Embedding cloud-based functionalities in a communication device
First Claim
Patent Images
1. A server computer comprising:
- a hardware processor; and
a memory storing code, which when executed by the hardware processor, causes the server computer to perform operations including;
generating by the server computer a first cryptogram key that is usable for generation of a first transaction cryptogram to conduct a first transaction;
transmitting the first cryptogram key to a first application executing in a first memory region of a communication device, wherein the first application executing in the first memory region of the communication device provides the first cryptogram key to an application agent executing in a second memory region of the communication device to store the first cryptogram key in the second memory region of the communication device;
receiving by the server computer a replenishment request for a second cryptogram key from the first application executing in the first memory region of the communication device, the replenishment request including transaction log information derived from a transaction log; and
generating by the server computer the second cryptogram key that is usable for generation of a second transaction cryptogram to conduct a second transaction upon determining that the transaction log information in the replenishment request matches transaction log information stored at the server computer and transmitting the second cryptogram key to the first application of the communication device.
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques for enhancing the security of a communication device may include providing an application agent and a transaction application that executes on a communication device. The application agent may receive, from the application, a cryptogram key generated by a remote computer, and store the cryptogram key on the communication device. When the application agent receives a request to conduct a transaction from the application, the application agent may generate a transaction cryptogram using the cryptogram key, and provides the transaction cryptogram to an access device.
667 Citations
20 Claims
-
1. A server computer comprising:
-
a hardware processor; and a memory storing code, which when executed by the hardware processor, causes the server computer to perform operations including; generating by the server computer a first cryptogram key that is usable for generation of a first transaction cryptogram to conduct a first transaction; transmitting the first cryptogram key to a first application executing in a first memory region of a communication device, wherein the first application executing in the first memory region of the communication device provides the first cryptogram key to an application agent executing in a second memory region of the communication device to store the first cryptogram key in the second memory region of the communication device; receiving by the server computer a replenishment request for a second cryptogram key from the first application executing in the first memory region of the communication device, the replenishment request including transaction log information derived from a transaction log; and generating by the server computer the second cryptogram key that is usable for generation of a second transaction cryptogram to conduct a second transaction upon determining that the transaction log information in the replenishment request matches transaction log information stored at the server computer and transmitting the second cryptogram key to the first application of the communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
generating, by a server computer, a first cryptogram key that is usable for generation of a first transaction cryptogram to conduct a first transaction; transmitting, by the server computer, the first cryptogram key to a first application executing in a first memory region of a communication device, wherein the first application executing in the first memory region of the communication device provides the first cryptogram key to an application agent executing in a second memory region of the communication device to store the first cryptogram key in the second memory region of the communication device; receiving, by the server computer, a replenishment request for a second cryptogram key from the first application executing in the first memory region of the communication device, the replenishment request including transaction log information derived from a transaction log; and generating, by the server computer, the second cryptogram key that is usable for generation of a second transaction cryptogram to conduct a second transaction upon determining that the transaction log information in the replenishment request matches transaction log information stored at the server computer and transmitting the second cryptogram key to the first application of the communication device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification