throbber
as) United States
`a2) Patent Application Publication co) Pub. No.: US 2015/0178724 Al
`
` Ngoet al. (43) Pub. Date: Jun. 25, 2015
`
`
`US 20150178724A1
`
`(54) LIMITED-USE KEYS AND CRYPTOGRAMS
`
`Publication Classification
`
`(71) Applicants:Hao Ngo, San Jose, CA (US); Christian
`Aabye, Foster City, CA (US); John
`Sheets, San Francisco, CA (US); Oleg
`Makhotin, Castro Valley, CA (US)
`
`(72)
`
`Inventors: Hao Ngo, San Jose, CA (US); Christian
`Aabye, Foster City, CA (US); John
`Sheets, San Francisco, CA (US); Oleg
`Makhotin,Castro Valley, CA (US)
`
`(21) Appl. No.: 14/577,678
`4.
`Filed:
`(22)
`Dec. 19, 2014
`+
`as
`Related U.S. Application Data
`(60) Provisional application No. 61/918,643, filed on Dec.
`19, 2013, provisional application No. 61/941,227,
`filed on Feb. 18, 2014, provisional application No.
`61/982,169,filed on Apr. 21, 2014, provisional appli-
`cation No. 61/983,635, filed on Apr. 24, 2014.
`
`100
`
`(51)
`
`Int. Cl.
`G06Q 20/38
`(52) U.S. CL.
`CPC vieccccccccsccccescetesessees G06Q 20/3829 (2013.01)
`
`(2006.01)
`
`ABSTRACT
`
`57
`67)
`Techniques for enhancing the security of a communication
`device when conducting a transaction using the communica-
`tion device may include encrypting account information with
`a first encryption key to generate a second encryption key, and
`encrypting key index information using the second key to
`generate a limited-use key (LUK). The key index information
`may include a key index having information pertaining to
`generation of the LUK. The LUK andthe key index can be
`provided to the communication deviceto facilitate generation
`ofa transaction cryptogram for a transaction conducted using
`the communication device, and the transaction can be autho-
`rized basedon the transaction cryptogram generated from the
`LUK.
`
`Cloud Based
`Payments
`
`Issuer/ Host
`v5.
`=
`
`“
`
`Mobile
`Application
`Platform
`170
`
`Network
`
` Payment Processing
`
`Network
`Portable Communication Device
`194
`
`i App Environment 110
`Mobile App / Wallet
`112
`On-Device Cloud
`Based Transaction
`SW 113
`Acquirer
`
`
`Platform
` Communications
`192
`
`174 fMobileOS1i4
`
`i
`
`Card Emulation APls 116
`
`Device Hardware 104
`Electronic
`} Contactless i
`i
`
`
`Contactless Interface 108 # Acceptance|Cash Register }}¢> i Reader
`
`
`i
`i
`i; Device 164
`i
`
`MerchantPoint of Sale / Access Device 160
`
`1
`
`SAMSUNG 1012
`
`SAMSUNG 1012
`
`1
`
`

`

`Patent Application Publication
`
`Jun. 25,2015 Sheet 1 of 16
`
`US 2015/0178724 Al
`
`100
`
`oe
`Application
`Platform
`170
`
`Cloud Based
`Payments
`Platform
`
`Issuer / Host
`System
`5
`—
`
`
`Mobile
`
`
`194
`
`
`Communications
`Network
`192
`
`Portable Communication Device
`
`PaymentProcessing
`Network
`
`Mobile App / Wallet
`112
`
`On-Device Cloud
`Based Transaction
`
`Acquirer
`174
`
`Contactless Interface 108
`
`}¢+
`i
`
`Contactless
`Reader
`
`i
`
`Acceptance
`Device 164
`
`Electronic
`Cash Register }
`
`2
`
`

`

`Patent Application Publication
`
`Jun. 25, 2015 Sheet 2 of 16
`
`US 2015/0178724 Al
`
`siqowa|qeyod
`
`ONINOISIAONd
`LNAWTIOYNA
`
`
`
`pasegpno|d
`
`sjuawAed
`
`WJOJ1e|d
`
`08z
`
`1SOH/Janss|
`
`LW3a3SAS
`
`aka
`
`
`
`volesiddy*WLWUO?
`
`
`
`WIOPeldaolaaq
`
`0ZzToc
`
`9EZUONEWIYUOD
`
`cOl
`
`972JsanbaySUIUOISIAOId
`
`
`ZZJsanbayUaW||ouuy
`
`7ZZysanbayyuaw|osuy
`
`
`
`8Z7Ze1eqSUIUOISIAOI
`
`
`
`O€Ze1eqSUIUOISIAOId
`
`PETUONEWIIYUOD
`
`CECUONCWIIU0D
`
`3
`
`

