Secure PIN management
First Claim
1. A method of secure PIN processing in a network transaction comprising the steps of:
- sending terminal data to a terminal;
receiving corollary data generated from user input and terminal data from said terminal;
sending corollary data and HSM data to a hardware security module;
receiving a PIN block generated from corollary data and HSM data from said hardware security module.
14 Assignments
0 Petitions
Accused Products
Abstract
A system and method of secure PIN processing in a network transaction includes a transaction manager that sends terminal data to a terminal. The terminal generates corollary data from user input and the terminal data. The corollary data is sent to the transaction manager. The transaction manager then sends the corollary data and HSM data to a hardware security module. The hardware security module generates a PIN from the corollary data and the HSM data, encrypts the PIN and generates a PIN block. The transaction manager uses the PIN block and transaction data to send a transaction request to the ATM Network.
30 Citations
20 Claims
-
1. A method of secure PIN processing in a network transaction comprising the steps of:
-
sending terminal data to a terminal;
receiving corollary data generated from user input and terminal data from said terminal;
sending corollary data and HSM data to a hardware security module;
receiving a PIN block generated from corollary data and HSM data from said hardware security module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for secure PIN processing comprising:
-
a transaction manager;
a transaction module communicably connected to said transaction manager;
a hardware security module communicably connected to said transaction manager;
wherein said transaction manager sends terminal data to said transaction module such that the transaction module generates corollary data using said terminal data and user input data and said transaction manager sends said corollary data and HSM data to said hardware security module, such that the hardware security module generates a PIN block using said corollary data and said HSM data. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification