Terminal Data Encryption
First Claim
1. A method comprising:
- generating an initial key after interacting with an access device;
storing the initial key at a key storage location;
altering the initial key with a public key to form an altered key; and
sending the altered key to a server computer along with an identifier for the access device,wherein the altered key is changed to the initial key at the server computer and is stored with the identifier in a database in operative communication with the server computer, andwherein the initial keys that are stored at the key storage location and in the database are used to alter and restore transaction data associated with multiple financial transactions that are conducted using the access device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is disclosed. The method includes generating an initial key after interacting with an access device, storing the initial key at a key storage location, altering the initial key with a public key to form an altered key, and sending the altered key to a server computer along with an identifier for the access device. The altered key is changed to the initial key at the server computer and is stored with the identifier in a database in operative communication with the server computer. The initial keys that are stored at the key storage location and in the database are used to alter and restore transaction data associated with multiple financial transactions that are conducted using the access device.
162 Citations
35 Claims
-
1. A method comprising:
-
generating an initial key after interacting with an access device; storing the initial key at a key storage location; altering the initial key with a public key to form an altered key; and sending the altered key to a server computer along with an identifier for the access device, wherein the altered key is changed to the initial key at the server computer and is stored with the identifier in a database in operative communication with the server computer, and wherein the initial keys that are stored at the key storage location and in the database are used to alter and restore transaction data associated with multiple financial transactions that are conducted using the access device. - View Dependent Claims (2, 3, 4)
-
-
5. A computer readable medium comprising:
-
code for generating an initial key after interacting with an access device; code for storing the initial key at a key storage location; code for altering the initial key with a public key to form an altered key; and code for sending the altered key to a server computer along with an identifier for the access device, wherein the altered key is changed to the initial key at the server computer and is stored with the identifier in a database in operative communication with the server computer, and wherein the initial keys that are stored at the key storage location and in the database are used to alter and restore transaction data associated with multiple financial transactions that are conducted using the access device. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving an altered key and an identifier associated with an access device, wherein the altered key was generated from an initial key after an interaction with the access device; changing the altered key back to the initial key; storing the initial key in a database; and using the initial key to restore transaction data associated with multiple financial transactions conducted using the access device. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
identifying a track data element located at a first data location in a data track to encrypt; altering the track data element; placing the altered track data element in a second data location that is different from the first data location; and sending the altered track data element in the second data location to an issuer. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer readable medium comprising:
-
code for identifying a track data element located at a first data location in a data track to encrypt; code for altering the track data element using a key; code for placing the altered track data element in a second data location that is different from the first data location; and code for sending the altered track data element in the second data location to an issuer. - View Dependent Claims (26, 27)
-
-
28. A method comprising:
-
receiving a track data element in a second data location that is different from a first data location, wherein the track data element is in altered form in the second data location and wherein the track data element originally resided in the first data location in an unaltered form; and restoring the track data element in its unaltered form in the first data location, wherein the restored track data element is subsequently reviewed to determine if a portable consumer device associated with the track data element is authentic. - View Dependent Claims (29, 30, 31, 32, 33)
-
-
34. A method comprising:
-
identifying a track data element located at a first data location in a data track; concatenating the track data element and a terminal identifier to form a data string; altering the data string; and inserting values from the data string into the first data location. - View Dependent Claims (35)
-
Specification