| CPC G06Q 20/351 (2013.01) [G06Q 20/401 (2013.01)] | 12 Claims |

|
1. A computer-implemented method, comprising:
parsing, with at least one processor, a card image file to extract card data stored on the card image file, the card image file configured to be embedded on an integrated circuit of a payment card;
generating, with at least one processor, at least one first cryptogram based on the card data and at least one encryption key;
generating, with at least one processor, a plurality of simulated payment transactions based on the card data, each simulated payment transaction comprising simulated transaction data, wherein the simulated transaction data is generated via an emulation of a point of sale (POS) device, and wherein the emulation of the POS device receives at least the card data as an input and provides the simulated transaction data as an output;
generating, with at least one processor, transaction sequences comprising a plurality of sequential commands based on the simulated transaction data for the plurality of simulated payment transactions, wherein each of the plurality of sequential commands is associated with a discrete transaction of the plurality of simulated payment transactions;
communicating, with at least one processor, the plurality of sequential commands to a payment device emulator, the payment device emulator comprising a simulated payment device comprising a probe inserted into a card reader, wherein the probe is in communication with a first computing device that generates signals representative of a payment device and sends the signals to the payment device emulator via the probe, and wherein the plurality of sequential commands comprises instructions configured to cause the card reader to return dynamic transaction data comprising at least one second cryptogram generated with the simulated payment device;
receiving, with at least one processor, a plurality of command responses generated by the simulated payment device based on the plurality of sequential commands, the plurality of command responses comprising the at least one second cryptogram;
comparing, with at least one processor, the at least one second cryptogram to the at least one first cryptogram;
matching, with at least one processor, the at least one second cryptogram to the at least one first cryptogram based on the comparing;
determining, with at least one processor, whether each command response of the plurality of command responses is a valid command response or an invalid command response based on matching the at least one second cryptogram to the at least one first cryptogram;
verifying, with at least one processor, the card image file based on determining that a predetermined number of command responses of the plurality of command responses are valid command responses;
automatically generating, with at least one processor, a report based on verifying the card image file, the report comprising a summary of the plurality of sequential commands and the plurality of command responses determined to be valid command responses; and
automatically transmitting, with at least one processor, the report to a second computing device separate from the first computing device.
|