×

Limited-use keys and cryptograms

  • US 11,164,176 B2
  • Filed: 12/19/2014
  • Issued: 11/02/2021
  • Est. Priority Date: 12/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for enhancing security of a communication device when conducting a transaction using the communication device, the method comprising:

  • encrypting, by a computer system, account information with a first encryption key to generate a second encryption key;

    encrypting, by the computer system, key index information using the second encryption key to generate a limited-use key (LUK), wherein the key index information includes a key index having a counter value indicating a number of times that the LUK has been renewed in a predetermined time period, and time information indicating when the LUK is generated, and wherein the LUK is associated with a set of one or more limited-use thresholds that limits usage of the LUK; and

    providing, by the computer system, the LUK and the key index to the communication device via an application platform computer;

    receiving, by the computer system, the key index information and a transaction cryptogram generated by the communication device, the transaction cryptogram including transaction data encrypted by the LUK;

    verifying, by the computer system, that the transaction cryptogram was encrypted using the LUK, and that the LUK has not exceeded the one or more limited-use thresholds, wherein verifying that the transaction cryptogram was encrypted using the LUK includes;

    regenerating the transaction cryptogram using the received key index information; and

    based on the verifying, authorizing the transaction.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×