Method and system for secured transactions

a technology of secured applied in the field of secure transactions and access authorization, can solve the problems of limited ability of trains to follow one another along a given section, opportunity to defraud the system, and often used stolen or counterfeited tokens to gain unauthorized access

Inactive Publication Date: 2007-11-29
SEMTEK INNOVATIVE SOLUTIONS
View PDF0 Cites 278 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0010] For example, in one application, an encryption module can be included to encrypt the data that is read from the token. Preferably, in one embodiment, the data is encrypted as soon as it is read from the token to provide an additional measure of security. To further enhance security in one embodiment, the encryption module, including encryption algorithms and keys, is encapsulated with the data capture device (which may be included with a terminal) and the encapsulation prevents or deters would be tamperers from reverse engineering encryption algorithms for obtaining the keys. Security measures can also be provided to destroy, alter, or otherwise render encryption information unusable in the event of attempted tampering.
[0012] The data capture device can be configured to output a secure data stream that includes encrypted token data. In one embodiment, the data capture device can be configured to package the encrypted token data in the same form and format as conventional non-encrypting systems such that the transaction package can be sent to the terminal in a form and format anticipated by the terminal. In this manner, in one embodiment data capture devices can be plug-and-play compatible with terminals or other transaction processing equipment. Such an embodiment can facilitate upgrades to the transaction processing network to include data security features without requiring extensive retrofits to downstream equipment.
[0014] Another feature that can be provided in accordance with the present invention is a secure transaction module that can be used to, among other functions, decrypt data. For example, in one embodiment, a secure transaction module can be provided at one or more points in the transaction processing network to decrypt data that has been encrypted by the data capture device or to decrypt data that is encrypted on a token. Thus, this decryption functionality can be used to obtain clear text token data to facilitate consummation of the transaction. Secure transaction modules can be placed at appropriate points on the network depending on factors such as network security and desirability of obtaining clear text information at points along the network.
[0019] In one embodiment, the signature information and the token data can be packaged in a format compatible with downstream equipment, and in another embodiment, compatible with conventional equipment to facilitate plug and play compatibility of the data capture device with conventional equipment. The signature information included with the transaction data can be used to authenticate the token. In one embodiment, signatures can be encrypted using keys different from the token data to allow authentication to occur independently of clearing the token data. In another embodiment, the signature can be used as the key to encrypt the token data. In such an embodiment, it is possible to use signatures at the processing end to decrypt the token data. If a card is not authentic, the encrypted data may not be capable of being decrypted by the set of keys available at the processing server. Thus, using the signature to encrypt the data can provide another measure of security.
[0022] In accordance with another embodiment, additional measure of security can be provided by encrypting additional information such as, for example, a PIN code or other ancillary information. For example, PIN codes, passwords, signatures, biometric or other information that may be provided to authenticate a user can also be encrypted to provide a measure of security in that information. Thus, in one embodiment, the encryption module can be used to encrypt this ancillary information. A secure transaction module can likewise be used to decrypt the pin or other ancillary information for appropriate data processing. It is noted that in one conventional application, conventional techniques utilize clear text token data to encrypt the pin in bank card transactions. However, in one embodiment, encrypted token information rather than clear text token information is used as a key to encrypt the pin data. As such, to provide functionality in a conventional network that is anticipating a pin encrypted with clear text information, a feature can be provided to decrypt the pin using the encrypted token information, decrypt the token information, re-encrypt the pin using the clear text token information and forwarding the token information and pin to the transaction processor. Additionally, the token information can be re-encrypted to ensure data security.
[0023] In another embodiment of the invention, features and functionality can be provided to perform batch processing of token transactions. As such, in one embodiment, a secure transaction module can be implemented to include the functionality to process batch transactions from a plurality of sources and for a plurality of transaction processing entities. In one embodiment, a batch settlement file can be provided to the secure transaction module that includes data records for each of the transactions to be settled. Some or all of these transactions may include encrypted data such as, for example, data encrypted by the processes described herein. In one embodiment, when the batch settlement file is received, the data records can be parsed and checked to determine whether any or all of those records are encrypted. Information can be included with the batch settlement file to identify the source of the file, which may be used, in one embodiment, to identify the source of the data which may also identify the appropriate encryption key. The secure transaction module can be configured to obtain the correct key, decrypt encrypted records and return clear text information for settlement processing. Clear text transactions can then be processed for appropriate settlement. In one embodiment, a settlement file may contain transactions for multiple entities and thus may require forwarding the appropriate transaction records to the appropriate settlement entity. In such embodiments, further encryption can be used to provide a measure of security when forwarding the transaction records to the appropriate entities.

Problems solved by technology

The railway token system minimized the likelihood of head on collisions, but this simple token also limited the ability for trains to follow one another along a given section.
One downside of token access, however, is the opportunity to defraud the system.
For example, stolen or counterfeited tokens are often used to gain unauthorized access.
In fact, the Federal Trade Commission reports that credit and charge card fraud costs cardholders and issuers hundreds of millions of dollars each year.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for secured transactions
  • Method and system for secured transactions
  • Method and system for secured transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] According to one or more embodiments of the invention, various features and functionality can be provided to enable or otherwise facilitate various forms of token transactions. Particularly, in accordance with one aspect of the invention, data security techniques such as, for example, various forms of encryption, can be implemented with token systems to provide a measure of security in the token data. In one embodiment, information from tokens of various forms can be encrypted on the token itself and can also be encrypted as the data is read by a data capture device used to read data from the token.

[0010] For example, in one application, an encryption module can be included to encrypt the data that is read from the token. Preferably, in one embodiment, the data is encrypted as soon as it is read from the token to provide an additional measure of security. To further enhance security in one embodiment, the encryption module, including encryption algorithms and keys, is encaps...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems and methods for performing settlement of token access transactions are provided. In one embodiment, the invention provides for batch processing bank card transactions, including receiving transaction records for a plurality of bank card transactions, wherein at least some of the transaction records include encrypted token information; determining whether the transaction records contain encrypted token information; decrypting the encrypted token information for a transaction record that is determined to have encrypted token information; and providing clear text token information obtained by decrypting the encrypted token information for a transaction record for transaction settlement.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application is a continuation of U.S. patent application Ser. No. 11 / 127,862 filed May 12, 2005, which is a continuation-in-part of U.S. patent application Ser. No. 10 / 936,359 filed Sep. 7, 2004. This application also claims the benefit of U.S. Provisional Application No. 60 / 809,546 filed May 30, 2006.TECHNICAL FIELD [0002] Some embodiments of the present invention relate to secure transactions and access authorization. DESCRIPTION OF THE RELATED ART [0003] Token systems have been in use in modern civilization in various implementations to provide and control many forms of access. Access that can be and often times is controlled by tokens can include physical access to rooms, buildings, areas and so on; electronic access to servers and datafiles; electronic account access; and so on. Another form of access controlled by tokens is the ability to conduct transactions such as, for example, credit, debit and other financial transaction...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00
CPCG06F21/72H04L2209/80G06F2221/2107G06K7/082G06Q20/02G06Q20/20G06Q20/32G06Q20/325G06Q20/341G06Q20/3552G06Q20/367G06Q20/382G06Q20/3823G06Q20/3829G06Q20/40975G06Q40/02G07C9/00031G07F7/084G07F7/0873G07F7/0886G07F7/1008G07F7/1016G07F19/206H04L9/0891H04L9/3297H04L2209/56G06F21/83G07C9/22
Inventor HAZEL, PATRICK K.VON MUELLER, CLAY W.YALE, SCOTT R.MOS, ROBERT
Owner SEMTEK INNOVATIVE SOLUTIONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products