Supercharge Your Innovation With Domain-Expert AI Agents!

Systems and methods for cryptographic authentication of contactless cards

A cryptographic algorithm, data transmission system technology, used in the activation, transmission system, digital transmission system, etc. of coded identification cards or credit cards

Pending Publication Date: 2021-05-14
CAPITAL ONE SERVICES
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Furthermore, while the increasing use of chip-based financial cards provides more security for personal purchases than previous technologies (e.g., magnetic stripe cards), account access may still rely on login credentials (e.g., username and password) to Confirm cardholder's identity
However, if the login credentials are compromised, others can gain access to the user's account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for cryptographic authentication of contactless cards
  • Systems and methods for cryptographic authentication of contactless cards
  • Systems and methods for cryptographic authentication of contactless cards

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following description of the embodiments provides non-limiting representative examples of reference numerals to particularly describe the features and teachings of various aspects of the present invention. From the description of the embodiments, it should be appreciated that the described embodiments can be implemented separately or in combination with other embodiments. Those of ordinary skill in the art who review the description of the embodiments should be able to learn and understand the various described aspects of the invention. The description of the embodiments should facilitate an understanding of the invention to the extent that other implementations not specifically covered but within the knowledge of those skilled in the art who have read the description of the embodiments will be understood to be consistent with the application of the invention .

[0035] Some embodiments of the present disclosure aim to build one or more keys into one or more contac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Example embodiments of systems and methods for data transmission between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device. The receiving device can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

Description

[0001] CROSS-REFERENCE TO RELATED APPLICATIONS [0002] This application is a continuation-in-part of US Patent Application No. 16 / 205,119, filed November 29, 2018 and claims from US Provisional Application No. 62 / 740,352, filed October 2, 2018, and October 2, 2019 Priority to US Patent Application No. 16 / 591,309, the entire disclosure of which is incorporated herein by reference. technical field [0003] The present disclosure relates to cryptography, and more particularly, to systems and methods for cryptographic authentication of contactless cards. Background technique [0004] Data security and transaction integrity are critical to businesses and consumers. This demand continues to grow as electronic transactions account for an increasing share of business activities. [0005] Email can be used as a tool to verify transactions, but email is vulnerable and vulnerable to hacking or other unauthorized access. Short Message Service (SMS) messages can also be used, but are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07F7/12G06Q20/40G06Q20/38
CPCG07F7/122G06Q20/206G06Q20/38215G06Q20/401G06Q20/354H04L9/0861H04L9/14H04L9/3228H04L9/3242H04L2209/805H04L9/3234G06Q20/3278G06Q20/352G06Q20/40975H04W4/80G06Q20/3829G06Q20/382G06Q20/3674G06Q20/204G06Q20/3226H04W12/041H04W12/108H04W12/47G06F21/35G06F21/606G06F21/77H04L9/0866H04L9/0897G06Q20/227G06Q20/36G06Q20/3823G06Q20/4014G06Q20/108G06Q20/12G06Q20/3825H04L9/0631H04L9/0643H04L9/3271H04L2209/56G06Q20/32G06Q20/409H04L9/002H04L9/0625H04L9/0637H04L9/0891H04L9/0822H04L9/0825H04L9/0863G06Q20/34G06Q20/4097H04L63/0428H04L63/0807H04L63/0853H04L2463/102G06F21/6245G06Q20/3552G06Q20/3563G07F7/0893H04L63/068H04L63/08H04L63/1441G06F21/602G07F9/001G06K7/10297G06K19/07309G06Q10/087H04B5/77H04B5/24H04B5/43H04W12/06G06Q20/40
Inventor 凯文·奥斯本杰弗里·鲁尔斯里尼瓦沙·希古鲁帕蒂
Owner CAPITAL ONE SERVICES
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More