SYSTEMS AND METHODS FOR SIGNALING AN ATTACK ON CONTACTLESS CARDS
1 Assignment
0 Petitions
Accused Products
Abstract
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key. In an embodiment, the transmitting device can signal an attack or potential attack through the counter value. The attack signaling can further include information relating to the attack or potential attack.
1 Citation
45 Claims
-
1-20. -20. (canceled)
-
21. A signaling system comprising:
-
a contactless card including a processor and memory; and a server in data communication with the contactless card, wherein the contactless card is configured to, upon detection of a potential attack, create a one-time password (OTP) value that is transmitted to the server, the OTP value indicative of the potential attack, and wherein the server, upon receipt of the OTP value, is configured to execute one or more actions responsive to the potential attack. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for signaling a potential attack, comprising:
-
receiving, by a server, one or more notifications from a contactless card; determining, by the server, that the one or more notifications are indicative of the detection of a potential attack to the contactless card; and executing, by the server, one or more actions in response to the one or more notifications. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A non-transitory computer readable medium comprising computer-executable instructions that are executed by a processor and comprising the steps of:
-
creating, upon detection of a potential attack, a one-time password (OTP) value that is indicative of a potential attack; transmitting the OTP value; and performing, upon receipt of the OTP value, one or more protective actions. - View Dependent Claims (41, 42, 43, 44, 45)
-
Specification