US 12,229,756 B2
Systems and methods for encryption and decryption service for electronic transaction monitoring and reporting
Brant Peterson, Denver, CO (US)
Assigned to Worldpay, LLC, Symmes Township, OH (US)
Filed by Worldpay, LLC, Symmes Township, OH (US)
Filed on Jan. 17, 2023, as Appl. No. 18/155,207.
Application 18/155,207 is a continuation of application No. 15/843,548, filed on Dec. 15, 2017, granted, now 11,587,073.
Prior Publication US 2023/0222497 A1, Jul. 13, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06Q 20/38 (2012.01); G06Q 20/40 (2012.01); H04L 9/32 (2006.01); G06Q 20/20 (2012.01)
CPC G06Q 20/382 (2013.01) [G06Q 20/401 (2013.01); H04L 9/3226 (2013.01); G06Q 20/206 (2013.01); G06Q 2220/00 (2013.01); H04L 2209/56 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for validating encryption of electronic transactions using a decryption service system, the method comprising:
receiving, by the decryption service system, a plurality of transaction requests from one or more point-of-sale (POS) devices associated with a user;
determining, by the decryption service system, that a first transaction request of the plurality of transaction requests is one of clear data or corrupted;
in response to determining that the first transaction request of the plurality of transaction requests is one of clear data or corrupted, transmitting, by the decryption service system, a failure alert to the one or more POS devices, the failure alert associated with the first transaction request and including a failure report including a number of point-to-point encryption failures, each point-to-point encryption failure of the number of point-to-point encryption failures categorized by one of malformed message received, clear data received, or invalid card;
determining, by the decryption service system, that a second transaction request of the plurality of transaction requests is encrypted;
in response to determining that the second transaction request of the plurality of transaction requests is encrypted, decrypting, by the decryption service system, the second transaction request;
determining, by the decryption service system, a recipient acquirer processor using decrypted data of the second transaction request;
re-encrypting, by the decryption service system, the second transaction request using an encryption key associated with the decryption service system; and
transmitting, by the decryption service system and over an electronic network, the re-encrypted second transaction request to the recipient acquirer processor for payment authorization.