The described embodiments generally relate to methods and apparatuses for conducting a wireless commercial transaction that is both user friendly and secure.
Devices located in close proximity to each other can communicate directly using proximity technologies such as Near-Field Communications (NFC), Radio Frequency Identifier (RFID), and the like. These protocols can establish wireless communication links between devices quickly and conveniently, without, for example, performing setup and registration of the devices with a network provider. NFC can be used in electronic transactions, e.g., to securely send order and payment information for online purchases from a purchaser's mobile device to a seller's point of sale (POS) device.
Currently, payment information such as credit card data in mobile devices is sent directly from a secure element (SE) located in a device such as a mobile phone through proximity interfaces, such as near field communications (NFC), without an associated application processor (AP), such as an application program in the device, accessing the payment information. Preventing the AP from accessing the sensitive payment information is necessary because current payment schemes use real payment information (credit card number, expiration date, etc.) that can be used to make purchases through other means, include online and via the phone, and data in the AP can be intercepted and compromised by rogue applications.
Thus, there exists a need for a secure method of executing a commercial transaction that is both secure and user friendly.
In one or more embodiments, a portable device can make purchases by using near field communications (NFC) to establish a secure link with a point of sale (POS) device connected to a backend system that is configured to execute commercial transactions. This secure link can be established by positioning the portable device to be within close proximity of the point of sale device. Increased mobility is provided to users of the portable device making purchases by establishing a second secure link that uses a different protocol, such as WIFI or Bluetooth, that has more desirable characteristics for maintaining the link over time than NFC.
In one or more embodiments, a second secure link is established using a shared secret known to the portable device and the backend server, and using an alias to identify a purchasing account such as a credit card. When a request to make a transaction using the credit card is submitted to the backend server, the server determines whether the combination of the alias and crypto data is valid using a shared secret that is known to a secure element in the portable device and the backend server. The backend server uses the shared secret (e.g., symmetric keys, public private keys, etc.) to verify the alias and the crypto data. The backend receives the alias from the portable device via the point of sale device and combines the alias with other information, such as counter value known to both the backend and the secure element 108. The backend can then generate the same crypto data using the shared secret and received data, and compare the result with the received crypto data. If the comparison indicates that the values are the same, then the credit card that corresponds to the credit card alias is provided back to the partner, and the transaction proceeds as normal. Otherwise, the credit card alias is rejected and the transaction is denied.
In one or more embodiments, a method of performing a commercial transaction is provided. The method includes establishing a first secure link over a first air interface by a purchasing device, the first secure link between the purchasing device and a point of sale device, identifying a second air interface different from the first air interface, establishing a second secure link over a second air interface, the second secure link between the purchasing device and a backend server, and conducting, using the second air interface, a secure commercial transaction between the purchasing device and the backend server using payment data secured by a shared secret known to a secure element in the purchasing device and to the backend server.
Embodiments of the invention may include one or more of the following features. The payment data may include an alias associated with a payment account, and establishing the second secure link may include encrypting the payment data by the secure element at the purchasing device using the shared secret as an encryption key. Establishing the second secure link may include decrypting, at the backend server, the payment data using the shared secret, and verifying, at the backend server, the payment data, where verifying includes comparing the payment data to independently known payment data stored at the backend server. Comparing the payment data to independently known payment data may include retrieving an alias from the decrypted received payment data, identifying a credit card account associated with the alias, determining if the alias is associated with the credit card account according to an association stored in a memory of the backend server, and, in response to determining that the alias is associated with the credit card account, approving the commercial transaction. Comparing the payment data may further include retrieving a counter value from the decrypted retrieved payment data, and comparing the counter value to an independently known counter value stored in a memory of the backend server. Establishing the first secure link may include establishing a near field communication link between the purchasing device and the point of sale device. Identifying a second air interface different from the first air interface may include identifying an air interface having properties more desirable than the first air interface to communicate data to a user over a time period longer than the time used to establish the first secure link.
The described embodiments and the advantages thereof may best be understood by reference to the following description taken in conjunction with the accompanying drawings.
In the following description, numerous specific details are set forth to provide a thorough understanding of the concepts underlying the described embodiments. It will be apparent, however, to one skilled in the art that the described embodiments may be practiced without some or all of these specific details. In other instances, well known process steps have not been described in detail in order to avoid unnecessarily obscuring the underlying concepts.
In other embodiments, the portable device 102 can use protocols other than NFC to establish the secure link between the portable device 102 and the POS device 116, particularly protocols that have desirable characteristics for establishing a secure link, e.g., protocols that can establish a secure link quickly and securely. Protocols with desirable characteristics for establishing a secure link can have undesirable characteristics for maintaining the link over time, e.g., such protocols may involve keeping the portable device 102 in the same location for the duration of a transaction. The NFC protocol, for example, establishes a secure link quickly and conveniently at a point of sale. However, transactions that include sending additional data between the POS terminal 106 and the portable device 102, such as additional payment information, coupon offers, coupon data, and the like, can continue for some time, during which the portable device 102 is kept in the same location within centimeters of the POS terminal 116. Holding or setting the device 102 near the POS terminal 116 becomes inconvenient for users, so NFC is less desirable for longer transactions such as those that involve transferring more data than used by the payment information or use more time than used in the NFC connection establishment process. The establishment of the NFC link, which occurs quickly, is referred to herein as an initial “bump” because the devices may touch each other momentarily when the NFC connection is being established. NFC is used herein as an example, and other types of proximity technology can be used in other embodiments.
