Language selection

Search

Patent 2794560 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2794560
(54) English Title: METHOD AND SYSTEM FOR SECURING A PAYMENT TRANSACTION WITH TRUSTED CODE BASE
(54) French Title: PROCEDE ET SYSTEME DE SECURISATION D'UNE TRANSACTION DE PAIEMENT A L'AIDE UNE BASE DE CODE DE CONFIANCE
Status: Dead
Bibliographic Data
(51) International Patent Classification (IPC):
  • G06Q 20/40 (2012.01)
  • H04W 4/24 (2009.01)
  • H04W 12/02 (2009.01)
  • G06Q 20/32 (2012.01)
(72) Inventors :
  • COPPINGER, PAUL D. (United States of America)
(73) Owners :
  • APRIVA, LLC (United States of America)
(71) Applicants :
  • APRIVA, LLC (United States of America)
(74) Agent: GOWLING WLG (CANADA) LLP
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2010-03-29
(87) Open to Public Inspection: 2010-10-07
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2010/029075
(87) International Publication Number: WO2010/114799
(85) National Entry: 2012-09-26

(30) Application Priority Data:
Application No. Country/Territory Date
12/414,423 United States of America 2009-03-30
12/414,446 United States of America 2009-03-30

Abstracts

English Abstract

A mobile payment device (130) provides a trusted code base which obtains a password from a customer for processing a payment transaction and encrypts the password using a public key. The trusted code base may be provided on a removable system module such as a subscriber identity module that is inserted into the mobile payment device (130). Access to the trusted code base by unauthorized processes is prevented to protect the password while unencrypted. The mobile payment device (130) transmits the encrypted password over a network (140) to a transaction host (160). The transaction host (160) decrypts the encrypted password and applies the decrypted password to process the payment transaction.


French Abstract

L'invention porte sur un dispositif de paiement mobile (130) qui fournit une base de commande de confiance qui obtient un mot de passe à partir d'un client pour traiter une transaction de paiement et crypte le mot de passe à l'aide d'une clé publique. La base de code de confiance peut être fournie sur un module de système amovible tel qu'un module d'identité d'abonné (SIM) qui est introduit dans le dispositif de paiement mobile (130). Un accès à la base de code de confiance par des processus non autorisés est empêché pour protéger le mot de passe tant qu'il est non crypté. Le dispositif de paiement mobile (130) transmet le mot de passe crypté sur un réseau (140) à un hôte de transaction (160). L'hôte de transaction (160) décrypte le mot de passe crypté et applique le mot de passe décrypté pour traiter la transaction de paiement.

Claims

Note: Claims are shown in the official language in which they were submitted.





CLAIMS

What is claimed is:


1. A method for obtaining a secure payment transaction, the method performed
by a mobile device and comprising the steps of:

(a) providing a trusted code base for obtaining a password from a customer and

encrypting the password with a public key;

(b) preventing access to the trusted code base by unauthorized processes; and

(c) transmitting the public key encrypted password via a network to a
cryptographic conversion host that decrypts the public key encrypted
password with a private key, encrypts the decrypted password with a secret
key and provides the secret key encrypted password to a transaction host that
decrypts the secret key encrypted password with an identical secret key and
applies the decrypted password to process the payment transaction.


2. The method of claim 1 wherein the payment transaction is an electronic
benefit transfer transaction.


3. The method of claim 1 wherein step (a) comprises providing a trusted code
base storing the password in a volatile memory and, after encrypting the
password, erasing
the password in volatile memory.


4. The method of claim 1, further comprising the step of digitally signing the

trusted code base.


5. The method of claim 4 wherein the step of providing a trusted code base
comprises providing a digital certificate of the cryptographic conversion host
and compiling
the digital certificate into the trusted code base before digitally signing
the trusted code base.


13




6. The method of claim 1 wherein step (a) comprises disabling tone emissions
in the mobile device during entry of the password.


7. The method of claim 1 wherein step (a) comprises encrypting the password
with an RSA public key.


8. The method of claim 1 wherein step (a) comprises providing a removable
system module comprising the trusted code base.