`

`Patent Application Publication
`
`Jun. 25,2015 Sheet 3 of 16
`
`US 2015/0178724 Al
`
`Portable
`Comm.
`Devi
`evice
`301
`
`Access
`Device
`360
`
`Integrated Chip Based Transaction
`
`Available Applications Request 302
`(e.g., Select PPSE Command)
`
`Available Applications Response 304
`(e.g., Select PPSE Response)
`
`
`
`Transaction Processing Information 312
`(e.g., GPO Response)
`
`Application Selection 306
`(e.g., Select AID Command)
`
`Terminal Transaction Data Request 308
`(e.g., Select AID Response)
`
`PDOL
`
`Terminal Transaction Data 310
`(e.g., GPO Command)
`
`PDOL (TTQ = chip)
`
`AFL, AIP, Cryptogram, Track 2 (e.g., Token/PAN), etc.
`
`Account Data Request 314
`(e.g., Read Record Command)
`
`AFL
`
`Account Data 316
`(e.g., Read Record Response)
`
`FIG. 3
`
`4
`
`

`

`Patent Application Publication
`
`Jun. 25,2015 Sheet 4 of 16
`
`US 2015/0178724 Al
`
`Access
`Device
`460
`
`Mobile
`Device
`401
`
`Magnetic Stripe Based Transaction
`
`Available Applications Request 402
`(e.g., Select PPSE Command)
`
`Available Applications Response 404
`(e.g., Select PPSE Response)
`
`
`
`Transaction Processing Information 412
`(e.g., GPO Response)
`
`Application Selection 406
`(e.g., Select AID Command)
`
`Terminal Transaction Data Request 408
`(e.g., Select AID Response)
`
`PDOL
`
`Terminal Transaction Data 410
`(e.g., GPO Command)
`
`PDOL (TTQ = mag. stripe)
`
`AFL, AIP
`
`Account Data Request 414
`(e.g., Read Record Command)
`
`Account Data 416
`
`(e.g., Read Record Response)
`
`Track 2 (e.g., Token/PAN, Key Index, Cryptogram)
`
`FIG. 4
`
`5
`
`

`

`Patent Application Publication
`
`Jun. 25,2015 Sheet 5 of 16
`
`US 2015/0178724 Al
`
`Sequence Counter (SC)
`
`'
`
`Transaction Timestamp
`
`Unpredictable Number (UN)
`
`Application Transaction Counter (ATC)
`
`Transaction Type
`
`Transaction Type
`
`Transaction Timestamp
`
`Unpredictable Number (UN)
`
`Application Transaction Counter (ATC)
`
`FIG. 5
`
`Transaction 1
`
`Transaction N
`
`6
`
`

`

`Patent Application Publication
`
`Jun. 25, 2015 Sheet 6 of 16
`
`US 2015/0178724 Al
`
`1SOH/Janss|
`
`WaisdsS
`
`cL9
`
`
`
`NOILVOISTHAALNAWAVd-LSOd
`
`
`
`
`
`pesegpno|D9|IQOW9|GeWod
`
`
`
`
`
`sjuawAeduolenjddy"WwOoD
`
`
`
`
`
`WOLIeIdWJOselda0lAaq
`
`0890L9TO9
`
`
`
`7ZZ9Jsenbay3o7]uonoesued|779Isanbay807uoNoesues]979IsSenbay8o7uolesuel|
`
`
`
`
`
`UO!}eWIOJU|307UO!JDesUeIL
`
`UOIEWJIOJU]307]UOIDesUeL|
`
`UOIEWIOJU|ZO]uolesuedL
`
`cea
`
`0€9
`
`8c9
`
`9“Old
`
`7
`
`
`
`

`

`Patent Application Publication
`
`Jun. 25, 2015 Sheet 7 of 16
`
`US 2015/0178724 Al
`
` L£°Old
`
`
`
`
`
`9Z/UONEDLNONJUaWYsiUa|dayZLJsenbeyJUuawWYsUua|deyZZZJsanbayJUeWYsius|day
`
`
`
`
`
`8Z/JUaWAaspa|moUNYyO€/SuaJawWeJegJUNODDYMANZE/SdayaWesegJUNOIDYMAN
`
`
`
`pesegpno|dS|IQoIe|qeuod
`
`
`sjuawAeduoljeaddy“wwoy
`WJIOJE|WO]dao1Aaq
`08ZOZZTOL
`
`
`
`1SOH/Janss|
`
`Wwayshs
`
`CZL
`
`
`
`
`
`LNAWHSINA1dSYSYSLAAIVeVdLNNODDV
`
`QELUOIJEUIIJUODPELUONeWIYUOD
`
`8
`
`

`

`Patent Application Publication
`
`Jun. 25, 2015 Sheet 8 of 16
`
`US 2015/0178724 Al
`
`008
`
`AZ08
`
`808
`
`vs
`
`508
`
`
`uoljounyuolydAyouy
`
`Nsd||Yax01/NWd“3'9)
`
`
`
`uolyeWJOjU]JUNODDY
`
`
`
`
`
`(NSd|[Ua}OL/NVdpayeau|
`
`cL8
`
`
`uoljounyuolydAusuy
`
`XXXXXXXXIIHHHHAW,“"3"9)
`
`
`
`UOHeWJOJU]XepuyAay|
`
`(XXXXXXXXIDHHHHAY,
`
`8°Ol48¢8
`
`
`
`fF wuewgoidAs9
`
`/(paziejiwiaq)
`
`uolnoesued|
`
`0¢8
`
`uoljesuedL
`
`wesgoidAsp
`
`
`
`228 prmrete,vonfvcs
`EdeSEISuolpunyuoidAuouy
`
`
`
`
`uonounyuoldAyouyaIweuAqg
`8T8fejequonoesuedy
`
`
`
`volunazyewloeq
`
`978
`
`9T8
`
`
`
`uolpesues|paseg
`
`
`
`adiuissyeusey
`
`
`
`uoljaesued)pasegFdiyd
`paesgaqu|
`
`9
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Patent Application Publication
`
`Jun. 25, 2015 Sheet 9 of 16
`
`US 2015/0178724 Al
`
`006
`
`ro
`
`(9)vaa
`
`pe
`
`:puebe7q
`
`Fe
`
`wesGoidA9
`
`6‘Old
`
`
`
`(apowjUaLUaYdi9ap)
`
`iNdNO=O
`
`yooqejeq
`
`vyhay
`
`gfey
`
`YO-eaIsnjoxy
`
`
`
`(apowjUsUUaydious)
`
`
`
`
`
`wuyyioblyuondAiosuyejeq=(8)vad
`
`ynduj=|
`
`
`
`
`
`wuyyoBlyuondAsuyejeq=(p)Wad
`
`10
`
`10
`
`

`

`Patent Application Publication
`
`Jun. 25,2015 Sheet 10 of 16
`
`US 2015/0178724 Al
`
`1000
`
`“a RECEIVE LUK ASSOCIATED WITH ONE OR
`
`MORE LIMITED-USE THRESHOLDS
`
`INITIATE TRANSACTION
`1004
`
`GENERATE TRANSACTION CRYPTOGRAM
`USING LUK
`1006
`
`SEND TRANSACTION CRYPTOGRAM TO
`CONDUCT TRANSACTION
`1008
`
`SET OF ONE OR MORE LIMITED-USE
`THRESHOLDS OF LUK EXCEEDED?
`1010
`
`SEND REPLENISHMENT REQUEST
`FOR NEW LUK
`1012
`
`FIG. 10
`
`11
`
`11
`
`

`

`Patent Application Publication
`
`Jun. 25,2015 Sheet 11 of 16
`
`US 2015/0178724 Al
`
`1100
`
`ENCRYPT ACCOUNT INFORMATION WITH
`A FIRST ENCRYPTION KEY TO GENERATE
`A SECOND ENCRYPTION KEY
`1102
`
`ENCRYPT KEY INDEX INFORMATION USING
`THE SECOND ENCRYPTION KEY TO GENERATE
`A LIMITED USE KEY (LUK)
`1104
`
`GENERATION OF A TRANSACTION CRYPTOGRAM
`
`ASSOCIATE THE LUK WITH A SET OF
`ONE OR MORE LIMITED-USE THRESHOLDS
`1106
`
`PROVIDE THE LUK AND KEY INDEX TO
`A PORTABLE COMMUNICATION DEVICE TO FACILITATE
`
`FIG. 11
`
`12
`
`12
`
`

`

`Patent Application Publication
`
`Jun. 25,2015 Sheet 12 of 16
`
`US 2015/0178724 Al
`
`Portable Communication Device 1201
`
`Memory 1202
`
`i Mobile Application }
`; Account
`Features 1220
`{3
`i? Parameters {
`ii
`Storage
`Enrollment 1232
`
`
`Payment Modes i ii>Mobile_— ii
`
`
`1222 Provisioning 1233|3} if Application }
`Verification
`:
`Lifecycle
`:
`!
`!
`comme
`
`
`Methods 1224||} LManagement 1238|| if 1246
`
`aa
`User Settings
`:
`Management 1236
`Key Index
`1226 Post Payment 1238|i}
`
`peeeeeenneeeeenneneeeeeeeeeeeeeeeeeeenn nn nee eee eee eee eens +.
`{ Cloud-Based Payment Logic 1250
`
`$
`
`Acct Parameters
`Thresholds 1252
`
`Transaction
`Verification Log
`1254
`
`Proximity Payment
`System
`Environment 1256
`
`Contactless
`PaymentLogic
`1258
`
`Contactless Interface 1208
`
`Device Hardware 1204
`
`Processor 1205
`
`User Interface 1206
`
`Display 1207
`
`Communication Subsystem 1209
`
`FIG. 12
`
`13
`
`13
`
`

`

`Patent Application Publication
`
`Jun. 25, 2015 Sheet 13 of 16
`
`US 2015/0178724 Al
`
`WADA
`
`pallian
`
`
`
`de]puovas
`
`
`
`(aze1sJUBIOSUeI)
`
`(a
`
`
`
`yeys}uaiosuel|)
`
`
`
`yndu|WADGD
`
`
`
`
`
`}UaSS|PIWUBpodDJUNODIYV
`
`wWoswl]
`
`Japeaeuodel
`
`
`
`JBPCOdSSOB/JOLYUODECOF}JBAO
`
`
`
`juasJuawAed
`
`
`
`(aesJUaIsSUeI])
`
`pazeluu|
`
`el‘Old
`
`ynoawil,
`
`
`
`punojsyoegAe}0}ApeayquasjuawAed
`
`
`pasinbaujasnaundVINYum
`
`
`ADCS(a}e1sJUalsued|)Joyagesoulpeara’!
`
`14
`
`pa|eysu|
`
`UYDUMSUd2IISYIJIMSUdVdJ9$
`
`
`
`
`‘yNOOWILyUdWNIYsSUl
`
`juawAedsja|asp4es
`
`
`
`
`
`punojgaj0}0}|SungdJawunsuo)eppvyjezsu|
`
`
`
`
`
`
`
`SUIUUNY10NuadoBANIVpepeojumog
`
`
`
`ysei>‘UMopynuSs
`
`‘Qso|D
`
`
`
`
`
`payzejasjuawAedUoU
`
`
`‘s8Ul}jasayI|
`
`SUO!DUNYJYWl422'R0JGOWWANVIAL
`
`
`
`14
`
`
`
`
`
`
`
`
`

`

`Patent Application Publication
`
`Jun. 25, 2015 Sheet 14 of 16
`
`US 2015/0178724 Al
`
`uado
`
`
`
`
`
`SUIUUNYJONdAILOVpapeojumog
`
`
`
`yses>‘UMOpPINYS
`
`“aso|D
`
`JGOWNO-SAVM1V
`
`ysel>‘UMOpINUsepoul
`
`‘9so|Djenue||NosAemjyv
`
`0}asueyuyspayjasyawnsuo?psc
`
`
`
`
`
`WAG)
`
`paljlian
`
`
`
`yndu|WADdD
`
`
`
`(aye3sJUDIDSUeL|)
`
`ynoaull|JO}adessow
`Japeas$$9]19e]U09&0}JaAO
`
`
`
`jUassjeluapes)JUNODDYJasndy}
`
`quasyuawAeddvuM
`
`WADGDAe|d03Apeay
`
`asinbeadpazyelqiul
`
`15
`
`psljeysu|
`
`
`
`de]puosas
`
`
`
`(aye3sJUDIDSUeL|)
`
`ynoawiyL
`
`euodel
`
`Japeal
`
`
`
`quasjuawAed
`
`
`
`(aye1sJUdISUeL|)
`
`pazijetu
`
`vtOld
`
`
`
`
`
`&ppvjye3Su|
`
`15
`
`
`
`
`
`
`

`

`Patent Application Publication
`
`Jun. 25, 2015 Sheet 15 of 16
`
`US 2015/0178724 Al
`
`
`
`SUIUUNYJON
`
`‘aso|D
`
`‘“uMopinus
`
`ysel9
`
`punoisyoeg
`
`
`
`payxdo|UNUaaIIS
`
`‘aso|D
`
`‘“uMopinus
`
`ysel9
`
`uado
`
`HOUaaIIS
`
`WADGD
`
`paijliaa
`
`
`
`indu|WADdD
`
`
`
`(a7e\sJUaIDSUeI])
`
`
`
`de]puosas
`
`
`
`(a7e\sJUaIDSUeI])
`
`inoawi
`
`L
`
`WADG5
`
`posinba
`
`ynNoswL
`
`Japeaseuodel
`
`
`eisu0}ABUEYD=sjpajasJaUINsUO?I|
`Jenuel|A|NosAemv
`Japeas$$3]}9e}]U0De&0}JAAO
`
`juassjeljUapa>yUuNODDYJoaSessoul
`
`
`opolu&ppv
`
`aAIVYpapeojumoq
`
`
`NOILVOISIHSAJDIAAG-NOHLIM4GOWNO-SAVMIV
`juasJUaWAegdVW4M
`
`
`
`Ae|d0}Apeay
`
`pezijeiiu|
`
`16
`
`pues
`
`payyjeysu|
`
`
`
`quasjuawAed
`
`
`
`(aye1sJUdISUe|)
`
`pezijellu|
`
`ST‘Old
`
`16
`
`
`
`
`
`
`
`
`
`

`

`Patent Application Publication
`
`Jun. 25, 2015 Sheet 16 of 16
`
`US 2015/0178724 Al
`
`TWNYALXA
`
`SLOT
`
`YALNIdd
`
`JOVINSINISIGdaXldauVvOgAIy1YOdTIdAS
`
`
`
`
`
`cOETFOOT
`809T909T9TST
`
`YOSSjDOU"dAYOINAWYATIOYLNOD
`
`
`WuLNdDWALSASO/I
`
`
`Oc9TccolvI9OL
`
`AW1dSI0
`
`ddldVdVv
`
`clot
`
`17
`
`9T“Old
`
`YOLINOW
`
`OTST
`
`17
`
`
`

`

`US 2015/0178724 Al
`
`Jun. 25, 2015
`
`LIMITED-USE KEYS AND CRYPTOGRAMS
`
`CROSS-REFERENCES TO RELATED
`APPLICATIONS
`
`[0001] This application claims the benefit of priority to
`USS. Provisional Application No. 61/918,643, filed on Dec.
`19, 2013, U.S. Provisional Application No. 61/941,227, filed
`on Feb. 18, 2014, U.S. Provisional Application No. 61/982,
`169,filed on Apr. 21, 2014, and U.S. Provisional Application
`No. 61/983,635, filed on Apr. 24, 2014, which are all herein
`incorporated by reference in their entirety for all purposes.
`
`[0002] This applicationis related to commonly owned U.S.
`Non-Provisional Application (Atty Dkt. No. 79900-923273)
`entitled “Cloud-Based Transactions Methods and Systems,”
`being filed concurrently on Dec. 19, 2014, the contents of
`which is hereby incorporated by reference in its entirety for
`all purposes.
`
`BACKGROUND
`
`[0003] Advancesin the capabilities of portable communi-
`cation devices have allowed portable communication devices
`such as smart phones to be used as payment instruments to
`conduct contactless transactions. For example, a portable
`communication device can be placed in proximity to an
`access device such as a point-of-sale (POS) terminal to trans-
`fer account information from the portable communication
`device to the access device to conducta transaction. To pro-
`vide a secure operating environmentto securely store account
`information on a portable communication device, a secure
`element such as subscriber identity module (SIM)card, spe-
`cialized integrated chip embeddedinto the portable commu-
`nication device, or specialized component provided asafter-
`market solution is used. At the time of a transaction, the
`secure element communicates directly with a contactless
`interface (e.g., a near-field communication (NFC) trans-
`ceiver) of the portable communication device to pass pay-
`ment data to a contactless reader of the access device. A
`secure element is considered secure because account infor-
`
`mationis stored in tamper-resistant hardware, which protects
`the account information from malware or viruses that may
`have infected the operating system or an application running
`on the portable communication device.
`
`[0004] However, a secure elementused in a portable com-
`munication device is typically not under the control of a
`financial institution, but is instead under the control of a
`mobile network operator (MNO). Asa result, an issuer and/or
`payment processor may not have direct access to a secure
`elementto provision it with account credentials and payment
`functionalities. In order to gain access to a secure element, an
`issuer and/or payment processor may haveto establish com-
`mercial agreements and technical connectivity with the party
`controlling the secure element to perform over-the-air (OTA)
`personalization of the secure element. This is both a cumber-
`some and complex process. Furthermore, incorporating a
`secure element adds to the manufacturing cost of the portable
`communication device, and increasesthe costofthe finished
`portable communication device.
`
`[0005] Thus, in some cases, it would be desirable to use a
`portable communication device that does not have a secure
`element to make payments. Or, ifthe portable communication
`device does have a secure element, it may be desirable not to
`
`rely on the use of the secure element. However, because a
`secure element is not used, transaction security will be a
`concern.
`
`[0006] Embodiments ofthe present invention address these
`and other problems individually and collectively. Specifi-
`cally, embodiments of the invention address the problem of
`security concerns with conducting paymenttransactions with
`amobile communication device that does not have or does not
`
`rely on a secure element.
`
`BRIEF SUMMARY
`
`[0007] Embodiments of the present invention provide tech-
`niques for enhancing the security of a communication device
`(e.g., a portable communication device) when conducting a
`transaction using the communication device. The techniques
`described herein can be used with a communication device
`that may or may not have a secure element, because the
`techniques do not require the use of a secure element to
`safeguard account credentials. Embodiments ofthe invention
`instead utilize limited-use account parameters that may have
`a limitedlifespan, and once expired, may no longer be used to
`conduct a transaction until the limited-use account param-
`eters are replenished from the cloud (e.g., a remote com-
`puter). Hence, transactions conducted using the techniques
`described herein maybereferred to as “cloud-basedtransac-
`tions.”
`
`[0008] According to some embodiments, a method for
`enhancing the security of a communication device when con-
`ducting a transaction using the communication device may
`include receiving, from a remote computer, a limited-use key
`(LUK)thatis associated with a set of one or more limited-use
`thresholdsthat limits usage ofthe LUK. The method mayalso
`include generating, by the communication device, a transac-
`tion cryptogram using the LUK,and sending, by the commu-
`nication device to an access device, a token instead ofa real
`account identifier and the transaction cryptogram to conduct
`the transaction. The transaction can be authorized based on at
`
`least whether usage ofthe LUKhasexceededthe set ofone or
`more limited-use thresholds.
`
`[0009] According to some embodiments, a communication
`device may include a processor; and a memory coupledto the
`processor and storing a mobile application that performs
`operations for enhancing security of the communication
`device when conducting transactions using the communica-
`tion device. The operations may include receiving a limited-
`use key (LUK)that is associated with a set of one or more
`limited-use thresholdsthat limits usage of the LUK, generat-
`ing a transaction cryptogram using the LUK,and sending a
`token instead of a real accountidentifier and the transaction
`
`cryptogram to conduct the transaction. The transaction may
`be authorized basedon at least whether usage of the LUK has
`exceededthe set of one or more limited-use thresholds.
`
`[0010] According to some embodiments, a method for
`enhancing the security of a communication device when con-
`ducting a transaction using the communication device may
`include encrypting, by a computer, account information with
`a first encryption key to generate a second encryption key, and
`encrypting key index information using the second key to
`generate a limited-use key (LUK), wherethe key index infor-
`mation includes a key index having information pertaining to
`generation ofthe LUK. The method mayalso include provid-
`ing the LUKandthe key index to the communication device
`to facilitate generation ofa transaction cryptogram for a trans-
`
`18
`
`18
`
`

`

`US 2015/0178724 Al
`
`Jun. 25, 2015
`
`action conducted using the communication device. The trans-
`action can be authorized based on the LUKandthe transac-
`
`tion cryptogram.
`[0011] According to some embodiments, a computer for
`enhancing the security of a communication device when con-
`ducting a transaction using the communication device may
`include a processor, and a memory storing computer readable
`code, which when executes by the processor, causes the com-
`puter to encrypt account information with a first encryption
`key to generate a second encryption key, encrypting key index
`information using the second key to generate a limited-use
`key (LUK), and provide the LUK and the key index to the
`communication device to facilitate generation of a transac-
`tion cryptogram for a transaction conducted using the com-
`munication device. The key index information may include a
`key index having information pertaining to generation of the
`LUK.Thetransaction can be authorized based on the LUK
`and the transaction cryptogram.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG.1 illustrates a block diagram of an example of
`[0012]
`acloud-basedtransaction system, according to some embodi-
`ments.
`
`FIG.2 illustrates a communication flow diagram of
`[0013]
`an example of an enrollment and provisioning process,
`according to some embodiments.
`[0014]
`FIG.3 illustrates a communication flow diagram of
`an example of executing an integrated chip based transaction,
`according to some embodiments.
`[0015]
`FIG.4 illustrates a communication flow diagram of
`an example of executing a magneticstripe basedtransaction,
`according to some embodiments.
`[0016]
`FIG. 5 illustrates an example ofa transaction veri-
`fication log, according to some embodiments.
`[0017]
`FIG. 6 illustrates a communication flow diagram of
`an example of a post-paymentverification process, according
`to some embodiments.
`
`FIG. 7 illustrates a communication flow diagram of
`[0018]
`an example of an account parameters replenishmentprocess,
`according to some embodiments.
`[0019]
`FIG.8 illustrates an example of a process for gen-
`erating a transaction cryptogram, according to some embodi-
`ments.
`
`FIG.9 illustrates an example of an encryption func-
`[0020]
`tion, according to some embodiments.
`[0021]
`FIG. 10 illustrates a flow diagram of an example of
`a method for enhancing the security of a portable communi-
`cation device, according to some embodiments.
`[0022]
`FIG.11 illustrates a flow diagram of an example of
`another method for enhancing the security of a portable com-
`munication device, according to some embodiments.
`[0023]
`FIG. 12 illustrates a block diagram of an example of
`aportable communication device, according to some embodi-
`ments.
`
`FIG. 13 illustrates a state diagram of an example of
`[0024]
`a mobile application in manual mode, according to some
`embodiments.
`
`FIG. 14 illustrates a state diagram of an example of
`[0025]
`a mobile application in always-on mode, according to some
`embodiments.
`
`FIG. 15 illustrates a state diagram of an example of
`[0026]
`a mobile application in always-on modewith on-deviceveri-
`fication, according to some embodiments.
`
`FIG. 16 illustrates a block diagram of an example of
`[0027]
`a computer system, according to some embodiments.
`
`DETAILED DESCRIPTION
`
`[0028] Embodiments of the present invention provide for
`methods, devices, and systems for cloud-based transactions
`that can be performed by a communication devices with or
`without a secure element. The techniques described herein
`can utilize card emulation technology(e.g., Host Card Emu-
`lation (HCE), etc.) to emulate a smartcard on a communica-
`tion device(e.g., a portable communication device) to allow a
`mobile application running on the portable communication
`device to conduct contactless transactions. In the card emu-
`
`lation environment, a mobile application can access the con-
`tactless interface (e.g., a near-field communication (NFC)
`transceiver) of the portable communication device via the
`operating system (OS)ofthe portable communication device
`without involving a secure element. As compared to secure
`element
`implementations,
`the card emulation approach
`reduces the technical and commercial complexities for issu-
`ers and/or payment processors, because issuers and/or pay-
`ment processors can provision account credentials and pay-
`ment functionalities to a mobile application on a portable
`communication device without having to obtain access to a
`secure element through a mobile network operator.
`
`[0029] By removingthe control of payment functionalities
`and accountcredentials from the confines ofa secure element,
`the tamper-resistant hardware based security provided by a
`secure element can no longer be relied on to safeguard
`account information. Without the requirement that a secure
`element be present, account credentials may be stored in a
`memory ofthe portable communication device thatis not part
`of a secure element, such as the general memory ofthe por-
`table communication device. As such, the account credentials
`maybe susceptible to access by malwareorviruses that may
`have infected an application or operating system of the por-
`table communication device.
`
`To enhance the security of a portable communica-
`[0030]
`tion device when conducting transactions withoututilizing a
`secure element, instead of using stagnant account credentials
`stored on a portable communication device which may be
`valid for the lifetime of an account, the cloud-based tech-
`niques described herein provision a portable communication
`device with limited-use account parameters that have a lim-
`ited usage or lifespan. Whenthe limited usageor lifespan of
`the limited-use account parameters is exhausted, the same set
`of limited-use account parameters may no longer be used to
`conductfurther transactions. In order to conductfurther trans-
`actions using the portable communication device, new lim-
`ited-use account parameters are replenished to the portable
`communication device. The limited-use account parameters
`provided to the portable communication device can be
`renewedor replenished from the network(also be referred to
`as the “cloud”) repeatedly during the lifetime of an account.
`By managing the delivery and lifecycle of the limited-use
`account parameters between a set of network based capabili-
`ties and the portable communication device, the compromise
`of mobile application software and/or account credentials
`stored on a portable communication device becomes only a
`limited security risk, because stolen limited-use account
`parameters can at most be used for only a small number of
`transactions or limited monetary amount.
`
`19
`
`19
`
`