In one or more embodiments, the NFC secure link can be used to establish a second secure link that uses a different protocol, such as WIFI 110, Bluetooth 112, or another wireless protocol that has more desirable characteristics for maintaining the link over time than NFC. The particular protocol that is used for the second link can be selected based on configured information, e.g., depending on the type of communication hardware available in the device, or according to user preferences, signal strength, the amount of data expected to be transferred, and so on.
As described above, the confidentiality of data sent to the application processor 104 may be compromised, e.g., by a rogue application. Therefore, the credit card data 106 is encrypted by the secure element 108 to produce encrypted cryptographic data 206. The secure element 108 generates an “alias” 234 for the credit card data 206, which is passed to the application processor 104 instead of the unencrypted credit card data 106. The alias 234 is an identifier for the credit card data 206, but cannot be used to make a payment without valid crypto data 238 that corresponds to the alias 234. Thus, the alias need not be stored securely, because payments made with the alias 234 are not accepted by the backend 118 unless the corresponding crypto data 238 is also supplied, e.g., in a request to process a payment.
The crypto data 238 may be, for example, a digitally-signed combination of one or more of the alias 234, a counter value that is incremented for each alias value, a random number, a merchant identifier, or any other value that is believed to be important. The shared secret 207 may be, for example, a symmetric key distributed to the secure element 108 at the time the device 102 is manufactured, and loaded into the backend 118 via secure communication behind a firewall. In other embodiments, a cryptographic key exchange mechanism may be used to establish the shared secret. Therefore, the alias can be known by the application processor 104 without compromising security. The crypto data is, in one or more embodiments, stored in the secure element 108 and used to generate the crypto data 238 at the portable device 102 based upon the alias received from the application processor 104. A user may enter the alias 234 into the application processor 104, and the alias 234 is also known to the backend 118. The alias is, for example, provided to the user by the organization that operates the backend, e.g., an online merchant.
In one or more embodiments, when a request to make a transaction using the credit card is submitted to the backend server 414, the server 414 determines whether the combination of the alias 234 and crypto data 238 are valid using a shared secret 207 that is known to the secure element 108 and the backend server 118. The backend uses the shared secret (e.g., symmetric keys, public private keys, etc.) to verify the alias 234 and the crypto data 238. The backend 118 receives the alias from the portable device 102 via the point of sale 116, combines the alias 234 with other information as described above (e.g., a counter value known to both the backend 118 and the secure element 108, and so on). The backend 118 can then generate the same crypto data using the shared secret and received data, and compare the result with the received crypto data. If the comparison indicates that the values are the same, then the credit card that corresponds to the credit card alias 234 is provided back to the partner 412, and the transaction proceeds as normal. Otherwise, the credit card alias is rejected and the transaction is denied.
The method 300 includes, at block 302 establishing a secure link between a portable device and a POS device, exchanging transaction data at block 310, and exchanging coupons, offers, store credits, location information, etc. at block 312 The method further includes making payment and disconnecting the portable device from the POS device. The establishing a secure link portion 302 includes establishing a bump 304, e.g., an NFC connection, exchanging keys as described above with reference to
The various aspects, embodiments, implementations or features of the described embodiments can be used separately or in any combination. Various aspects of the described embodiments can be implemented by software, hardware or a combination of hardware and software.
The foregoing description, for purposes of explanation, used specific nomenclature to provide a thorough understanding of the described embodiments. However, it will be apparent to one skilled in the art that the specific details are not required in order to practice the described embodiments. Thus, the foregoing descriptions of the specific embodiments described herein are presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the embodiments to the precise forms disclosed. It will be apparent to one of ordinary skill in the art that many modifications and variations are possible in view of the above teachings.
The advantages of the embodiments described are numerous. Different aspects, embodiments or implementations can yield one or more of the following advantages. Many features and advantages of the present embodiments are apparent from the written description and, thus, it is intended by the appended claims to cover all such features and advantages of the invention. Further, since numerous modifications and changes will readily occur to those skilled in the art, the embodiments should not be limited to the exact construction and operation as illustrated and described. Hence, all suitable modifications and equivalents can be resorted to as falling within the scope of the invention.
This application claims priority to U.S. Provisional Patent Application No. 61/671,677, filed Jul. 13, 2012, and entitled “METHOD TO SEND PAYMENT DATA THROUGH VARIOUS AIR INTERFACES WITHOUT COMPROMISING USER DATA,” which is incorporated herein by reference in its entirety and for all purposes.
Number | Date | Country | |
---|---|---|---|
61671677 | Jul 2012 | US |