System and method for account identifier obfuscation
First Claim
Patent Images
1. A method for obfuscating an account identifier comprising:
- identifying, by a computing device, a first end portion of the account identifier;
identifying, by the computing device, a middle portion of the account identifier, wherein the middle portion of the account identifier excludes the first end portion of the account identifier and further excludes a second end portion of the account identifier;
identifying, by the computing device, the second end portion of the account identifier;
creating, by the computing device, a unique derived key using at least a master key, the first end portion of the account identifier, and the second end portion of the account identifier;
generating, by the computing device during a financial transaction, a dynamic cryptogram unique to the financial transaction using the created unique derived key;
generating, by the computing device, an obfuscated portion of the account identifier using the generated dynamic cryptogram;
replacing, by the computing device, the middle portion of the account identifier with the generated obfuscated portion to create an obfuscated account identifier; and
transmitting, by the computing device to another device, the created obfuscated account identifier within an account identifier field of a transaction data for the financial transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is disclosed. The method includes generating an obfuscated portion using a dynamic cryptogram unique to a transaction, where the dynamic cryptogram is determined using a uniquely derived key. The method also includes replacing a middle portion of the account identifier with the obfuscated portion to form an obfuscated account identifier.
518 Citations
21 Claims
-
1. A method for obfuscating an account identifier comprising:
-
identifying, by a computing device, a first end portion of the account identifier; identifying, by the computing device, a middle portion of the account identifier, wherein the middle portion of the account identifier excludes the first end portion of the account identifier and further excludes a second end portion of the account identifier; identifying, by the computing device, the second end portion of the account identifier; creating, by the computing device, a unique derived key using at least a master key, the first end portion of the account identifier, and the second end portion of the account identifier; generating, by the computing device during a financial transaction, a dynamic cryptogram unique to the financial transaction using the created unique derived key; generating, by the computing device, an obfuscated portion of the account identifier using the generated dynamic cryptogram; replacing, by the computing device, the middle portion of the account identifier with the generated obfuscated portion to create an obfuscated account identifier; and transmitting, by the computing device to another device, the created obfuscated account identifier within an account identifier field of a transaction data for the financial transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 19, 20, 21)
-
-
10. A non-transitory computer readable medium having instructions embodied thereon that when executed by a processor causes the processor to obfuscate an account identifier by performing operations comprising:
-
identifying a first end portion of the account identifier; identifying a middle portion of the account identifier, wherein the middle portion of the account identifier excludes the first end portion of the account identifier and further excludes a second end portion of the account identifier; identifying the second end portion of the account identifier; creating a unique derived key using at least a master key, the first end portion of the account identifier, and the second end portion of the account identifier; generating during a financial transaction a dynamic cryptogram unique to the financial transaction using the created unique derived key; generating an obfuscated portion of the account identifier using the generated dynamic cryptogram; replacing the middle portion of the account identifier with the generated obfuscated portion to create an obfuscated account identifier; and transmitting the created obfuscated account identifier within an account identifier field of a transaction data for the financial transaction.
-
-
11. A method for determining an account identifier from an obfuscated account identifier comprising:
-
receiving, by the computing device for a financial transaction, a transaction data including the obfuscated account identifier; identifying, by the computing device, a first end portion of the obfuscated account identifier; identifying, by the computing device, an obfuscated middle portion of the obfuscated account identifier, wherein the obfuscated middle portion of the obfuscated account identifier excludes the first end portion of the obfuscated account identifier and further excludes a second end portion of the obfuscated account identifier; identifying, by the computing device, the second end portion of the obfuscated account identifier; creating, by the computing device, a unique derived key using at least a master key, the first end portion of the account identifier, and the second end portion of the account identifier; generating, by the computing device during the financial transaction, a dynamic cryptogram unique to the financial transaction based upon the created unique derived key; generating, by the computing device, a middle portion of the account identifier using the generated dynamic cryptogram; and replacing, by the computing device, the obfuscated middle portion of the obfuscated account identifier with the generated middle portion to form the account identifier. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable medium having instructions embodied thereon that when executed by a processor of a computing device causes the processor to determine an account identifier from an obfuscated account identifier by performing operations comprising:
-
receiving a transaction data including the obfuscated account identifier for a financial transaction; identifying a first end portion of the obfuscated account identifier; identifying an obfuscated middle portion of the obfuscated account identifier, wherein the obfuscated middle portion of the obfuscated account identifier excludes the first end portion of the obfuscated account identifier and further excludes a second end portion of the obfuscated account identifier; identifying the second end portion of the obfuscated account identifier; creating a unique derived key using at least a master key, the first end portion of the account identifier, and the second end portion of the account identifier; generating during the financial transaction a dynamic cryptogram unique to the financial transaction based upon the created unique derived key; generating a middle portion of the account identifier using the generated dynamic cryptogram; and replacing the obfuscated middle portion of the obfuscated account identifier with the generated middle portion to form the account identifier.
-
Specification