US 12,462,250 B2
Mobile payments using multiple cryptographic protocols
Shashank Agrawal, Sunnyvale, CA (US); Dmitri Bannikov, Mountain View, CA (US); Atul Luykx, San Francisco, CA (US); Payman Mohassel, San Jose, CA (US); Sergey Smirnoff, Palo Alto, CA (US); Selvaganesh Vasudevan, Foster City, CA (US); and Gaven Watson, Palo Alto, CA (US)
Assigned to Visa International Service Association, San Francisco, CA (US)
Filed by Visa International Service Association, San Francisco, CA (US)
Filed on Sep. 26, 2019, as Appl. No. 16/583,634.
Claims priority of provisional application 62/812,757, filed on Mar. 1, 2019.
Prior Publication US 2020/0279258 A1, Sep. 3, 2020
Int. Cl. G06Q 20/40 (2012.01); G06Q 20/38 (2012.01); H04L 9/06 (2006.01)
CPC G06Q 20/401 (2013.01) [G06Q 20/3829 (2013.01); H04L 9/0625 (2013.01); H04L 9/0631 (2013.01); G06Q 2220/00 (2013.01); H04L 2209/56 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method comprising:
generating, by a mobile communication device, a first cryptogram using a first identifier and a first cryptographic key, the first cryptographic key being associated with a first cryptographic protocol and being compatible to be stored in a memory of the mobile communication device, wherein the first cryptographic key is stored in the memory and the first cryptogram has a first length;
generating, within a key store of the mobile communication device, a second cryptogram using a second identifier and a second cryptographic key, the second cryptographic key being associated with a second cryptographic protocol and being compatible to be stored in the key store, wherein the second cryptographic key is incompatible to be stored in the memory, wherein the second cryptographic key is stored in the key store and is different than the first cryptographic key, the second cryptogram having a second length that is greater than the first length of the first cryptogram;
modifying the second cryptogram to generate a modified second cryptogram, the modified second cryptogram being generated by removing one or more characters from the second cryptogram in accordance with a pattern, the modified second cryptogram having a length equal to the first length of the first cryptogram;
combining, by the mobile communication device, the first cryptogram and the modified second cryptogram to generate a third cryptogram, wherein the combining comprises applying a reversible logical operation to the first cryptogram and a number of characters of the modified second cryptogram; and
transmitting, by the mobile communication device, the third cryptogram in an authorization request message to a payment processing computer.