`

`US 2015/0178724 Al
`
`Jun. 25, 2015
`
`Prior to discussing the details of some embodiments
`[0031]
`of the present invention, description of some terms may be
`helpful in understanding the various embodiments.
`[0032] A “communication device” may be a device that
`includes one or more electronic components (e.g., an inte-
`grated chip) that can communicate with another device. A
`“portable communication device” be a communication
`device that can be transported and operated by a user. A
`portable communication device may provide remote commu-
`nication capabilities to a network. The portable communica-
`tion device can be configured to transmit and receive data or
`communications to and from other devices. A portable com-
`munication device maybe in the form ofa mobile device such
`as a mobile phone (e.g., smart phone, cellular phone,etc.),
`tablets, portable media player, personal digital assistant
`devices (PDAs), wearable computing device (e.g., watch),
`electronic reader device, etc., or in the form of a card (e.g.,
`smart card) or a fob, etc. Examples of portable communica-
`tion devices may also include portable computing devices
`(e.g., laptops, netbooks, ultrabooks, etc.).
`[0033] A “server computer’ may include a powerful com-
`puter or cluster of computers. For example, the server com-
`puter can be a large mainframe, a minicomputercluster, or a
`group of servers functioning as a unit. In one example, the
`server computer maybe a database server coupled to a Web
`server. The server computer may be coupledto a database and
`mayinclude any hardware, software, other logic, or combi-
`nation ofthe preceding for servicing the requests from one or
`more client computers. The server computer may comprise
`one or more computational apparatuses and may use any of a
`variety of computing structures, arrangements, and compila-
`tions for servicing the requests from one or more client com-
`puters.
`[0034] An “issuer” maytypically refer to a business entity
`(e.g., a bank) that maintains an account for a user that is
`associated with a portable communication device such as an
`account enrolled in a mobile application installed on a por-
`table communication device. An issuer may also issue
`account parameters associated with the account to a portable
`communication device. An issuer may be associated with a
`host system that performs someorall of the functions of the
`issuer on behalfof the issuer.
`
`associated with, a portable communication device. In some
`embodiments, where an access device may comprise a POS
`terminal, any suitable POS terminal may be used and may
`include a reader, a processor, and a computer-readable
`medium. A reader may include any suitable contact or con-
`tactless mode of operation. For example, exemplary card
`readers can include radio frequency (RF) antennas, optical
`scamners, bar code readers, or magneticstripe readersto inter-
`act with a portable communication device.
`[0038] An “authorization request message” may be anelec-
`tronic message that is sent to request authorization for a
`transaction. The authorization request message can be sent to
`a payment processing network and/or an issuer of a payment
`card. An authorization request message according to some
`embodiments may comply with ISO 8583, which is a stan-
`dard for systems that exchange electronic transaction infor-
`mation associated with a payment made by a user using a
`payment device or payment account. The authorization
`request message mayinclude informationthat can be used to
`identify an account. An authorization request message may
`also comprise additional data elements such as one or more of
`a service code, an expiration date, etc. An authorization
`request message may also comprise transaction information,
`such as any information associated with a currenttransaction,
`such as the transaction amount, merchantidentifier, merchant
`location, etc., as well as any other information that may be
`utilized in determining whether to identify and/or authorize a
`transaction. The authorization request message may also
`include other information such as informationthat identifies
`the access device that generated the authorization request
`message, information about the location ofthe access device,
`etc.
`
`[0039] An “authorization response message” may be an
`electronic messagereply to an authorization request message.
