Encryption system and method for legacy devices in a retail environment
First Claim
Patent Images
1. A security module for use in a network for securely communicating encrypted data from data entry point devices at a retail site to a host computer, the security module comprising:
- a first zone having a first legacy encryption scheme and a first new encryption scheme, said first zone adapted to;
operate in the first legacy encryption scheme in a first mode and operate in the first new encryption scheme in a second mode.
2 Assignments
0 Petitions
Accused Products
Abstract
A security module used in a retail establishment has two zones of operation. The first zone uses a first encryption scheme between data entry point devices, such as a PIN keypad and the security module. The second zone uses a second encryption scheme between the security module and the host network computer. Both the local encryption scheme and the host encryption scheme may be selectively and independently switched from a legacy encryption scheme to a new encryption scheme to accommodate evolving encryption requirements.
67 Citations
51 Claims
-
1. A security module for use in a network for securely communicating encrypted data from data entry point devices at a retail site to a host computer, the security module comprising:
a first zone having a first legacy encryption scheme and a first new encryption scheme, said first zone adapted to;
operate in the first legacy encryption scheme in a first mode and operate in the first new encryption scheme in a second mode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. A method of using an encryption device in a network for securely communicating encrypted data from a data entry point device at a retail site to a host computer, the method comprising:
-
separating the encryption device into a host zone and a local zone; and
switching from a legacy encryption scheme to a new encryption scheme in one of the host zone and local zone. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A fueling environment, comprising:
-
a plurality of fuel dispensers, each fuel dispenser comprising one or more data entry point devices, said one or more data entry point devices adapted to encrypt information input thereto according to a local encryption scheme; and
a security module, comprising;
a local zone communicatively coupled to the one or more data entry point devices and adapted to receive encrypted information therefrom and decrypt the encrypted information;
a host zone communicatively coupled to a host network, said host zone adapted to re-encrypt the information received from the one or more data entry point devices and send the re-encrypted information to the host network;
wherein one of the local and host zones comprises a legacy encryption mode and a new encryption mode and is selectively switched between the legacy encryption mode and the new encryption mode. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A method of operating a fueling environment, comprising:
-
receiving data at one or more data entry point devices;
encrypting the data to form encrypted data at the one or more data entry point devices according to a local encryption scheme;
passing the encrypted data to a security module that decrypts the encrypted data;
re-encrypting the data at the security module with a host encryption scheme to form re-encrypted data;
sending the re-encrypted data to a host network;
selectively switching one of the local and host encryption schemes from a legacy encryption mode to a new encryption mode. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
Specification