computer along with an identifier for the access device; and
altering, with the initial key that is stored at the key storage location, transaction data associated with a plurality of financial transactions that are conducted using the access device,wherein the altered key has a form capable of being changed to the initial key at the server computer.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is disclosed. The method includes generating an initial key after interacting with an access device, storing the initial key at a key storage location, altering the initial key with a public key to form an altered key, and sending the altered key to a server computer along with an identifier for the access device. The altered key is changed to the initial key at the server computer and is stored with the identifier in a database in operative communication with the server computer. The initial keys that are stored at the key storage location and in the database are used to alter and restore transaction data associated with multiple financial transactions that are conducted using the access device.
-
Citations
23 Claims
-
1. A method comprising:
-
generating at an access device an initial key, wherein the step of generating the initial key is based on a first interaction between the access device and a first portable consumer device, and wherein the access device includes a point of sale device; sending the initial key to a key storage location, wherein the initial key is sent by the access device; altering the initial key with a public key to form an altered key, wherein the initial key is altered by the access device; sending the altered key from the access device to a server computer along with an identifier for the access device; and altering, with the initial key that is stored at the key storage location, transaction data associated with a plurality of financial transactions that are conducted using the access device, wherein the altered key has a form capable of being changed to the initial key at the server computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium having thereon computer-executable instructions that, when executed by one or more computers, cause the one or more computers to collectively, at least:
-
generate at an access device an initial key, wherein the step of generating the initial key occurs after the access device interacts with a first portable consumer device, and wherein the access device includes a point of sale device; send the initial key to a key storage location, wherein the initial key is sent by the access device; alter the initial key with a public key to form an altered key, wherein the initial key is altered by the access device; and send the altered key from the access device to a server computer along with an identifier for the access device; and alter, with the initial key that is stored at the key storage location, transaction data associated with multiple financial transactions that are conducted using the access device and that occur after the access device interacts with the first portable consumer device, wherein the multiple financial transactions include at least one interaction between the access device and at least one portable consumer device that is different from the first portable consumer device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification