throbber
OMAR TACTAAA
`
`US 20050043997A1
`
`as) United States
`a2) Patent Application Publication 0) Pub. No.: US 2005/0043997 Al
`
` Sahota etal. (43) Pub. Date: Feb. 24, 2005
`
`
`(54) METHOD AND SYSTEM FOR GENERATING
`A DYNAMIC VERIFICATION VALUE
`
`(52) US. C0. eee eceecsseseesseessssnsssnceaseesrensesnscnscenseeses 705/16
`
`(76)
`
`Inventors: Jagdeep Singh Sahota, Rodeo, CA
`(US); Christian Aabye, Foster City, CA
`(US)
`
`(57)
`
`ABSTRACT
`
`Correspondence Address:
`Pepper Hamilton LLP
`50th Floor
`One Mellon Center
`500 Grant Street,
`.
`Pittsburgh, PA 15219 (US)
`
`Methods and systems for dynamically generating a verifi-
`cation value for a transaction and for utilizing such value to
`verify the authenticity of the payment service application.
`The dynamically created verification value may be gener-
`ated on a paymentdevice, such as an integratedcircuit credit
`card or smart card, embedded into the payment data, and
`transmitted to a point of sale terminal. Alternatively, pay-
`ment data is sent by a payment device to a point of sale
`(21) Appl. No.: terminal, which generatesaverification value and embedsit10/642,878
`
`
`(22)
`Filed:
`Aug.18, 2003
`into the payment data. The embedded verification value is
`used by a service provider to verify the authenticity of the
`transaction. The methods and systems may be used in a
`contactless (wireless) environment or a non-wireless envi-
`ronment.
`
`Publication Classification
`
`(SL) Ute C0 eee ceeccccsssssssssneescceceennnnseeseeseee GO06F 17/60
`
`102
`1
`
`108
`
`Padding Character
`
`
`
`1
`
`SAMSUNG 1013
`
`of the 16 digi PAN 104
`
`Overlay the ATC on
`
`ATC
`the faft most 4 digits
`
`
`PAN
`
`Expiry Date
`Expiry Date
`
`SVC Code
`SVC Code...
`
`
`= 128 hits
`
`SAMSUNG 1013
`
`1
`
`

`

`Patent Application Publication Feb. 24,2005 Sheet 1 of 7
`
`US 2005/0043997 Al
`
`
`
`g0Lé01
`
`Syd82}=‘|
`
`O1W
`
`apoa3P0DAS|amahie10DSAS
`
`
`978QAdlcx3apuepaueyNvdayegAuidk3
`
`afolyv0!
`
`Ott
`
`vfay
`
`@-polg
`
`S40bo
`
`SLL
`
`vel
`
`Ob
`
`NvWEipopeijo
`
`
`
`
`
`JapessydBulppegolyUOSiay)ABHaAG,
`
`suéippsowyeyour
`
`2
`
`
`
`
`
`

`

`Patent Application Publication Feb. 24,2005 Sheet 2 of 7
`
`US 2005/0043997 Al
`
`201
`
`202
`
`203
`
`204
`
`Account number
`
`Account sequence
`number
`
`
`Inverse of account
`number
`
`Inverse of account
`sequence number
`
`210
`
`Account sequence| Inverse of account|Inverse of account
`Padding
`Account number
`number
`number
`sequence number
`
`
`MasterDerivation
`
`
`
`220
`
`230
`
`
`
`Key (MDK)
`
`
`
`
`
`Data encryption
`
`Unique Derived Key
`(UDK)
`
`240
`
`FIG. 2
`
`3
`
`

`

`Patent Application Publication Feb. 24,2005 Sheet 3 of 7
`
`US 2005/0043997 Al
`
` Extract nibbles
`
`with decimal
`values from 0 to 9
`
` values in holding
`
` 305
`
`string by
`concatenating on
`right of previous
`value
`
` Extract nibbles
`
`with hexadecimal
`
`values from A to F
`
`301
`
`310
`
` Decimalize
`
`
` 315
`
`extracted value by
`subtracting
`
`hexadecimal
`
` values in holding
`string by
`concatenating on
`right of previous
`alue
`
` 320
`
`
` Extract 3 most
`
`
` 325
`
`significant nibbles
`from holding string
`
`to generate dCVV
`
`
`
`
`FIG. 3
`
`4
`
`

`

`Patent Application Publication Feb. 24,2005 Sheet 4 of 7
`
`US 2005/0043997 Al
`
`415
`
`PEPPERELL 3 0
`
` |in|
`.Hg
`=
`
` =|
`PPEEPEET|
`
`
`
`‘|“|EPL|
`
`
`ee
`>|
`
`|is|
`
`ce
`as
`“a
`
`401
`
`5
`
`

`

`Patent Application Publication Feb. 24,2005 Sheet 5 of 7
`
`US 2005/0043997 Al
`
`POS
`
`cOS
`
`6
`
`

`

`Patent Application Publication Feb. 24,2005 Sheet 6 of 7
`
`US 2005/0043997 Al
`
`
`dCVV embedded
`
`
`
`Magnetic stripe
`
`
`Payment device
`into magnetic
`
`data transmit to
`generates dCVV
`
`stripe
`POSterminal
`
`
`
`data format
`
`
`610
`
`620
`
`POSterminal
`
`passes MSdata
` Service provider
`
`
`receives MS data
`on to service
`
`provider
`
`
`
`615
`
`
`s ATC next in
`Possible data
`Standard magnetic
`
`
`Contactless?
`stripe processing
`sequence?
`skimming
`
`
`
`
`
`
`
`
`645
` 660
`
` Generate dCVV
`for the transaction
`
`
`
`Service provider
`
`
`Transaction may
`dCVV = payment
`be approved
`
`device dCVV?
`
`
`
`655
`
`Terminate
`
`
`Store ATC
`
`FIG. 6
`
`7
`
`

`

`Patent Application Publication Feb. 24,2005 Sheet 7 of 7
`
`US 2005/0043997 Al
`
`701
`
`720
`
`Service provider
`receives MS data
`
`POS device
`passes MS data
`on to service
`provider
`
`710
`
`ms
`
`
`
`Magnetic stripe
`data transmit to
`
`POSdevice
`
`
`
`POSdevice
`computes
`verification value
`
`Verification value
`embeddedinto
`magnetic stripe
`data format
`
`
`
`
`
`
`Is additional
`Possible data
`
`
`data next in
`skimmin
`
`9
`sequence?
`
`
`
`Generate
`
`verification value
`735
`for the transaction
`
`
`
`
`
`Service provider
`
`Transaction may
`verification value = POS
`.
`
`
`be approved
`device verification
`Terminate
`
`value?
`
`
`
`Store additional
`
`
`
`data
`
`FIG. 7
`
`748
`
`750
`
`8
`
`