9. The method of claim 8 wherein step (a) comprises providing a trusted code
base storing the password in a volatile memory and, after encrypting the
password, erasing
the password in volatile memory.


10. The method of claim 8, further comprising the step of digitally signing
the
trusted code base.


11. The method of claim 8 wherein step (a) comprises providing a removable
system module operating system and step (b) comprises preventing access to the
trusted
code base by processes not controlled by the removable system module operating
system.


12. The method of claim 1 wherein step (a) comprises providing a subscriber
identity module comprising the trusted code base.


13. The method of claim 12 wherein step (a) comprises providing a trusted code

base storing the password in a volatile memory and, after encrypting the
password, erasing
the password in volatile memory.


14. The method of claim 12, further comprising the step of digitally signing
the
trusted code base.


15. The method of claim 12 wherein step (a) comprises providing a subscriber
identity module operating system and step (b) comprises preventing access to
the trusted
code base by processes not controlled by the subscriber identity module
operating system.



14


16. A mobile device for obtaining a secure payment transaction, the mobile
device comprising:

a trusted code base to which access by unauthorized processes is prevented,
the trusted code base obtaining a password from a customer, storing the
password,
and encrypting the password with a public key; and

means for transmitting the public key encrypted password via a network to a
cryptographic conversion host that decrypts the public key encrypted password
with
a private key, encrypts the decrypted password with a secret key and provides
the
secret key encrypted password to a transaction host that decrypts the secret
key
encrypted password with an identical secret key and applies the decrypted
password
to process the payment transaction.


17. The mobile device of claim 16 wherein the payment transaction is an
electronic benefit transfer transaction.


18. The mobile device of claim 16, further comprising a volatile memory, and
wherein the trusted code base comprises means for storing the password in the
volatile
memory and, after encrypting the password, erasing the password in volatile
memory.


19. The mobile device of claim 16 wherein the mobile device is a mobile phone.


20. The mobile device of claim 16 wherein the mobile device is a personal
digital
assistant.


21. The mobile device of claim 16, further comprising a removable system
module comprising the trusted code base.


22. The mobile device of claim 21 wherein the mobile device is a mobile phone.


23. The mobile device of claim 21 wherein the mobile device is a personal
digital
assistant.




24. The mobile device of claim 21 wherein the removable system module
comprises a removable system module operating system and wherein the trusted
code base
is inaccessible to processes not controlled by the removable system module
operating
system.


25. The mobile device of claim 16, further comprising a subscriber identity
module comprising the trusted code base.


26. The mobile device of claim 21 wherein the mobile device is a mobile phone.


27. The mobile device of claim 21 wherein the mobile device is a personal
digital
assistant.


28. The mobile device of claim 21 wherein the subscriber identity module
comprises a subscriber identity module operating system and wherein the
trusted code base
is inaccessible to processes not controlled by the subscriber identity module
operating
system.


16

Description

Note: Descriptions are shown in the official language in which they were submitted.



CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
METHOD AND SYSTEM FOR SECURING A PAYMENT TRANSACTION WITH
TRUSTED CODE BASE

FIELD OF THE INVENTION
The present invention relates to data security and, more particularly, the
securing of
data in payment transactions.

BACKGROUND OF THE INVENTION
A modem point of sale system typically includes a terminal which accepts
payment
cards such as credit and debit cards. When a product is purchased, the
merchant enters
product and price information into the point of sale system. The customer may
then initiate
payment by swiping a payment card through a card reader or providing the card
for the
merchant to do so. The system then communicates via network with a transaction
host that
authorizes and processes the transaction on behalf of a financial institution
that holds the
account with which the payment card is associated.

In order to authorize the transaction, some form of authentication, such as a
signature
or password, must be provided by the paying customer. Debit card transactions,
for
example, typically require the customer to provide a personal identification
number (PIN)
which authenticates the customer to the transaction host. The customer enters
the number
into a PIN Entry Device (PED) and the system then provides the PIN via network
to the
transaction host. The transaction host uses the PIN to confirm the identity of
the user,
confirms sufficient funds are available, debits the customer's account by the
payment
amount, and communicates approval back to the point of sale system.

As it plays a critical role in controlling access to the customer's account,
it is
essential for the PIN to remain confidential. For this reason, security
measures are applied
to ensure the PIN is not discovered during the transaction. This includes
encryption of the
PIN, before it is transmitted from the point of sale system to the transaction
host, into a
format essentially undecipherable by anyone without a corresponding decryption
key.

1


CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
Conventional point of sale systems have typically employed symmetric (shared)
key
algorithms to encrypt the PIN. That is, the PIN is encrypted by the system
using a secret
key and then transmitted to the transaction host where it is decrypted using a
secret key that
is identical to the one used to encrypt it. For some types of transactions,
symmetric key
encryption is required by the transaction host. Electronic Benefit Transfer
(EBT)
transactions, for example, require the PIN to be encrypted with a shared
secret key.
Maintaining an encryption key within the point of sale system leaves it
potentially
vulnerable to discovery. For this reason, the secret key used to encrypt the
PIN is required
to reside only within the PED into which the PIN is entered, and stringent
physical
requirements and regulations are applied to prevent physical or electronic
tampering with
the PED. Such measures may be prohibitively burdensome to merchants and, even
when
employed, may not entirely overcome the vulnerability of the shared secret key
approach.

Furthermore, utilization of the symmetric key encryption approach described
above
essentially limits PIN-based transactions to fixed location PEDs because the
lack of physical
control renders it prohibitively expensive to secure a shared secret key in a
mobile device
such as a mobile phone or personal digital assistant.

It would therefore be desirable to provide a means for securing a payment
transaction
which overcomes the disadvantages inherent in the use of a symmetric key
algorithm. It
would also be desirable to provide a means for securing a payment transaction
that utilizes a
mobile device.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention is described in terms of the preferred embodiments set out below
and
with reference to the following drawings in which like reference numerals are
used to refer
to like elements throughout.
FIG. 1 is a block diagram illustrating a system in which a secure payment
transaction
is performed in accordance with an embodiment of the present invention.

2


CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
FIG. 2 is a flow diagram illustrating a process performed by a mobile payment
device to obtain a secure payment transaction in accordance with an embodiment
of the
present invention.

FIG. 3 is a flow diagram illustrating a process performed by a cryptographic
conversion host to secure a payment transaction in accordance with and
embodiment of the
present invention.

FIG. 4 is a flow diagram illustrating a process performed by a transaction
host to
perform a secure payment transaction in accordance with an embodiment of the
present
invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
A method is provided for obtaining a secure payment transaction on a mobile
device.
A password is obtained from a customer and encrypted with a public key. The
encrypted
password is provided over a network and decrypted with a corresponding private
key. The
decrypted password is then applied to process the payment transaction. In one
embodiment,
the public key encrypted password is transmitted to a cryptographic conversion
host that
decrypts the public key encrypted password with the corresponding private key,
re-encrypts
the password with a secret key, and then provides the secret key encrypted
password to a
transaction host that decrypts it with an identical secret key and applies the
decrypted
password to process the payment transaction.
In order to protect the initially unencrypted password, a trusted code base is
provided
for obtaining and encrypting the password. The trusted code base may be
provided directly
on the mobile device or, alternatively, on a removable system module such as a
subscriber
identity module residing on the mobile payment device. Access to the trusted
code base by
unauthorized processes is prevented to protect the password while unencrypted.
The trusted
code base can be digitally signed, and may include a digital certificate of
the cryptographic
conversion host.

3


CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
The method and system described above provide the advantage of a secure
payment
transaction by providing end-to-end protection of a password utilized in the
payment
transaction. By preventing access to the password while unencrypted and then
encrypting
the password while transmitted from the mobile device to the transaction host,
the password
is protected from unintended discovery.

In embodiments where a cryptographic conversion host is provided to decrypt
the
public key encrypted password and re-encrypt it with a secret key before it is
provided to the
transaction host, the advantages of asymmetric key encryption are further
provided to point
of sale systems utilizing transaction hosts designed to accept symmetric key
encrypted
payment data. One advantage of enabling asymmetric key encryption in the point
of sale
system is that it allows for mobility of the payment device since it can
utilize a public key to
encrypt the payment data and is, therefore, no longer burdened with the
restrictions
associated with maintaining a secret key. This allows for password-based
payment
transactions to be performed by mobile devices such as PDAs and mobile phones,
providing
mobile payment capability with other practical functions in a single mobile
communications
device. Such transactions may include, for example, PIN-based electronic
benefit transfer
(EBT) transactions, where the EBT host is configured to receive and decrypt a
symmetric
key encrypted PIN. An aspect of the invention thus provides the capability of
mobile
payment for EBT transactions by utilizing asymmetric key encryption to encrypt
the PIN in
the mobile payment device and then converting the asymmetric key encrypted PIN
to a
symmetric key encrypted PIN as expected by the EBT host.

FIG. 1 is a block diagram illustrating a system in which a secure payment
transaction
is performed in accordance with an embodiment of the present invention. The
system 100
shown in FIG. 1 provides for a secure payment transaction to be made for the
sale of goods
or services to a customer 110 by a merchant 120 who maintains a mobile payment
device
130. The mobile payment device 130 may be, for example, a Personal Digital
Assistant
(PDA) or mobile phone configured to perform the payment functions described
herein.
The mobile payment device 130 has a processor, volatile and nonvolatile
memory,
and other hardware and firmware elements operating in accordance with system
and
application software appropriate to the functions it provides. The mobile
payment device
4


CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
130 also includes a user interface with input means such as a keypad or
touchpad through
which information can be entered and display means such as a small display
screen
providing information to the user. The mobile payment device 130 includes a
mobile
payment device operating system (MPD OS) 132 which runs applications and
performs
other operating system functions appropriate for mobile devices such as mobile
phones and
PDAs.

The mobile payment device 130 also includes a subscriber identity module (SIM)
135. The subscriber identity module 135 is a smart card that is inserted in
the mobile
payment device 130. The subscriber identity module 135 contains data unique to
the
subscriber and can also be configured to control functions of the mobile
payment device
130. The subscriber identity module 135 contains its own processor and memory
and
includes a subscriber identity module operating system (SIM OS) 137 that is
capable of
running independently of the mobile payment device operating system 132.
The mobile payment device 130 further includes a card reader through which a
payment card such as a credit or debit card can be swiped. The card reader may
be a
magnetic stripe card reader, smart card reader, or any apparatus appropriate
for reading data
from a payment card. In the described embodiment, the card reader is an
internal card
reader included within the mobile payment device 130. Alternatively, the
mobile payment
device 130 can obtain the customer data from an external card reader (not
shown) to which
it is communicatively connected.

The system 100 includes a network 140 over which transaction data necessary to
process the payment transaction is transmitted. The network 140 is any
suitable
telecommunications network having a wireless network component through which
the
mobile payment device 130 communicates, allowing the mobile payment device 130
to have
mobile capability.

The system 100 is provided with a host, referred to herein as a cryptographic
conversion host 150, which converts public key encrypted data into secret key
encrypted
data. The cryptographic conversion host 150 interfaces with the network 140
and includes a
hardware security module 155 which generates and securely stores a private key
it uses to
5


CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
decrypt the public key encrypted data and a secret key it uses to re-encrypt
the decrypted
data. One of ordinary skill in the art will recognize that the cryptographic
conversion host
150 may be implemented in a number of different ways and may be, for example,
part of a
host system that performs other tasks such as data security functions.

The system 100 further includes a transaction host 160 which obtains
transaction
data via the network 140 and processes the payment transaction on behalf of a
financial
institution 170 that holds the account of the customer 110 for the payment
card that has been
used.
FIG. 2 is a flow diagram illustrating a process performed by the mobile
payment
device 130 to obtain a secure payment transaction in accordance with an
embodiment of the
present invention. In step 210, the mobile payment device 130 obtains from the
merchant
120 purchase information such as the price of goods or services provided to
the customer
110. In step 220, the mobile payment device 130 obtains payment information
from the
customer 110, such as an authorization to charge the purchase to his or her
payment card.
For example, customer 110 swipes an Electronic Benefit Transfer (EBT) card
through the
card reader of the mobile payment device 130.

In step 230, the mobile payment device 130 obtains a password from the
customer
110. When certain types of payment cards are utilized, some form of password
must be
provided by the customer 110 to authenticate the customer to the financial
institution that
will process the payment. For example, when a debit card or EBT card is
provided, the
customer 110 is typically required to provide a Personal Identification Number
(PIN.) One
of ordinary skill will recognize, however, that depending on the type of
payment card used,
the application and the circumstances, alternative types of passwords may be
used including
alphabetic, numeric and other characters or values, or various combinations
thereof and that
the present invention can be readily adapted to secure transactions utilizing
such alternative
types of passwords.
Continuing with the example above where an EBT card has been provided in step
220, the mobile payment device 130 in step 230 obtains a PIN from the customer
110 via
the input means provided by the mobile payment device 130, such as by the
customer 110
6


CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
entering the PIN on a keypad or touchpad of the mobile payment device 130.
Where the
keypad or touchpad is designed to emit a tone when pressed, and especially
where different
tones or tonal combinations are associated with different numeric or alpha-
numeric
selections such as with dual-tone multi-frequency (DTMF) tones, the PIN can be
further
protected from discovery by disabling tone emissions in the mobile payment
device 130
during PIN entry.

In step 240, the mobile payment device 130 stores the PIN obtained from the
customer 110 in volatile memory within the mobile payment device 130. In one
advantageous embodiment, the PIN is stored in a buffer within the volatile
memory that is
locked to prevent any transference into a nonvolatile medium. This prevents
the
unencrypted PIN from being accessed by any other processes or recorded in any
way that
can be discovered thereafter.

In step 250, the mobile payment device 130 encrypts the PIN using an
asymmetric
(public key) cryptography algorithm. In an embodiment of the invention, the
mobile
payment device 130 applies an RSA algorithm utilizing Public Key Cryptography
Standard
(PKCS) #1 as defined by RSA Laboratories. Specifically, the mobile payment
device 130
maintains an RSA public key previously generated by the hardware security
module 155 of
the cryptographic conversion host 150 which also generated and continues to
maintain the
corresponding RSA private key. The mobile payment device 130 places the PIN
into the
message portion of a PKCS #1 Type 2 encryption block and applies the RSA
public key to
encrypt the block. Immediately thereafter, in step 260, the mobile payment
device 130
erases the buffer in nonvolatile memory in which the unencrypted PIN was
stored.
During the time the unencrypted PIN resides on the mobile payment device 130
additional protections are provided to ensure it is not compromised. In an
embodiment of
the invention, the functionality (e.g., software and associated memory) that
obtains and
encrypts the PIN (e.g. performs steps 230 to 260) is provided by a trusted
code base. The
trusted code base (which may also be referred to as a trusted computing base)
is isolated
from unauthorized processes (e.g., all other active processes) running on the
mobile payment
device 130 so as to prevent access to the PIN.

7


CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
In accordance with the description herein, one of ordinary skill will readily
implement such a trusted code base in a manner consistent with the
architecture of the
mobile payment device 130. For example, a mobile payment device 130 running
the
Windows Mobile operating system by Microsoft Corporation can employ the
memory
management unit (MMU) that is provided in the underlying computer system. As
is known
in the art, an MMU is a hardware component capable of handling access to the
memory by
the processor and can be utilized to prevent access to unauthorized processes.

Depending on the configuration utilized, greater security of the unencrypted
PIN
may be realized by providing additional protections. For operating systems
environments
that support code signing such as Windows Mobile and Linux, for example, the
trusted
code base can be digitally signed. The digital signature can then be verified
by the operating
system before allowing execution of the trusted code base. This will ensure
that the
software that performs steps 230 to 260 has not been tampered with while
stored on the
mobile payment device 130. An additional advantage of digitally signing the
trusted code
base can be realized by compiling a digital certificate of the cryptographic
conversion host
150 into the trusted code base before it is digitally signed. Verification of
the trusted code
base thus ensures that the digital certificate has not been modified,
preventing, for example,
substitution of a foreign certificate that could perpetuate a "man in the
middle" attack.
In one embodiment, the trusted code base is provided directly on the mobile
payment
device 130. In an alternative embodiment, the trusted code base is provided on
a removable
system module such as a subscriber identity module (SIM) 135 that is inserted
in the mobile
payment device 130. As explained above, the subscriber identity module 135 is
a removable
smart card which includes its own memory, processor and subscriber identity
module
operating system 137 (e.g., Java Card) and can therefore prevent unintended
access to the
PIN by isolating the functionality that obtains and encrypts the PIN from
other active
processes running on the mobile payment device 130.