`The authorization response message can be generated by an
`issuing financial institution or a paymentprocessing network.
`The authorization response message may include, by way of
`example only, one or moreof the following status indicators:
`Approval—transaction was approved; Decline—transaction
`was not approved; or Call Center—response pending more
`information, merchant must call the toll-free authorization
`phone number. The authorization response message may also
`include an authorization code, which may be a code that a
`credit card issuing bank returns in response to an authoriza-
`tion request message in an electronic message(either directly
`or through the payment processing network) to the merchant
`computerthat indicates approvalof the transaction. The code
`mayserve as proofof authorization. As noted above, in some
`embodiments, a payment processing network may generate
`or forward the authorization response message to the mer-
`chant.
`
`[0035] A “merchant” may typically be an entity that
`engages in transactions and can sell goods or services, or
`provide access to goods or services.
`[0036] An “acquirer” may typically be a business entity
`(e.g., acommercial bank)that has a business relationship with
`a particular merchantor other entity. Someentities can per-
`form both issuer and acquirer functions. Some embodiments
`may encompass such single entity issuer-acquirers.
`[0037] An “access device” may be any suitable device for
`[0040] The term “authentication” and its derivatives may
`communicating with a merchant computer or payment pro-
`refer to a process by which the credential of an endpoint
`cessing network, andfor interacting with a paymentdevice, a
`(including but not limited to applications, people, devices,
`user computer apparatus, and/or a user mobile device. An
`processes, and systems) can be verified to ensure that the
`access device may generally be located in any suitable loca-
`endpoint is who they are declaredto be.
`tion, such as at the location of a merchant. An access device
`[0041] The term “verification” andits derivatives may refer
`may be in any suitable form. Some examples of access
`to a process thatutilizes information to determine whether an
`devices include POS devices, cellular phones, PDAs, per-
`underlying subjectis valid underagiven set of circumstances.
`sonal computers (PCs), tablet PCs, hand-held specialized
`Verification may include any comparison of information to
`readers, set-top boxes, electronic cash registers (ECRs), auto-
`ensure some data or information is correct, valid, accurate,
`matedteller machines (ATMs),virtual cash registers (VCRs),
`legitimate, and/or in good standing.
`kiosks, security systems, access systems, Websites, and the
`like. An access device may use any suitable contact or con-
`[0042] A “token” may include a substitute identifier for
`tactless mode of operation to send or receive data from, or
`some information. For example, a payment
`token may
`
`20
`
`20
`
`

`

`US 2015/0178724 Al
`
`Jun. 25, 2015
`
`underlying information with a valid key, and comparing the
`result to the received cryptogram.
`[0047] A “limited-use threshold” mayrefer to a condition
`that limits the usage of a piece of information. A limited-use
`threshold may be exceeded or exhausted whenthe underlying
`condition is met. For example, a limited-use threshold may
`include a time-to-live that indicates an amount of time for
`
`includean identifier for a payment accountthat is a substitute
`for an accountidentifier, such as a primary account number
`(PAN). For instance, a token may include a series of alpha-
`numeric characters that may be used as a substitute for an
`original accountidentifier. For example, a token “4900 0000
`0000 0001” may be used in place of a PAN “4147 0900 0000
`1234.” In some embodiments, a token may be “format pre-
`serving” and may have a numeric format that conformsto the
`whichapiece of information is valid, and once that amount of
`account identifiers used in existing payment processing net-
`time has elapsed, the limited-use threshold is exceeded or
`works(e.g., ISO 8583 financial transaction message format).
`exhausted, and the piece of information may becomeinvalid
`In some embodiments, a token may be usedin place of a PAN
`and mayno longer be used. As another example, a limited-use
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket