Abstract:
A method includes communicating with a token server to identify a key, generating an initialization vector, performing a logical operation on the key using the initialization vector to generate a modified key, encrypting a financial account number using a format preserving encryption technique to generate a payment token where the format preserving encryption technique uses the modified key, establishing a communication connection with a point-of-sale terminal, and transmitting the payment token to the point-of-sale terminal.
Abstract:
A method for preventing mobile payment is described. The method comprises generating an authorization request, via a payment module, based on sensitive data on a mobile device. The authorization request is transmitted from the payment module to an issuer system. The issuer system sends a neutralization trigger. In response to receiving the neutralization trigger, the payment module is disabled.
Abstract:
A restriction request message, including a restriction parameter for a secondary account, is received from a device that is associated with a primary account, via a network node that is outside of a secure authorization network. A replenishment request message, including a password and an account replenishment parameter for the secondary account, is also received via a network node that is outside of the authorization network. Authentication is performed based on the password, and the restriction parameter for the secondary account is identified responsive to receiving the replenishment request message. Responsive to determining that the account replenishment parameter satisfies the restriction parameter, a replacement key is generated and associated with the account replenishment parameter for the secondary account. A replenishment response message including the replacement key is transmitted to a device that is associated with the secondary account, via a network node that is outside of the authorization network.
Abstract:
A method for two factor authentication is described. The method comprises sending an activation code stored on a mobile device to a server for verification. An encrypted secret key generated by the server using the activation code is received. The secret key is decrypted using the activation code stored on the mobile device. The mobile device encrypts the secret key using a predetermined PIN. As a result of a user inputting the predetermined PIN, the secret key is decrypted, the mobile device generates a first token using the secret key and transmits the first token to the server to authenticate the user. After receiving authentication from the server, the information on the mobile device is synced with the server.
Abstract:
Methods of de-tokenizing secure payment tokens are disclosed. A method according to some embodiments includes receiving a request from an issuer to de-tokenize a secure payment token associated with a transaction conducted using a mobile terminal, generating a metric indicative of a risk of de-tokenizing the secure payment token, comparing the metric indicative of the risk of de-tokenizing the secure payment token to a predetermined threshold, and transmitting a response to the request to de-tokenize the secure payment token, wherein the response is based on the comparison of the metric indicative of the risk of de-tokenizing the secure payment token with the predetermined threshold.
Abstract:
A method includes receiving a security profile comprising user-defined rules for processing sensitive data, and identifying a plurality of sensitive data components in a data file according to the security profile. The method further includes generating a respective format-preserving token for each of the identified plurality of sensitive data components. The method additionally includes generating a corresponding token key for each of the respective-format preserving tokens, and replacing each of the plurality of sensitive data components in the data file with the respective format-preserving token. Further, the method includes cryptographically camouflaging each of the token keys using a first password and storing each of the cryptographically camouflaged token keys.
Abstract:
A method for preventing mobile payment is described. The method comprises receiving an authorization request at an issuer system from a payment module on a mobile device. The authorization request may be based on sensitive data on the mobile device. The issuer system determines whether the mobile device is missing. The issuer system sends a neutralization trigger to the mobile device, and in response to receiving the neutralization trigger, the payment module is disabled.
Abstract:
A method of enrolling a payment card in a mobile wallet app includes receiving, on a mobile device, a request from a user to enroll a financial account in a mobile wallet application installed on the mobile device, sending an enrollment request to a wallet server, the enrollment request including an identification string uniquely associated with the mobile device, receiving a payment token associated with the financial account from the wallet server, and notifying the user that the financial account has been enrolled into the mobile wallet application responsive to receipt of the payment token. Related computer program products are also disclosed.