Systems and methods for remotely loading encryption keys in a card reader systems
First Claim
1. A method for remotely loading encryption keys into a card reader system, the method comprising:
- storing, at a card reader, a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein each of the first and second magnetic fingerprints comprises an intrinsic magnetic characteristic of the data card and was previously obtained from a reading of a magnetic stripe of the data card;
generating a first encryption key derived from the second magnetic fingerprint;
encrypting, using the first encryption key, first information comprising the device identification number and the first magnetic fingerprint;
sending the encrypted first information to an authentication server, wherein the authentication server was previously seeded with the device identification number, the first magnetic fingerprint, and the second magnetic fingerprint;
receiving, from the authentication server, a score indicative of a degree of correlation between the first magnetic fingerprint and the second magnetic fingerprint; and
receiving, when the score is above a preselected threshold, a second encryption key from the authentication server, the second encryption key encrypted using a third encryption key derived from the first magnetic fingerprint.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for remotely loading encryption keys in card reader systems are provided. One such method includes storing, at a card reader, a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein each of the first and second fingerprints includes an intrinsic magnetic characteristic of the data card, encrypting, using a first encryption key derived from the second fingerprint, information including the device identification number and first fingerprint, sending the encrypted information to an authentication server, receiving, from the authentication server, a score indicative of a degree of correlation between the first fingerprint and second fingerprint, and receiving, when the score is above a preselected threshold, a second encryption key from the authentication server, the second encryption key encrypted using a third encryption key derived from the first fingerprint.
-
Citations
26 Claims
-
1. A method for remotely loading encryption keys into a card reader system, the method comprising:
-
storing, at a card reader, a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein each of the first and second magnetic fingerprints comprises an intrinsic magnetic characteristic of the data card and was previously obtained from a reading of a magnetic stripe of the data card; generating a first encryption key derived from the second magnetic fingerprint; encrypting, using the first encryption key, first information comprising the device identification number and the first magnetic fingerprint; sending the encrypted first information to an authentication server, wherein the authentication server was previously seeded with the device identification number, the first magnetic fingerprint, and the second magnetic fingerprint; receiving, from the authentication server, a score indicative of a degree of correlation between the first magnetic fingerprint and the second magnetic fingerprint; and receiving, when the score is above a preselected threshold, a second encryption key from the authentication server, the second encryption key encrypted using a third encryption key derived from the first magnetic fingerprint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for remotely loading encryption keys, the system comprising:
-
a card reader system comprising a card reader; and an authentication server in communication with the card reader system; the card reader system configured to; store a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein each of the first and second magnetic fingerprints comprises an intrinsic magnetic characteristic of the data card and was previously obtained from a reading of a magnetic stripe of the data card; generate a first encryption key derived from the second magnetic fingerprint; encrypt, using the first encryption key, first information comprising the device identification number and the first magnetic fingerprint; send the encrypted first information to the authentication server, wherein the authentication server was previously seeded with the device identification number, the first magnetic fingerprint, and the second magnetic fingerprint; receive, from the authentication server, a score indicative of a degree of correlation between the first magnetic fingerprint and the second magnetic fingerprint; and receive, when the score is above a preselected threshold, a second encryption key from the authentication server, the second encryption key encrypted using a third encryption key derived from the first magnetic fingerprint. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification