CLOUD-BASED TRANSACTIONS WITH MAGNETIC SECURE TRANSMISSION
First Claim
1. A method for enhancing security of a communication device when conducting a transaction using the communication device, the method comprising:
- receiving, from a remote computer, a token that is provisioned for conducting magnetic stripe reader transactions;
receiving, by the communication device, a limited-use key (LUK) that is associated with a set of one or more limited-use thresholds that limits usage of the LUK;
generating, by the communication device, a transaction cryptogram using the LUK; and
generating, by an inductive coil of the communication device, an emulated magnetic signal representing data that includes the token instead of a real account identifier and the transaction cryptogram to transmit the token and the transaction cryptogram to a magnetic stripe reader of an access device to conduct the transaction, wherein the transaction is authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction cryptogram, and transmitting a token instead of a real account identifier and the transaction cryptogram to an access device to conduct the transaction. The token and the transaction cryptogram can be transmitted to a magnetic stripe reader by generating an emulated magnetic signal. The LUK may be associated with a set of one or more limited-use thresholds that limits usage of the LUK, and the transaction can be authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds.
178 Citations
20 Claims
-
1. A method for enhancing security of a communication device when conducting a transaction using the communication device, the method comprising:
-
receiving, from a remote computer, a token that is provisioned for conducting magnetic stripe reader transactions; receiving, by the communication device, a limited-use key (LUK) that is associated with a set of one or more limited-use thresholds that limits usage of the LUK; generating, by the communication device, a transaction cryptogram using the LUK; and generating, by an inductive coil of the communication device, an emulated magnetic signal representing data that includes the token instead of a real account identifier and the transaction cryptogram to transmit the token and the transaction cryptogram to a magnetic stripe reader of an access device to conduct the transaction, wherein the transaction is authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 20)
-
-
11. A communication device comprising:
-
an inductive coil; a processor; and a memory coupled to the processor and storing a mobile application that performs operations for enhancing security of the communication device when conducting transactions using the communication device, the operations including; receiving a token that is provisioned for conducting magnetic stripe reader transactions; receiving a limited-use key (LUK) that is associated with a set of one or more limited-use thresholds that limits usage of the LUK; generating a transaction cryptogram using the LUK; and generating, by the inductive coil, an emulated magnetic signal representing data that includes the token instead of a real account identifier and the transaction cryptogram to transmit the token and the transaction cryptogram to a magnetic stripe reader of an access device to conduct the transaction, wherein the transaction is authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification