×

Methods for secure cryptogram generation

  • US 9,813,245 B2
  • Filed: 08/31/2015
  • Issued: 11/07/2017
  • Est. Priority Date: 08/29/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • determining, by a user device, an ephemeral key pair comprising an ephemeral public key and an ephemeral private key;

    sending, by the user device, a provisioning request message including the ephemeral public key to a provisioning server computer;

    receiving, by the user device, a provisioning response message including encrypted credentials from the provisioning server computer;

    determining, by the user device, a response shared secret using the ephemeral private key and a static server public key;

    decrypting, by the user device, the encrypted credentials using the response shared secret to determine credentials;

    obtaining key derivation parameters from the credentials; and

    deriving a first cryptogram key from the response shared secret using the key derivation parameters, the first cryptogram key operable to generate a first cryptogram for use in a first secure communication with a validation server computer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×