Systems and methods for cryptographic authentication of contactless cards
First Claim
Patent Images
1. A contactless card comprising:
- a memory including a counter value, and one or more keys;
a communication interface; and
one or more processors in communication with the memory and communication interface,wherein the one or more processors are configured to;
update the counter value when the communication interface is within a range of a first active communication field of a first device, the first device including a first application comprising instructions for execution on the first device;
create a first cryptogram based on the one or more keys and the counter value;
transmit, to the first application, the first cryptogram via the first active communication field;
receive, from the first application, a request for data;
update the counter value when the communication interface is within a range of a second active communication field of a second device, the second device including a second application comprising instructions for execution on the second device;
create a second cryptogram based on the one or more keys and the counter value; and
transmit, to the second application, a response responsive to the request for data via the second active communication field, the response comprising the second cryptogram, wherein the second cryptogram authorizes access to the data.
1 Assignment
0 Petitions
Accused Products
Abstract
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. These systems and methods may provide for the secure transmission of sensitive information, such personally-identifiable information. In some examples, the sensitive information may be requested and securely shared when cryptographically signed by the user, and the user may control the access of viewers to the personally identifiable information or end users.
550 Citations
20 Claims
-
1. A contactless card comprising:
-
a memory including a counter value, and one or more keys; a communication interface; and one or more processors in communication with the memory and communication interface, wherein the one or more processors are configured to; update the counter value when the communication interface is within a range of a first active communication field of a first device, the first device including a first application comprising instructions for execution on the first device; create a first cryptogram based on the one or more keys and the counter value; transmit, to the first application, the first cryptogram via the first active communication field; receive, from the first application, a request for data; update the counter value when the communication interface is within a range of a second active communication field of a second device, the second device including a second application comprising instructions for execution on the second device; create a second cryptogram based on the one or more keys and the counter value; and transmit, to the second application, a response responsive to the request for data via the second active communication field, the response comprising the second cryptogram, wherein the second cryptogram authorizes access to the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for secure data transmission, the method comprising the steps of:
-
updating, by one or more processors of a contactless card, a counter value when a communication interface of the contactless card is within a range of a first active communication field of a first device, the contactless card comprising;
a memory including the counter value, and one or more keys, wherein the one or more processors are in communication with the memory and communication interface, the first device including a first application comprising instructions for execution on the first device;creating, by the one or more processors, a first cryptogram based on the one or more keys and the counter value; transmitting, by the one or more processors, the first cryptogram to the first application via the first active communication field; receiving, from the first application, a request for one or more subsets of a data set; updating, by the one or more processors, the counter value when the communication interface is within a range of a second active communication field of a second device, the second device including a second application comprising instructions for execution on the second device; creating, by the one or more processors, a second cryptogram based on the one or more keys and the counter value; and transmitting, by the one or more processors, a response responsive to the request for the one or more subsets via the second active communication field to the second application, the response comprising the second cryptogram, wherein the second cryptogram authorizes access to the one or more subsets. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A transmitting device comprising:
-
a memory including a counter value, and one or more keys; a communication interface; and one or more processors in communication with the memory and communication interface, wherein the one or more processors are configured to; update the counter value when the communication interface is within a range of a first active communication field of a first device, the first device including a first application comprising instructions for execution on the first device; create a first cryptogram based on the one or more keys and the counter value; transmit, to the first application, the first cryptogram via the first active communication field; receive, from the first application, a request for data; update the counter value when the communication interface is within a range of a second active communication field of a second device, the second device including a second application comprising instructions for execution on the second device; create a second cryptogram based on the one or more keys and the counter value; and transmit, to the second application, a response responsive to the request for data via the second active communication field, the response comprising the second cryptogram and one or more credentials, wherein the second cryptogram and the one or more credentials authorizes access to the data.
-
Specification