| CPC G06Q 20/401 (2013.01) [G06Q 20/3829 (2013.01); H04L 9/0625 (2013.01); H04L 9/0631 (2013.01); G06Q 2220/00 (2013.01); H04L 2209/56 (2013.01)] | 19 Claims |

|
1. A method comprising:
generating, by a mobile communication device, a first cryptogram using a first identifier and a first cryptographic key, the first cryptographic key being associated with a first cryptographic protocol and being compatible to be stored in a memory of the mobile communication device, wherein the first cryptographic key is stored in the memory and the first cryptogram has a first length;
generating, within a key store of the mobile communication device, a second cryptogram using a second identifier and a second cryptographic key, the second cryptographic key being associated with a second cryptographic protocol and being compatible to be stored in the key store, wherein the second cryptographic key is incompatible to be stored in the memory, wherein the second cryptographic key is stored in the key store and is different than the first cryptographic key, the second cryptogram having a second length that is greater than the first length of the first cryptogram;
modifying the second cryptogram to generate a modified second cryptogram, the modified second cryptogram being generated by removing one or more characters from the second cryptogram in accordance with a pattern, the modified second cryptogram having a length equal to the first length of the first cryptogram;
combining, by the mobile communication device, the first cryptogram and the modified second cryptogram to generate a third cryptogram, wherein the combining comprises applying a reversible logical operation to the first cryptogram and a number of characters of the modified second cryptogram; and
transmitting, by the mobile communication device, the third cryptogram in an authorization request message to a payment processing computer.
|