As the subscriber identity module 135 can be used to control primary functions
of
the mobile payment device 130, initial entry of the PIN can be adequately
controlled by the
SIM-based trusted code base so as to protect the PIN from discovery or
compromise. The
SIM operating system 137 functions independently of the mobile payment device
operating
8


CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
system 132, and processes controlled by the SIM operating system 137 cannot be
directly
accessed by the operating system on the mobile payment device 130 or processes
it controls.
Where appropriate, further protection of the PIN within the subscriber
identity module 135
can be provided by limiting processes performed by the subscriber identity
module 135
and/or by utilizing the security features native to the subscriber identity
module operating
system 137 to accomplish additional protection functions such as, where
relevant, one or
more of the trusted code base features described above. Providing the trusted
code base on
the subscriber identity module 135 also protects the PIN from discovery by
physical means
by automatically erasing stored data if the SIM card is tampered with.

In step 270, the mobile payment device 130 transmits the public key encrypted
PIN
via the network 140 to the cryptographic conversion host 150. Specifically,
the mobile
payment device 130 places the RSA public key encrypted PIN block into a
transaction
message and then transmits the transaction message to the cryptographic
conversion host
150. One of ordinary skill will recognize that the transaction message could
be implemented
in a variety of ways. The transaction message can be, for example, an ISO 8583
message
which contains the PIN block along with other data related to the transaction.

The mobile payment device 130 and cryptographic conversion host 150 secure the
transmission using a cryptographic protocol such SSL 3.0 (Secure Sockets Layer
version
3.0) which provides various security features including encryption,
authentication and data
integrity. One of ordinary skill will recognize that available protocols may
change and
improve over time, and will apply a means of securing the transmission that is
appropriate
for the application and circumstances at hand.

Thereafter, in step 280, the mobile payment device 130 awaits an
acknowledgement
of successful processing of the payment transaction and displays a
confirmation to the user
that the transaction has been completed. It should be understood in accordance
with the
above description that the mobile payment device 130 contains only the public
key and not
the corresponding private key. As a result, the mobile payment device 130 is
not vulnerable
to compromise of a key used to decrypt the PIN, as has been the case for
conventional PIN
entry devices which use a symmetric (shared secret key) cryptography
algorithm.

9


CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
FIG. 3 is a flow diagram illustrating a process performed by the cryptographic
conversion host 150 to secure a payment transaction in accordance with a
specific
embodiment of the present invention. In step 310, the cryptographic conversion
host 150
obtains the public key encrypted PIN from the mobile payment device 130 via
the network
140. Specifically, the cryptographic conversion host 150 obtains the
transaction message
described above from the mobile payment device 130 and extracts the RSA public
key
encrypted PIN block. The cryptographic conversion host 150 then passes the
public key
encrypted PIN block to the hardware security module 155.
In step 320, the cryptographic conversion host 150 decrypts the public key
encrypted
PIN. The hardware security module 155 securely maintains an RSA private key
which
corresponds to the RSA public key that was used by the mobile payment device
130 to
encrypt the PIN. The hardware security module 155 applies the RSA private key
to decrypt
the RSA public key encrypted PIN block and extracts the PIN from the resulting
decrypted
PKCS #1 Type 2 encryption block.

In step 330, the cryptographic conversion host 150 re-encrypts the PIN using
an
asymmetric (secret key) cryptography algorithm. In an embodiment of the
invention, the
cryptographic conversion host 150 applies a Triple Data Encryption Standard
(3DES)
algorithm to encrypt the PIN. The hardware security module 155 securely
maintains a
3DES secret key which is identical to a secret key maintained by the
transaction host 160.
The identical secret keys are generated, for example, by a Derived Unique Key
Per
Transaction (DUKPT) process. The hardware security module 155 applies the 3DES
secret
key to encrypt the PIN, placing it into an encrypted PIN block and then
passing the
encrypted PIN block back to the cryptographic conversion host 150.

In step 340, the cryptographic conversion host 150 replaces the RSA encrypted
PIN
block in the transaction message with the 3DES secret key encrypted PIN block
and
provides the transaction message to the transaction host 160. For example, the
cryptographic conversion host 150 transmits the transaction message with the
3DES secret
key encrypted PIN block to the transaction host 160 via the network 140.



CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
FIG. 4 is a flow diagram illustrating a process performed by a transaction
host to
perform a secure payment transaction in accordance with the present invention.
In step 410,
the transaction host 160 obtains the secret key encrypted PIN from the
cryptographic
conversion host 150. Specifically, the transaction host 160 obtains the
transaction message
described above via, for example, the network 140 and extracts the secret key
encrypted PIN
block from the transaction message.

In step 420, the transaction host 160 decrypts the secret key encrypted PIN
block.
Specifically, the transaction host 160 stores a 3DES secret key that is
identical to the 3DES
secret key applied by the cryptographic conversion host 150 to encrypt the PIN
block. The
transaction host 160 applies the 3DES secret key to decrypt the 3DES secret
key encrypted
PIN block and extracts the PIN from the decrypted PIN block.

In step 430, the transaction host 160 determines whether the PIN is valid by
comparing it to data associated with the account of the customer 110 the
particular
transaction. If the PIN is valid, the transaction host 160 performs the
transaction in step 450,
debiting the account of the customer 110 by the purchase amount, and confirms
the
transaction in step 460, sending an appropriate confirmation message back to
the mobile
payment device 130 via the network 140. If the PIN is not valid, the
transaction host 160
sends a rejection message back to the mobile payment device 130 via the
network 140.

The concepts discussed herein relating to the encryption, transmission and
decryption of a password should be understood to include the encryption,
transmission and
decryption of data that is generated as a function of the password. For
example, in the
exemplary description above, a hash function may be applied to the PIN when it
is entered
into the mobile payment device 130. The resulting hash of the PIN, rather than
the PIN
itself, would thereafter be encrypted and transmitted by the mobile payment
device 130. On
the receiving end, upon decrypting the hash of the entered PIN it receives,
the transaction
host 160 would compare it to a hash of the expected PIN in order to confirm
validity of the
PIN and perform the transaction.

The invention has been described above with reference to one or more
illustrative
embodiments. Based on this description, further modifications and improvements
may
11


CA 02794560 2012-09-26
WO 2010/114799 PCT/US2010/029075
occur to those skilled in the art. The claims are intended to cover all such
modifications and
changes as fall within the scope and spirit of the invention.

12

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date Unavailable
(86) PCT Filing Date 2010-03-29
(87) PCT Publication Date 2010-10-07
(85) National Entry 2012-09-26
Dead Application 2015-03-31

Abandonment History

Abandonment Date Reason Reinstatement Date
2014-03-31 FAILURE TO PAY APPLICATION MAINTENANCE FEE
2015-03-30 FAILURE TO REQUEST EXAMINATION

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Registration of a document - section 124 $100.00 2012-09-26
Registration of a document - section 124 $100.00 2012-09-26
Registration of a document - section 124 $100.00 2012-09-26
Reinstatement of rights $200.00 2012-09-26
Application Fee $400.00 2012-09-26
Maintenance Fee - Application - New Act 2 2012-03-29 $100.00 2012-09-26
Maintenance Fee - Application - New Act 3 2013-04-02 $100.00 2013-03-01
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
APRIVA, LLC
Past Owners on Record
None
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Abstract 2012-09-26 1 65
Claims 2012-09-26 4 126
Drawings 2012-09-26 3 34
Description 2012-09-26 12 575
Representative Drawing 2012-09-26 1 8
Cover Page 2012-11-26 1 42
PCT 2012-09-26 13 469
Assignment 2012-09-26 25 937