`

`US 2005/0043997 Al
`
`Feb. 24, 2005
`
`METHOD AND SYSTEM FOR GENERATING A
`DYNAMIC VERIFICATION VALUE
`
`BACKGROUND OF THE INVENTION
`
`[0001] As methods and devices for engaging in financial
`transactions have increased and expanded into new hori-
`zons, age old problems such as fraud and counterfeiting
`persist. In fact, as applications and devices are developed
`which make credit or debit based transactions a more
`
`attractive and readily available alternative to cash, fraud and
`counterfeiting activities have seen a proportionate increase.
`
`In order to protect financial institutions, consumers
`[0002]
`and merchants from the fraudulent use of transaction cards,
`the industry has developed and introduced many features
`designed to reduce fraud and counterfeiting such as holo-
`grams, special over-layers, and watermarks. Nonetheless,
`many of these features are proving to be less effective as
`financial transactions are increasingly being conducted in a
`wireless environment. Similarly, as financial instruments are
`increasingly being employed on electronic devices, rather
`than physical plastic cards, the ability to use techniques such
`as a customer signature or hologramsto verify a party to a
`transaction is becomingless available.
`
`[0003] One of the primary sources of fraud which is
`prevalent in the credit card industry is skimming, which
`refers to the electronic copying of the card’s magneticstripe
`data to create counterfeit cards. Early skimming wasdifficult
`to hide and required cumbersome equipment. As credit card
`technology has become more sophisticated, so has the
`technology used by skimmers.
`
`In addition, new forms of skimming have appeared.
`[0004]
`For example, in one instance a small bug was implanted in
`a terminal, and left in place for weeks to collect hundreds of
`card numbers before being removedto harvest the collective
`card data. Also, one of the more insidious forms of skim-
`ming involved line tapping wherein the communication
`lines between the terminal and the credit card issuer is
`tapped and the card data extracted from the communications
`string. One of the most sophisticated examples of line
`tapping involved skimmers renting an office next
`to an
`issuers regional data center and tapping lines going to the
`issuer computers. The tapped lines were redirected through
`a computer on the skimmer’s site. Compounding the prob-
`lem, the skimmers were able to remotely access their com-
`puter thus permitting the skimmersto harvest the credit card
`numbers from a remote location. By some estimates, skim-
`ming costs financial
`institutions hundreds of billions of
`dollars annually. Furthermore, some industry analysts have
`estimated that each skimmed card will engage in at least
`$2,000 in transactions before the fraud is uncovered.
`
`[0005] Skimming is predominantly a phenomenonafflict-
`ing magnetic stripe based transactions. This is because the
`magnetic stripe, which is placed on the back of a transaction
`card and stores a variety of data on three separate tracks,is
`a passive media. In other words, the digital content of the
`magnetic stripe can be perfectly copied, without any differ-
`ence between the copy andthe original. Largely, this feature
`is relied upon in legitimate magnetic stripe transactions as a
`point of sale terminal is simply required to read the data
`present on the magnetic stripe.
`
`[0006] One of the primary means by which skimming can
`be prevented is for the consumer to closely monitor the
`
`whereabouts of their transaction card. This will allow the
`consumer to prevent the card from being swiped through
`inappropriate devices. However, as magnetic stripe contact-
`less cards evolve and bring the promise of quick transactions
`to current payment environments,
`the classic skimming
`problem comesalong with it. In fact, in a wireless environ-
`ment the opportunity to skim magnetic stripe data is more
`prevalent. In a wireless environment, a potential skimmer
`need not physically possess the card to be skimmed nor have
`access to any of the physical equipment (e.g. POS terminal,
`communication lines, etc.) which is required for skimming
`in a wire based environment. A skimmer can simply, and
`without knowledge of the consumer or merchant, intercept
`the wireless transaction and copy the data being transmitted
`from the card to POS terminal.
`
`[0007] Nonetheless, magnetic stripe data and magnetic
`stripe paymentapplications are increasingly being deployed
`on integrated circuit cards or similar devices which have
`processing capabilities. Accordingly, what is needed is to
`dynamically generate a verification value for each transac-
`tion which can be used to authenticate the transaction. Such
`an approach to authentication of the payment service will
`significantly reduce the opportunity for skimming since the
`verification valueis different for each transaction. Therefore,
`even if the data utilized in a given transaction is skimmed,
`that data will not be useful in conducting further transactions
`since the skimmedverification value is not valid for subse-
`
`quent transactions.
`SUMMARYOF THE INVENTION
`
`invention describes a system and
`[0008] The present
`method for dynamically generating a verification value for
`verifying the authenticity of a payment service deployed on
`a payment device, such as an integrated circuit credit card,
`each time the payment service is utilized in a transaction.
`With each transaction, a verification value is dynamically
`generated on the payment device from data specific to the
`paymentservice. The verification value is embeddedinto the
`payment data which is transmitted from the payment device
`to a point of sale terminal such as a credit card terminal. The
`point of sale terminal transmits the payment data, with the
`embedded verification data, which may be in the form of
`magnetic stripe credit card Track 1 and/or Track 2 data, to
`a payment network which transmits the payment data to a
`service provider computer. The service provider computer
`independently generates a verification value. The transaction
`is disapprovedif the service provider generated verification
`value does not match the payment device generated verifi-
`cation value.
`
`In an alternate embodiment, payment data gener-
`[0009]
`ated with each transaction on the payment device is trans-
`mitted from the payment device on which the payment data
`wasgenerated to a point of sale terminal such as a credit card
`terminal. A verification value may be generated by the point
`of sale terminal using the payment data and information
`contained within the point of sale device. The point of sale
`terminal transmits the payment data, with the verification
`data, which maybein the form of magnetic stripe credit card
`Track 1 and/or Track 2 data, to a payment network which
`transmits the payment data to a service provider computer.
`The service provider computer independently generates a
`verification value. The transaction is disapproved if the
`service provider generated verification value does not match
`the verification value generated on the pointof sale terminal.
`
`9
`
`

`

`US 2005/0043997 Al
`
`Feb. 24, 2005
`
`[0010] The present invention may be used in any transac-
`tion in which magnetic stripe Track 1 and/or Track 2 data
`will be exchanged over any type of interface including
`contact-based interfaces and wireless interfaces.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0011] Aspects, features, benefits and advantages of the
`embodiments of the present invention will be apparent with
`regard to the following description, appended claims and
`accompanying drawings where:
`
`[0012] FIG. 1 depicts the method of creating an encrypted
`data block for use in the present invention.
`
`[0013] FIG. 2 depicts a method for generating unique
`derived keys from data residing on a payment device.
`
`[0014] FIG. 3 depicts a method for extracting portions of
`an encrypted data block for creating a dynamic card verifi-
`cation value according to the present invention.
`
`[0015] FIG. 4 depicts an exemplary record format for use
`in an embodimentof the present invention.
`
`[0016] FIG. 5 depicts an alternative exemplary format for
`use in an embodimentof the present invention.
`
`[0017] FIG. 6 is a flowchart of a preferred method of
`utilizing a dynamically created verification value to authen-
`ticate a transaction.
`
`[0018] FIG. 7 is a flowchart of an alternate method of
`utilizing a dynamically created verification value to authen-
`ticate a transaction.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`[0019] Before the present methodsare described,it is to be
`understood that this invention is not limited to the particular
`methodologies, devices or protocols described, as these may
`vary. It is also to be understood that the terminology used in
`the description is for the purpose of describing the particular
`versions or embodiments only, and is not intended to limit
`the scope of the present invention which will be limited only
`by the appended claims. In particular, although the present
`invention is described in conjunction with financial trans-
`actions, it will be appreciated that the present invention may
`find use in any electronic exchange of data.
`
`It must also be noted that as used herein and in the
`[0020]
`appended claims, the singular forms “a”, “an”, and “the”
`include plural reference unless the context clearly dictates
`otherwise. Thus, for example, reference to a “key” is a
`reference to one or more keys and equivalents thereof
`knownto those skilled in the art, and so forth. Unless defined
`otherwise, all technical and scientific terms used herein have
`the same meanings as commonly understood by one of
`ordinary skill in the art. Although any methods similar or
`equivalent to those described herein can be used in the
`practice or testing of embodiments of the present invention,
`the preferred methods are now described. All publications
`mentioned herein are incorporated by reference. Nothing
`herein is to be construed as an admission that the invention
`is not entitled to antedate such disclosure by virtue of prior
`invention.
`
`[0021] Generally, the present invention provides methods
`and systems for dynamically generating a card verification
`
`value for each transaction and for utilizing such value to
`verify that the paymentservice is authentic and has not been
`skimmed. The dynamically generated Card Verification
`Value (referred to herein as the “dCVV”) is generated on the
`payment device, embedded into the payment data, and
`transmitted to a point of sale terminal.
`In an alternate
`embodiment, payment data is received from a payment
`device, a verification value is generated by a pointof sale
`terminal, and the verification value is embedded into the
`paymentdata.
`
`In an embodiment, data received by the point of
`[0022]
`sale terminal is interpreted as simply payment data (e.g.
`standard magnetic stripe Track 1 and/or Track 2 data without
`an embedded dCVV)bythe pointof sale terminal. The point
`of sale terminal passes on the received data to a payment
`network which, in turn, passes the data on to the service
`provider. If the service provider determines the transaction
`is one for which a dCVV is required, the service provider
`independently generates a verification value. If the verifi-
`cation value generated by the service provider does not
`match the dCVV received from the payment device, the
`transaction is identified as potentially fraudulent and disap-
`proved.
`
`In an alternate embodiment, data is received by the
`[0023]
`point of sale terminal and is used by the point of sale
`terminal to generate a verification value. The point of sale
`terminal passes on the received data to a payment network
`which,in turn, passes the data on to the service provider. The
`service provider
`independently generates a verification
`value. If the verification value generated by the service
`provider does not match the dCVV received from the point
`of sale terminal, the transaction is identified as potentially
`fraudulent and disapproved.
`
`[0024] For purposesofthis application, the term “payment
`device” shall mean any device comprising a microprocessor
`which may be used in a transaction or data exchange as
`described herein. Without
`limiting the generality of the
`foregoing, “payment device” shall
`include an integrated
`circuit card (also commonly known as a smartcard), a
`memory card, a cellular telephone, a personal digital assis-
`tant, a mobile electronic device, or a computer.
`
`[0025] For purposes of this application, “contactless” or
`“wireless” shall mean any communications method or pro-
`tocol,
`including proprietary protocols,
`in which data is
`exchanged between two devices without the need for the
`devices to be physically coupled. Without
`limiting the
`generality of the foregoing, “contactless” or “wireless” shall
`include data transmissionsbylaser, radio frequency, infrared
`communications, Bluetooth, or wireless local area network.
`
`[0026] For purposes ofthis application, the term “payment
`service” shall mean any application deployed on a payment
`device which causes the exchange of data between the
`payment device and any other device or location. It should
`be appreciated that “payment service” is not
`limited to
`financial applications.
`
`[0027] For purposes of this application, “payment data”
`shall mean, with respect to financial applications those data
`elements used by the paymentservice to execute a transac-
`tion, and with respect
`to non-financial
`transactions any
`necessary data elements exclusive of the present invention.
`For example, when the paymentservice is a magneticstripe
`
`10
`
`10
`
`

