×

Authenticating a chip card interface device

  • US 8,707,413 B2
  • Filed: 07/30/2010
  • Issued: 04/22/2014
  • Est. Priority Date: 01/15/2010
  • Status: Active Grant
First Claim
Patent Images

1. A chip card interface device (CCID) configured for authenticating with a backend system during a transaction with the backend system, the CCID comprising:

  • a network communication device configured for communicating with the backend system over a network;

    a memory device configured for storing a unique chip key created by the backend system based at least in part on a master chip key of the backend system and based at least in part on a serial number of the processing device of the CCID;

    a processing device coupled with the network communication device, the processing device configured for;

    instructing the network communication device to communicate a transaction initiation communication to the backend system,receiving a request sent from the backend system in response to the transaction initiation communication, for authentication information, the request for authentication information from the backend system comprising a random number,symmetrically encrypting the random number based at least in part on the unique chip key stored in the memory device; and

    instructing the network communication device to communicate, in response to receiving the request for authentication information, an authentication communication to the backend system, the authentication communication including a serial number of the processing device of the CCID such that the backend system can authenticate the identity of the processing device of the CCID and complete the transaction, the authentication communication comprising the encrypted random number;

    wherein the serial number is to be used by the backend system to recalculate the unique chip key using the master chip key, the recalculated unique chip key is to be used by the backend system to encrypt a copy of the random number previously received at the CCID from the backend system, and the encrypted copy of the random number is to be compared to the encrypted random number, thereby indicating whether the identity of the processing device is authenticated.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×