US 12,261,960 B2
Systems and methods for cryptographic authentication of contactless cards
Kevin Osborn, Newton Highlands, MA (US); Jeffrey Rule, Chevy Chase, MD (US); Paul Moreton, Glen Allen, VA (US); William Duane, Westford, MA (US); Colin Hart, Arlington, VA (US); Kaitlin Newman, Washington, DC (US); Lara Mossler, Farmville, VA (US); Daniel Herrington, New York, NY (US); Srinivasa Chigurupati, Long Grove, IL (US); Ian Prince, Toronto (CA); and Wayne Lutz, Fort Washington, MD (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Jun. 21, 2022, as Appl. No. 17/845,204.
Application 17/845,204 is a continuation of application No. 16/858,357, filed on Apr. 24, 2020, granted, now 11,502,844.
Application 16/858,357 is a continuation of application No. 16/657,813, filed on Oct. 18, 2019, granted, now 10,778,437, issued on Sep. 15, 2020.
Application 16/657,813 is a continuation of application No. 16/205,119, filed on Nov. 29, 2018, granted, now 10,581,611, issued on Mar. 3, 2020.
Claims priority of provisional application 62/740,352, filed on Oct. 2, 2018.
Prior Publication US 2023/0051390 A1, Feb. 16, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/32 (2006.01); G06Q 20/20 (2012.01); G06Q 20/32 (2012.01); G06Q 20/34 (2012.01); G06Q 20/40 (2012.01); H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/3234 (2013.01) [G06Q 20/204 (2013.01); G06Q 20/3226 (2013.01); G06Q 20/3278 (2013.01); G06Q 20/352 (2013.01); G06Q 20/40 (2013.01); H04L 9/0866 (2013.01); H04L 9/14 (2013.01); H04L 9/3228 (2013.01); H04L 9/3242 (2013.01); H04L 63/0853 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A contactless card, comprising:
a substrate;
a memory containing a first card key generated based on a first master key and a second card key generated based on a second master key; and
a processor,
wherein the processor is configured to:
generate a first session key using the first card key,
generate a second session key using the second card key,
generate a cryptogram using the first session key, and
encrypt the cryptogram using the second session key.