`

`US 2005/0043997 Al
`
`Feb. 24, 2005
`
`credit card transaction, “payment data” would comprise
`Track 1 and/or Track 2 data, as that is understood by one of
`ordinary skill in the credit card industry, such as the primary
`account number, expiration date, service codes, and discre-
`tionary data. “Payment data” may also comprise a unique
`card identification numberor a unique identification number
`for a service provider.
`
`In an embodiment, the payment data will reside on
`[0028]
`memorylocated on the payment device. The payment device
`will also maintain an application transaction counter (ATC).
`The ATC will initially be set by the service provider to a
`predetermined value. Thereafter,
`the ATC will be incre-
`mented with each transaction. Alternately, the ATC may be
`decremented from its initial predetermined value with each
`transaction. The ATC may be a value of any length. In
`addition, the service provider which deployed the payment
`service will maintain a corresponding ATC accessable to the
`service provider’s computer. As discussed in more detail
`below, this corresponding ATC is used to identify payment
`services which may have been skimmed. In an alternate
`embodiment, a cryptogram, digital signature, or hash value
`based on transaction data may be used in place of or in
`conjunction with the ATC.
`
`[0029] Each time the paymentservice is initiated, a dCVV
`is generated on the payment device for authentication pur-
`poses. FIG. 1 depicts the method of generating a dCVV for
`each transaction according to the present invention. Initially,
`a numeric string of predetermined length is created. This
`numeric string is created by overlaying 101 the ATC 102
`over the corresponding leftmost digits of the account num-
`ber for the payment service or PAN 104. This numeric string
`is concatenated on the right with the expiration date for the
`paymentservice and the service code to produce a concat-
`enated value 106. If necessary, padding characters 108 are
`concatenated 110 on the right of the concatenated value 106
`to form a numeric string 112 with a predetermined fixed
`length. In a preferred embodiment, this numeric string 112
`is 128-bits in length, although a numericstring of any length
`may be used. The padding characters 108 may consist of a
`stream of 0’s, 1’s, or any other numeric value that is known
`both to the payment device and the service provider. The
`numeric string 112 is bisected into two blocks of equal
`length, Block A 116 and Block B 118. Block A 116 is then
`encrypted 121 with a first encryption key 120. The result of
`the encryption step 121 is Block C 122 of length equal to
`Block A 116. Block C 122 is then exclusively OR’ed (XOR)
`123 with Block B 118 resulting in Block D 124. Block D 124
`is then encrypted 125 with a second encryption key 126 to
`produce Block E 128. Block E 128 is then decrypted 129
`using a decryption key 130 to produce Block F 132. Block
`F 132 is then encrypted 133 using a fourth encryption key
`134 to produce Block G 136.
`
`It will be apparent to one of ordinary still in the art
`[0030]
`that the first encryption key 120, the second encryption key
`126, the third encryption key 130 and the fourth encryption
`key 134 may take any preselected value. In an embodiment
`of the present invention, the first encryption key 120, the
`second encryption key 126, and the fourth encryption key
`134 are equivalent and of a different value from the third
`encryption key 130. Other permutations of the encryption
`key values utilized in the methodology of FIG. 1 are within
`the scope of the present invention.
`
`Ina preferred embodiment,the first encryption key
`[0031]
`120, the second encryption key 126, the third encryption key
`130, and the fourth encryption key 134 take the value of
`unique keys derived from data existing on the payment
`device. Upon deployment, each paymentservice is person-
`alized by the service provider with a master derivation key.
`The master derived key may be deployed with payment
`services in batches (i.e. multiple payment services receive
`the same master derived key) or individually. Each payment
`device will be personalized with the functionality to derive
`keys unique to the payment service. FIG. 2 shows the
`methodology for deriving two unique keys which are uti-
`lized in the preferred embodiment. The account number201,
`the account sequence number 202, the inverse of the account
`number 203, and the inverse of the account sequence num-
`ber 204 are concatenated together to create a concatenated
`value 210. If necessary, the concatenated value 210 may be
`padded with zeroes, or some other value 211, to create a
`string of a predetermined fixed length.
`In a preferred
`embodiment, the concatenated value 210 may be 128 bits in
`length, although the concatenated value is not limited to
`being this length. The concatenated value 210 is then
`encrypted 220 using the master derivation key 221 as the
`encryption key for each encryption stage. The encryption
`utilized may include any type of encryption methodology.
`For example, this encryption step may utilize Triple-DES
`encryption. The value resulting from the encryption step 220
`is a unique derived key or UDK 230 for the application
`identified by the account number. Two additional keys,
`UDKA 240 and UDKB 241, are derived from the UDK. The
`derivation of UDKA 240 and UDKB 241from the UDK 230
`may take any form, including assigning the value of the
`leftmost half of the UDK 230 to UDKA 240,and assigning
`the value of the rightmost half of the UDK 230 to UDKB
`241. Alternatively,
`the UDKA 240 may be derived by
`selecting alternating or other predetermined bit sequences
`from the UDK 230 while the remaining bits are assigned to
`UDKB 241. Furthermore,
`there is no requirement
`that
`UDKA 240 and UDKB 241are of equal length.
`
`[0032] Returning now to the result of the methodology set
`forth in FIG. 1. FIG. 3 describes the further processing
`required to generate the dCVV. Each nibble (4-bit grouping)
`of the value stored in Block G 136 is subjected to two
`separate iterative processes to evaluate the value of each
`nibble. As shown in FIG. 3, beginning with the most
`significant (i.e left most) digit of Block G 136 and exam-
`ining each sequential nibble, if a nibble contains a value
`ranging from zero to nine, inclusive, that value is extracted
`301 and placed in a new numeric string 305, referred to
`herein as a holding string, by concatenating the extracted
`value to the right of the previously extracted value, if any.
`The result will be that the holding string containsa series of
`values ranging from zero to nine, inclusive, which appear
`from left to right in the holding string in the same sequence
`in which they appear in Block G 136.
`
`[0033] Asecond evaluation is then performed again begin-
`ning with the most significant digit of Block G 136 and
`examining each sequential nibble. If a nibble contains a
`hexadecimal value ranging from ten (A) to fifteen (F),
`inclusive, that value is extracted 310. The extracted valueis
`then decimalized by subtracting the hexadecimal value A
`from the extracted value resulting in a decimalized value
`
`11
`
`11
`
`

