| CPC G06Q 20/382 (2013.01) [G06Q 20/401 (2013.01); H04L 9/3226 (2013.01); G06Q 20/206 (2013.01); G06Q 2220/00 (2013.01); H04L 2209/56 (2013.01)] | 20 Claims |

|
1. A computer-implemented method for validating encryption of electronic transactions using a decryption service system, the method comprising:
receiving, by the decryption service system, a plurality of transaction requests from one or more point-of-sale (POS) devices associated with a user;
determining, by the decryption service system, that a first transaction request of the plurality of transaction requests is one of clear data or corrupted;
in response to determining that the first transaction request of the plurality of transaction requests is one of clear data or corrupted, transmitting, by the decryption service system, a failure alert to the one or more POS devices, the failure alert associated with the first transaction request and including a failure report including a number of point-to-point encryption failures, each point-to-point encryption failure of the number of point-to-point encryption failures categorized by one of malformed message received, clear data received, or invalid card;
determining, by the decryption service system, that a second transaction request of the plurality of transaction requests is encrypted;
in response to determining that the second transaction request of the plurality of transaction requests is encrypted, decrypting, by the decryption service system, the second transaction request;
determining, by the decryption service system, a recipient acquirer processor using decrypted data of the second transaction request;
re-encrypting, by the decryption service system, the second transaction request using an encryption key associated with the decryption service system; and
transmitting, by the decryption service system and over an electronic network, the re-encrypted second transaction request to the recipient acquirer processor for payment authorization.
|