Track data encryption
First Claim
Patent Images
1. A method comprising:
- receiving, at a computer, an authorization request message associated with a transaction, the authorization request message including a secondary Primary Account Number (PAN) in a PAN data field of the authorization request message, and a primary PAN that is encrypted and located in a location of the authorization request message other than the PAN data field, wherein the secondary PAN is associated with the primary PAN, wherein the secondary PAN has end portions and a middle portion, wherein at least one of the end portions of the secondary PAN is the same as a corresponding end portion of the primary PAN, while at least the middle portion of the secondary PAN is different than a corresponding middle portion of the primary PAN;
determining, by the computer, that the secondary PAN in the PAN data field is not a valid PAN;
identifying, by the computer, based on the determination, the location of the encrypted primary PAN in the authorization request message;
decrypting, by the computer, the encrypted primary PAN;
determining, by the computer, based upon the decrypted primary PAN, an authorization response indicating whether the transaction is to be approved or disapproved; and
sending, by the computer, an authorization response message including the authorization response.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion of that is different than the primary PAN.
315 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a computer, an authorization request message associated with a transaction, the authorization request message including a secondary Primary Account Number (PAN) in a PAN data field of the authorization request message, and a primary PAN that is encrypted and located in a location of the authorization request message other than the PAN data field, wherein the secondary PAN is associated with the primary PAN, wherein the secondary PAN has end portions and a middle portion, wherein at least one of the end portions of the secondary PAN is the same as a corresponding end portion of the primary PAN, while at least the middle portion of the secondary PAN is different than a corresponding middle portion of the primary PAN; determining, by the computer, that the secondary PAN in the PAN data field is not a valid PAN; identifying, by the computer, based on the determination, the location of the encrypted primary PAN in the authorization request message; decrypting, by the computer, the encrypted primary PAN; determining, by the computer, based upon the decrypted primary PAN, an authorization response indicating whether the transaction is to be approved or disapproved; and sending, by the computer, an authorization response message including the authorization response. - View Dependent Claims (2, 3, 4, 5, 11, 12, 17, 18, 19, 20)
-
-
6. A non-transitory computer readable storage medium comprising instructions that, when executed by one or more processors of a computer, cause the computer to perform operations comprising:
-
receiving, at the computer, an authorization request message associated with a transaction, the authorization request message including a secondary Primary Account Number in a PAN data field of the authorization request message, and a primary PAN in a location of the authorization request message other than the PAN data field, wherein the secondary PAN is associated with the primary PAN, wherein the secondary PAN has end portions and a middle portion, and wherein at least one of the end portions of the secondary PAN is the same as a corresponding end portion of the primary PAN, while at least the middle portion of the secondary PAN is different than a corresponding middle portion of the primary PAN; based upon a determination that the secondary PAN in the PAN data field is not a valid PAN, identifying, by the computer, the location of the encrypted primary PAN in the authorization request message; decrypting the encrypted primary PAN; determining, based upon the decrypted primary PAN, an authorization response indicating whether the transaction is to be approved or disapproved; and sending, by the computer, an authorization response message including the authorization response. - View Dependent Claims (7, 8, 9, 13, 14, 15, 16)
-
-
10. A server comprising:
-
one or more processors; and a non-transitory computer readable storage medium including instructions that when executed by the one or more processors, cause the one or more processors to perform operations comprising; receiving an authorization request message associated with a transaction, the authorization request message including a secondary Primary Account Number (PAN) in a PAN data field of the authorization request message, and a primary PAN in a location of the authorization request message other than the PAN data field, wherein the secondary PAN is associated with the primary PAN, wherein the secondary PAN has end portions and a middle portion, and wherein at least one of the end portions of the secondary PAN is the same as a corresponding end portion of the primary PAN, while at least the middle portion of the secondary PAN is different than a corresponding middle portion of the primary PAN; based upon a determination that the secondary PAN in the PAN data field is not a valid PAN, identifying the location of the encrypted primary PAN in the authorization request message; decrypting the encrypted primary PAN; determining, based upon the decrypted primary PAN, an authorization response indicating whether the transaction is to be approved or disapproved; and sending an authorization response message including the authorization response.
-
Specification