`

`US 2005/0043997 Al
`
`Feb. 24, 2005
`
`ranging from zero to five 315. This decimalized valueis then
`concatenated on the right to the right most value of the
`holding string 320.
`
`[0034] Once all nibbles in Block G have been twice
`examined as described, the three most-significant(i.e. left-
`most) nibbles of the holding string are extracted 325. This
`3-digit value is the dCVVfor the transaction. Other numbers
`of bits may be extracted from the twice-examined nibble
`string to generate the dCVV fora transaction. Furthermore,
`different nibbles, such as the rightmost nibbles, may be used
`as the dCVVfor a transaction. The three leftmost nibbles,
`however, represent a preferred embodiment.
`
`[0035] Once generated, the dCVV is embedded into the
`payment data transmitted from the payment device to the
`point of sale terminal. The data received by the point of sale
`terminal will appear to the point of sale terminal as standard
`paymentdata. In other words, the point of sale terminal will
`not be able to determine if a dCVV is embedded and where
`
`such dCVV may be located. There is no indication to the
`point of sale terminal that a dCVV is embeddedinto the data
`received from the paymentdevice.
`
`[0036] FIG. 4 depicts an exemplary record format for
`transmitting payment data, with the dCVV embedded
`therein, from the payment device to the point of sale
`terminal. The record format of FIG.4 is created by concat-
`enating a primary account number 401 for the payment
`service, with an expiration date 402, and a service code 403.
`In a preferred embodiment, the primary account number401
`is 16 digits long, the expiration date 402 is four digits long,
`and the service code 403 is three digits long. However, the
`primary account number 401, the expiration date 402, and
`the service code 403 are not limited to being these lengths.
`Next, in a field typically reserved for other uses, a value is
`placed as an indicator 405 that a (CVV has been embedded
`in this record. The value of this indicator is known by the
`service provider which deployed the application on the
`payment device. Next, the ATC 410 is placed in the field
`which may typically be reserved for PIN verification data.
`Finally, the dCVV 415 is concatenated on the right of the
`record. The remainderof the record may comprise additional
`discretionary data.
`
`[0037] Alternately, FIG. 5 depicts a second exemplary
`format for transmitting payment information with the dCVV
`embedded thereon from the payment device to the point of
`sale terminal. The format in FIG. 5 is created by concat-
`enating a primary account number 501 for the payment
`service, with an expiration date 502, a service code 503, a
`PVKI 504, and a field for PIN verification data 505. In a
`preferred embodiment, the primary account number 501 is
`sixteen digits long, the expiration date 502 is four digits
`long, the service code 503is three digits long, the PVKI 504
`is one digit long, and the PIN verification data 505 is four
`digits long. However, the primary account number 501, the
`expiration date 502, the service code 503, the PVKI 504, and
`the PIN verification data 505 are not limited to being these
`lengths. Next, in a single data field 510 each of the dynami-
`cally created CVV, the ATC and the indicator to be used by
`the service provider to identify that a dynamic CVV has
`been embeddedare stored in sequence. The remainderofthe
`record may comprise additional discretionary data.
`
`the service provider to make a determination of the authen-
`ticity of the payment service being utilized. This authenti-
`cation step is not left to merchants, individual point of sale
`terminals, or other third parties or devices. FIG. 6 shows
`how the dCVV is used in a contactless environment to
`permit the service provider to evaluate the authenticity of the
`payment application deployed on the payment device to
`make a determination of whether the payment application
`has been skimmed. Although shownin the embodimentof a
`contactless environment in FIG.6, the present invention is
`not limited to such an environment and maybe used for any
`transaction where magnetic stripe Track 1 and/or Track 2
`data is exchanged using any method or means for commu-
`nicating such data. As shownin FIG.6, the payment device
`generates the dCVV 601, preferably using the methodology
`described above. The dCVV is embedded into the payment
`data 605. In this respect,
`the exemplary record formats
`shown in FIG. 4 or FIG. 5 may be utilized. The payment
`data with the embedded dCVVis transmitted by data com-
`munication to the point of sale terminal 610. The point of
`sale terminal recognizes the received data as in the standard
`format of payment data and passes the data stream on to the
`service provider computer 615, likely via a payment net-
`work (not shown). The service provider computer receives
`620 the payment data with the embedded dCVVandinter-
`rogates the appropriate indicator to determine if the trans-
`action was a contactless transaction or not 625. If the service
`provider computer determinesthat the transaction was not a
`contactless transaction, the transaction is processed in its
`normal manner 630. If the service provider computer deter-
`minesthat the transaction was contactless, the service pro-
`vider computer compares the ATC received from the pay-
`ment device to the corresponding ATC stored on the service
`provider computer to determine if the received ATC is the
`expected next ATC 635. If the ATC received from the
`payment device is not the expected next ATC, the payment
`service deployed on the paymentdevice has potentially been
`skimmed 640. If the expected next ATC is received, the
`service provider computer will independently re-generate
`the dCVV for the given transaction 645 utilizing the same
`process as described above. If the service provider generated
`dCVV matches the dCVV received from the payment device
`650, the service provider deems the payment application to
`be authentic 655. The service provider computer
`then
`replaces the ATC which waspreviously stored on the service
`provider computer with the ATC received from the payment
`device 660 for subsequent authentications. If the service
`provider generated dCVV does not match the dCVV
`received from the paymentdevice, the transaction is poten-
`tially fraudulent and is terminated 665.
`[0039] The methodology of FIG. 6 discussed in conjunc-
`tion with contactless transactions, is not limited thereto. For
`example, the methodology may be utilized with respect to
`transactions above a certain threshold value. In such an
`instance, the service provider, upon deploying the applica-
`tion, would configure the application to generate a (CVV for
`transactions above the threshold. The indicator interrogated
`in Step 625 would then be set for transactions above the
`threshold value. Similarly, the methodology may beutilized
`with respect to any other transaction criteria including, but
`notlimited to, geographic location, use patterns, or any other
`criteria.
`
`[0038] An important aspect of the present inventionis that
`the system of utilizing the dynamically created CVV allows
`
`In an alternate embodiment, the payment device
`[0040]
`transmits paymentdata to a point of sale terminal such as a
`
`12
`
`12
`
`

`

`US 2005/0043997 Al
`
`Feb. 24, 2005
`
`credit card terminal 701. The point of sale terminal receives
`the data and computesa verification value for the transaction
`705. The verification value may be computed in a numberof
`different ways including, without limitation, using a unique
`transaction numberprovided bythe point of sale terminal, a
`timestamp, or a transaction amount added to a timestamp.
`The point of sale terminal may then embed and/or append
`the ve

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket