EMBEDDING CLOUD-BASED FUNCTIONALITIES IN A COMMUNICATION DEVICE
First Claim
Patent Images
1. A server computer comprising:
- a processor; and
a memory storing code, which when executed by the processor, causes the server computer to perform operations including;
generating a first cryptogram key that is usable for generation of a transaction cryptogram to conduct a transaction;
transmitting the first cryptogram key to an application executing in a first memory region of a communication device, wherein the application executing in a first memory region of the communication device provides the first cryptogram key to an application agent executing in a second memory region of the communication device to store the first cryptogram key in a second memory region of the communication device;
receiving a replenishment request for a second cryptogram key from the application executing in the first memory region of the communication device, the replenishment request including transaction log information derived from a transaction log;
determining that the transaction log information in the replenishment request matches transaction log information at the server computer;
generating a first cryptogram key that is usable for generation of a transaction cryptogram to conduct a transaction; and
transmitting the first cryptogram key to an application executing in a first memory region of the communication device.
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques for enhancing the security of a communication device may include providing an application agent and a transaction application that executes on a communication device. The application agent may receive, from the application, a cryptogram key generated by a remote computer, and store the cryptogram key on the communication device. When the application agent receives a request to conduct a transaction from the application, the application agent may generate a transaction cryptogram using the cryptogram key, and provides the transaction cryptogram to an access device.
-
Citations
20 Claims
-
1. A server computer comprising:
-
a processor; and a memory storing code, which when executed by the processor, causes the server computer to perform operations including; generating a first cryptogram key that is usable for generation of a transaction cryptogram to conduct a transaction; transmitting the first cryptogram key to an application executing in a first memory region of a communication device, wherein the application executing in a first memory region of the communication device provides the first cryptogram key to an application agent executing in a second memory region of the communication device to store the first cryptogram key in a second memory region of the communication device; receiving a replenishment request for a second cryptogram key from the application executing in the first memory region of the communication device, the replenishment request including transaction log information derived from a transaction log; determining that the transaction log information in the replenishment request matches transaction log information at the server computer; generating a first cryptogram key that is usable for generation of a transaction cryptogram to conduct a transaction; and transmitting the first cryptogram key to an application executing in a first memory region of the communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
generating, by a server computer, a first cryptogram key that is usable for generation of a transaction cryptogram to conduct a transaction; transmitting, by the server computer, the first cryptogram key to an application executing in a first memory region of a communication device, wherein the application executing in a first memory region of the communication device provides the first cryptogram key to an application agent executing in a second memory region of the communication device to store the first cryptogram key in a second memory region of the communication device; receiving, by the server computer, a replenishment request for a second cryptogram key from the application executing in the first memory region of the communication device, the replenishment request including transaction log information derived from a transaction log; determining, by the server computer, that the transaction log information in the replenishment request matches transaction log information at the server computer; generating, by the server computer, a first cryptogram key that is usable for generation of a transaction cryptogram to conduct a transaction; and transmitting, by the server computer, the first cryptogram key to an application executing in a first memory region of the communication device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification