Securing payment data

ABSTRACT

The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.12/272,058 filed Nov. 17, 2008, which is a divisional of U.S. patentapplication Ser. No. 11/556,317 filed Nov. 3, 2006 now U.S. Pat. No.7,451,926, all of which are incorporated herein by reference.

BACKGROUND OF THE INVENTION

With the widespread growth of non-cash transactions in recent times,consumers are increasingly relying upon various non-cash paymentinstruments such as credit cards, debit cards, contactless cards oranother type of payment/transaction card, as well as traditional checksor other negotiable instruments in order to complete transactions atpoint-of-sale (POS) locations. As the use of these payment instrumentshave increased, associated adverse behavior such as fraud and so called“identity theft” has increased even more dramatically. Recently, it hasbeen estimated that identity theft is the fastest growing crime in manycountries worldwide.

One of the primary gateways for identity theft or other fraudulentbehavior occurs with respect to POS applications because theseapplications are often responsible for initiating a transaction requestto a back-end payment processor. Thus, the POS applications generallyhave access to personal and/or other sensitive information such ascredit/debit card numbers or the like. Accordingly, one of the biggestissues in, e.g., the retail industry today is the fact that POSapplications have access to payment instrument data without much in theway of security and are thus one of the major sources from which suchdata is illegally obtained, either by hackers or employees of the POSlocation.

A typical POS application reads data from payment card's magnetic tracksby means of a Magnetic Stripe Reader device (MSR). This data oftenincludes much sensitive information such as the card number, expirationdate, cardholder's name, etc. The application sends the data to thepayment service provider to charge or authorize a payment. Typically,the application has full control over the data: it can store it indatabase or handle it in any other way. Consequently, many credit cardnetworks such as Visa and MasterCard prohibit storing of cardinformation; however, there is conventionally no way to enforce thispolicy. Today, most of the leaks of sensitive data happen not from POSapplications intentionally revealing the data but from thoseapplications simply mishandling the data and unintentionally exposing itto hackers or the like, generally due to a lack of secure programmingexpertise on the part of the application developers. Handling sensitivedata in the secure manner is often a challenge even for programmerstrained in the field.

SUMMARY OF THE INVENTION

The following presents a simplified summary of the claimed subjectmatter in order to provide a basic understanding of some aspects of theclaimed subject matter. This summary is not an extensive overview of theclaimed subject matter. It is intended to neither identify key orcritical elements of the claimed subject matter nor delineate the scopeof the claimed subject matter. Its sole purpose is to present someconcepts of the claimed subject matter in a simplified form as a preludeto the more detailed description that is presented later.

The subject matter disclosed and claimed herein, in one aspect thereof,comprises an architecture that can facilitate isolating data obtainedfrom a payment instrument from a Point-Of-Sale (POS) application as wellas other applications of a POS front-end. In accordance therewith, thearchitecture can include a front-end interface configured to attach toor embed within one or more POS components such as a POS input device, aPOS service object, POS middleware, or the like. The front-end interfacecan capture data obtained from a payment instrument and forward the datato a security component that encrypts the data.

In accordance with one aspect of the claimed subject matter, thesecurity component can encrypt the data in accordance with a Public KeyInfrastructure (PKI) arrangement. For example, the data can be encryptedby way of a public key associated with a payment processor (or anotherfinancial institution, association, or agency), or by some other means.Based upon the foregoing, the sensitive data obtained from a paymentinstrument can be securely encrypted as soon as is feasible from thebeginning of a transaction, and remain secured until the data reaches apayment back-end.

In accordance with one aspect, the payment back-end can include aback-end interface configured to attach to or embed within a paymentcomponent, such as payment middleware, a payment processor, the paymentprocessor, or the like. The back-end interface can also be operativelycoupled to a decryption component that decrypts the data intercepted bythe back-end interface. The decryption component can, e.g., house thepublic key as well as facilitate the transmission of the public key tothe front-end. The decryption component can also store a private keyassociated with the public key in order to decrypt the data.Accordingly, regulation of the keys and other aspects of the PKI can bemanaged by more trusted (and more secure) parties of a giventransaction.

The following description and the annexed drawings set forth in detailcertain illustrative aspects of the claimed subject matter. Theseaspects are indicative, however, of but a few of the various ways inwhich the principles of the claimed subject matter may be employed andthe claimed subject matter is intended to include all such aspects andtheir equivalents. Other advantages and novel features of the claimedsubject matter will become apparent from the following detaileddescription of the claimed subject matter when considered in conjunctionwith the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a front-end system that can facilitate amore secure Point-Of-Sale (POS) transaction environment.

FIG. 2 is an exemplary system comprising a front-end that includesexample POS components that can facilitate a more secure POS transactionenvironment.

FIG. 3 is a block diagram of example POS input devices at a POSfront-end.

FIG. 4 depicts a block diagram of example payment instruments commonlyemployed at a POS front-end.

FIG. 5 depicts a block diagram of a back-end system that can facilitatea more secure transaction processing environment.

FIG. 6 illustrates a block diagram of a system with a back-end thatincludes example payment components that can facilitate a more securetransaction processing environment.

FIG. 7 illustrates a block diagram of a system 700 that can facilitateend-to-end encryption of POS transaction information.

FIG. 8 is an exemplary flow chart of procedures defining a method forconfiguring interfaces.

FIG. 9 depicts an exemplary flow chart of procedures defining a methodfor intercepting and encrypting information associated with a paymentinstrument before it is transmitted to a POS application.

FIG. 10 illustrates an exemplary flow chart of procedures defining amethod for intercepting and decrypting transaction data after thetransaction data has traversed a POS application.

FIGS. 11A-11E illustrate various arrangements for end-to-end processingof POS transaction.

FIG. 12 illustrates a block diagram of a computer operable to executethe disclosed architecture.

FIG. 13 illustrates a schematic block diagram of an exemplary computingenvironment.

DESCRIPTION OF THE INVENTION

The claimed subject matter is now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the claimed subject matter. It may beevident, however, that the claimed subject matter may be practicedwithout these specific details. In other instances, well-knownstructures and devices are shown in block diagram form in order tofacilitate describing the claimed subject matter.

As used in this application, the terms “component,” “module,” “system”,“interface”, or the like are generally intended to refer to acomputer-related entity, either hardware, a combination of hardware andsoftware, software, or software in execution. For example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration, both an application runningon a controller and the controller can be a component. One or morecomponents may reside within a process and/or thread of execution and acomponent may be localized on one computer and/or distributed betweentwo or more computers.

Furthermore, the claimed subject matter may be implemented as a method,apparatus, or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware, or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. For example, computerreadable media can include but are not limited to magnetic storagedevices (e.g., hard disk, floppy disk, magnetic strips . . . ), opticaldisks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ),smart cards, and flash memory devices (e.g., card, stick, key drive . .. ). Additionally it should be appreciated that a carrier wave can beemployed to carry computer-readable electronic data such as those usedin transmitting and receiving electronic mail or in accessing a networksuch as the Internet or a local area network (LAN). Of course, thoseskilled in the art will recognize many modifications may be made to thisconfiguration without departing from the scope or spirit of the claimedsubject matter.

Moreover, the word “exemplary” is used herein to mean serving as anexample, instance, or illustration. Any aspect or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs. Rather, use of the wordexemplary is intended to present concepts in a concrete fashion. As usedin this application, the term “or” is intended to mean an inclusive “or”rather than an exclusive “or”. That is, unless specified otherwise, orclear from context, “X employs A or B” is intended to mean any of thenatural inclusive permutations. That is if, X employs A; X employs B; orX employs both A and B, then “X employs A or B” is satisfied under anyof the foregoing instances.

With reference now to the drawings, referring initially to FIG. 1, afront-end system 100 that can facilitate a more secure Point-Of-Sale(POS) transaction environment is depicted. Generally, the system 100 caninclude a front-end interface 102 that can be configured to attach to(and/or be embedded in) a POS component 104. The front-end interface 102can intercept data 106 obtained from a payment instrument (not shown) asit is received at the POS component 104. For example, the data 106,which might otherwise traverse the POS component 104 as indicated by thebroken lines at reference numeral 108, can instead be intercepted by thefront-end interface 102. The data 106 can then be delivered to asecurity component 110, which can encrypt the data 106 to generateencrypted data 112. The encrypted data 112 can then be output to otherPOS components (not shown) in a POS front-end 114 and/or be output to aPOS application (not shown).

As illustrated, the POS front-end 114 can include the POS component 104;however, it is to be understood that the POS front-end 114 can includemany POS components 104, each with distinguishing characteristics.Example POS components 104 will be discussed in greater detail infrawith reference to FIGS. 2 and 3, but it should be appreciated that thePOS component(s) 104 can be either hardware, software, or a combinationthereof implemented to obtain and/or process data 106, e.g., at apoint-of-sale location. Accordingly, by way of explanation and notlimitation, the POS front-end 114 and/or some or all of the POScomponents 104 can reside at a check-out register of a retailestablishment or a computer or server for the retail establishment.Additionally or alternatively, the POS component(s) 104 can reside in avending machine, a payphone, a transit system station such as aturnstile, kiosk, toll both, etc., or substantially any device in whichdata 106 from a payment instrument can be received.

According to an aspect, one feature of the claimed subject matter is, inessence, to mitigate unsecured exposure of the data 106 to the POSapplication and/or other potentially unsafe applications or components.In particular, these applications generally represent a primary sourcefor mishandling of sensitive data and/or are a primary target forhackers and malicious code directed toward fraud, identity theft, or thelike. Hence, the front-end interface 102 can intercept the data 106before the data 106 can be passed to the POS application. The securitycomponent 110 can then encrypt the data 106 such that the POSapplication (or other applications) need not ever be in receipt of thedata 106, but rather be in receipt of the encrypted data 112 instead.The encrypted data 112 can then be decrypted after leaving the controlof the POS application, typically at a payment back-end (not shown),which is detailed more thoroughly with reference to FIGS. 5 and 6. Inaccordance therewith, the likelihood that the POS (or another)application will mishandle sensitive data (e.g., data 106) can besubstantially reduced.

Since the POS application is generally closely associated with the POSfront-end 114 and/or the POS component(s) 104, it is often not advisablefor the security component 110 to encrypt the data 106 according to apassword/code/key or encryption scheme known, stored, and/or devised atthe POS front-end 114. Otherwise, the encrypted data 112 handled by thePOS application can potentially be decrypted if the password or othermeans should be compromised, thereby undermining some of theeffectiveness of a more secure POS transaction environment. Moreover,the encrypted data 112 must ultimately be decrypted at some point aftertraversing the POS application (again, typically at a payment back-end).Hence, the ability to decrypt the encrypted data 112 should be availableto the payment back-end but should not be available to (or accessibleby) other unintended applications or components.

Therefore, in accordance with one aspect of the claimed subject matter,a Public Key Infrastructure (PKI) can be employed to mitigate theaforementioned issues. In general, a PKI is a well-known arrangementthat can allow a party to inspect and authenticate user identities. PKIcan also allow for binding of public keys to particular users, usuallycarried out by software at a central location together with othercoordinated software at distributed locations. The public keys aretypically included in certificates. PKI arrangements can, for example,enable users to be authenticated to one another. In addition, theinformation included in an identity certificate (e.g., one of the publickeys) can be employed to encrypt and authenticate messages transmittedbetween users.

In general, a PKI can consist of client software, server software suchas a certificate authority, hardware (e.g., smartcards), and operationalprocedures. A first user may digitally sign messages using a privatekey, and a second user can check that signature (e.g., by using thepublic key contained in the first user's certificate issued by acertificate authority within the PKI). This can enable two (or more)communicating parties to establish confidentiality, message integrityand user authentication without having to exchange any secretinformation in advance.

In accordance therewith, the POS component 104 can receive a public keyassociated with, e.g., a payment back-end component with the PKI definedby a financial institution, a financial association, a paymentprocessor, or the like. The public key can be provided to the securitycomponent 110 and employed to create the encrypted data 112 such thatonly the trusted back-end component can decrypt the encrypted data 112(e.g., with a private key). Therefore, neither sensitive data 106associated with a payment instrument nor the tools to decode thisinformation need be accessible by the POS application or other unsafecomponents or third parties. Moreover, many relevant features of theencryption scheme can be defined by the most trusted participantsinvolved (e.g., the financial institutions, associations, etc.).

With reference now to FIG. 2, system 200 with a front-end that includesexample POS components that can facilitate a more secure POS transactionenvironment is illustrated. As detailed previously, the front-end 114can be, e.g., a point-of-sale counter at a retail establishment (oranother configuration) and can include a wide variety of POS components104 that can be referred to herein either individually or collectivelyas POS components 104, or specifically referenced and called outaccording to particular characteristic as in POS input device 1041, POSservice object 1042, POS middleware 104N, etc. It is to be appreciatedthat not all the example POS components 104 need exist and that otherPOS components 104 can be present in addition to or alternatively tothose depicted in FIG. 2, and the POS components 104 can exist indifferent configurations that what is shown.

By way of illustration and not limitation, conventional point-of-salefront-ends (e.g., retail checkout counter/kiosk) include a POS inputdevice 1041 that, e.g., physically reads or otherwise obtains the data106 from the payment instrument 202. In accordance with one aspect, thepayment instrument 202 can be a credit card and the POS input device1041 can be a Magnetic Stripe Reader (MSR) device, however, otheraspects can exist, many of which are presented infra with reference toFIGS. 3 and 4. Returning to the conventional point-of-sale front end tobetter provide context for the claimed subject matter, the MSR device(e.g., POS input device 1041) can then pass the magnetic track data(e.g., data 106) to an associated MSR service object (e.g., POS serviceobject 1042) that can decode and/or format the raw magnetic track dataand transmit the decoded data to the POS application 204. Typically, thePOS application 204 can then send a payment request along with thecredit card information to a payment back-end.

However, since one object of the claimed subject matter can be to limitthe POS application 204 from attaining access to the data 106, thesystem 200 can include the front-end interface 102 that can be embeddedin or attached to one or more of the POS components 104. In accordancetherewith, the front-end interface 102 can intercept data 106 obtainedfrom the payment instrument 202; and the security component 110 canencrypt the data 106 to generate encrypted data 112. Ideally, thefont-end interface 102 can be operatively attached to the POS inputdevice 1041 (e.g., the MSR device) as this device is typically the firstPOS component 104 to gain access to data 106 obtained from the paymentinstrument 202. In that case, the data 106 can be encrypted (to createencrypted data 112) virtually as soon as it is received from the paymentinstrument 202.

Yet it should be appreciated that another object of the claimed subjectmatter can be to provide many of the features described herein withrespect to existing hardware such that implementation of, e.g.,encryption of data 106 can be achieved with substantially minimalmodification to the hardware or software of existing point-of-salefront-ends. Accordingly, in some cases, existing POS input devices 1041may not be capable of supporting the front-end interface 102 and/or thesecurity component 110. In such cases, the front-end interface 102 canbe introduced into one of the other POS components 104, such as the POSservice object 1042.

Since the POS service object 1042 is typically comprised of softwarecode executed on a processor or controller, implementing the front-endinterface 102 in the POS service object 1042 can be a more costeffective solution to help ensure that the POS application 204 is privyto encrypted data 112 rather than the data 106. However, in the casewhere it is not possible or infeasible to implement the front-endinterface 102 (and/or the associated security component 110) on eitherone of the POS input device 1041 or the POS service object 1042, thenPOS middleware 104N can be employed. That is, the front-end interface102 can be employed with the POS middleware 104N in order to encryptdata 106 before it can reach the POS application 204.

Middleware is well-known in the computing field and can be described asa communications layer that allows applications and/or components tointeract across disparate hardware and network environments.Accordingly, the POS middleware 104N can be a generic middlewarecomponent as well as middleware especially designed for or directedtoward POS devices, components, and/or transactions.

FIGS. 3 and 4 relate to example POS input devices, and example paymentinstruments, respectively. For example, FIG. 3 illustrates a blockdiagram of example POS input devices 1041, while FIG. 4 depicts a blockdiagram of example payment instruments 202. It is to be appreciated thatFIGS. 2 and 3 are intended to aid in understanding, but not intended tobe limiting. Other POS input devices 1041 and/or payment instruments 202other than those specifically called out herein can exist and beincluded within the scope and spirit of this description and the claimsappended hereto. As detailed supra, for instance in connection with FIG.2, the POS input device 1041 can be a MSR device 302. A MSR device 302can be a device that reads account information, etc. from the magneticstripe of, e.g., a credit card 402, a debit card, charge card (oranother payment instrument 202) in order to process a transaction. MSRdevice 302 can be either integrated into or attached onto a POS register(not shown) as a separate component; or implemented as part of astand-alone terminal dedicated to the function of processing creditcards 402, or another payment instrument 202 that includes a magneticstripe such as a gift certificate card or the like.

In addition, the POS input devices 1041 can be a Magnetic Ink CharacterRecognition (MICR) device 304 or another type of optical device 306.Optical devices (e.g., 304, 306) can be employed in connection withcharacter recognition applications in order to determine particularinformation such as account number, routing number, or other informationassociated with a payment instrument 202 such as a check 404 or othernegotiable instrument 406. In the case of a MICR device (e.g., MICRdevice 304), the device can be configured to read special charactersoften printed with special ink in accordance with standards adopted bybanking industries. These special characters typically reside at thebottom of a check 404 or other negotiable instrument 406 printed in aparticular font (e.g., E-13B, CMC-7, or the like). In accordancetherewith, the MICR device 304 can process checks 404 more efficientlyand with fewer errors than more general optical devices 306.

Another example of the POS input devices 1041 is a Light-Emitting Diode(LED) device 308 such as a barcode or similar type light-based readersuch as a laser scanner. LED device 308 can be employed to read rewardscoupons 408 or the like, such as electronic offers presented to (andprinted by) account holders. Moreover, the POS input devices 1041 can bea Personal Identification Number (PIN) pad 310 employed to verifyadditional identification information such as an account holder's PIN.PIN pad 310 can be employed, e.g., in connection with credit/chargedebit cards 402 or a similar payment instrument 202.

The POS input devices 1041 can also be a Radio Frequency Identification(RFID) transceiver 312. RFID transceiver 312 can be employed inconnection with a “contactless” card or device 410 or another type ofdevice with an RFID “tag” or transponder 412. RFID transceiver 312 canreceive data (e.g., account information, etc.) from smart cards and areespecially prevalent in mass transit systems in order to facilitate morerapid transactions.

Turning briefly to FIG. 5, a back-end system 500 that can facilitate amore secure transaction processing environment is displayed. Generally,the system 500 can include a back-end interface 502 that can beconfigured to attach (or embed within) a payment component 504 that,e.g., resides in a payment back-end 506. The payment back-end 506 caninclude a computer or server corresponding to, e.g., a credit cardissuer, a bank or the like, or another financial institution associatedwith a payment instrument. For the sake of illustration only, aconventional payment back-end system is configured to receive data froma POS application (e.g., as detailed in connection with the POSapplication 204 with reference to FIG. 2). Thus, the data (whichconventionally is not encrypted) would enter the payment back-end 506and be processed by the one or more payment components 504, as depictedby the broken lines at reference numeral 508. However, if the paymentback-end 506 is a recipient of encrypted data 112, such as an outputfrom the POS front-end 114 of FIGS. 1 and 2, then the payment back-end506 should be endowed with the ability to process and/or decrypt theencrypted data 112.

In accordance therewith, the back-end interface 502 can intercept theencrypted data 112 and a decryption component 510 can decrypt theencrypted data 112, thereby allowing unencrypted data 106 to bedelivered to the payment component 504 or another payment component (notshown) within the payment back-end 506. As such, the encryption schemeemployed (e.g., at the POS front-end 114 of FIGS. 1, 2) can be definedat the payment back-end 506 and/or by the system 500. Thus,cryptographic information 512 can be supplied to the POS front-end inadvance, or upon a request from the POS front-end such as just prior toor during a transaction at a POS.

With reference now to FIG. 6, system 600 with a back-end that includesexample payment components that can facilitate a more secure transactionprocessing environment is illustrated. In general, the payment back-end506 can transmit cryptographic information 512 by way of a Wide AreaNetwork (WAN) such as the Internet or the like to a remote third party.The cryptographic information 512 can be securely stored in thedecryption component 510 (and/or in one or more payment components5041-504M), and can be associated with the PKI described supra withreference to FIG. 1. For example, the cryptographic information 512 caninclude, e.g., a public key 5121 as well as a cryptographic algorithm5122.

The cryptographic information 512 can be defined by the payment back-end504 (or component thereof) or another financial institution and/or by aregulatory committee or standards board or another financialassociation. As such, the PKI (and the cryptographic information 512)can be established by more trusted or reliable parties than a POS vendoror other party where a transaction is likely to occur. Moreover, theequipment used either at a front-end or a back-end can be certifiedand/or approved by the aforementioned financial associations orinstitutions potentially leading to a higher level of payment datasecurity and trust for payment processors, issuing and acquiring banksand card association, and can simplify data security compliancecertification of POS applications and solutions as one aspect of thoseapplications and solutions can be guaranteed by a platform.

In accordance with the foregoing, the payment back-end 506 can receiveencrypted data 112 from the POS application 204. Typically, theencrypted data 112 can be salient and/or sensitive data obtained from apayment instrument as substantially described above and encrypted byutilizing the cryptographic information 512. The encrypted data 112 canbe passed to one of the example payment components 5041-504M, some orall of which can be present in the payment back-end 506. The back-endinterface 502 can be operatively attached or embedded within one or moreof the payment components 5041-504M, and can intercept encrypted data112.

For example, the back-end interface 502 (as well as the decryptioncomponent 510) can be coupled to the payment processor 5041. In thatcase, the decryption component 510 can decrypt the encrypted data 112,e.g., by utilizing a private key 602 associated with the public key 5121as the underlying transaction is processed by the principal financialinstitution associated with a payment instrument. In the case where thepayment processor 5041 is incapable of supporting the decryption ofencrypted data 112 and/or such would require too much modification to aback-end system, then the decryption can be performed at the paymentobject 5042. In addition, as with the case of POS middleware 104Ndetailed in connection with FIG. 2, the payment back-end 506 can alsoemploy middleware, such as payment middleware 504M, in order to, e.g.,decrypt encrypted data 112.

FIG. 7 illustrates a block diagram of a system 700 that can facilitateend-to-end encryption of POS transaction information. System 700 isprovided in order to illustrate an example embodiment in which many ofthe aspects of the claimed subject matter are depicted simultaneouslyand can be interacting in unison. As shown, the payment back-end 506,which can include one or more payment components 504 to which a back-endinterface 502 and a decryption component 510 can be attached, cantransmit cryptographic information 512 (e.g., a public key, etc.) to thePOS front-end 114 (or a component therein). The POS front-end 114 canalso received data 106 obtained from a payment instrument 202.

For example, the POS component 104 can be a MSR device that scans themagnetic stripe of the payment instrument 202 (e.g., a credit card). Thefront-end interface 102 can be attached to the MSR device (or anotherPOS component 104) and can intercept the data 106. The securitycomponent 110 can create encrypted data 112 from the unencrypted data106, e.g., by employing the public key, or other cryptographicinformation 512. Ultimately, in some cases after first traversing otherPOS components 104 such as a POS service object, the encrypted data 112can be transmitted to the POS application 204, after which the encrypteddata 112 can be forwarded to the payment back-end 506.

It is to be appreciated that the POS application 204 (as well as otherpotentially unsafe application) need not ever have access to unencrypteddata 106. Rather, the encrypted data 112 can be decrypted by thedecryption component 510 as the encrypted data 112 is received at one ofthe payment components 504. It is also to be appreciated that a range ofpossible implementation options is available. As one example, the data106 can be encrypted in the reading hardware (e.g., a POS input device).In accordance with another example, the encryption of data 106 can beentirely software based such as in a POS service object, POS middleware,or another POS component 104. If the encryption functionality is builtinto the hardware such as an MSR device or other POS input device, anddecryption is performed by the payment processor, potentially onlyencrypted data would flow through the software stack on the POSfront-end 114.

It is to be further appreciated that the encryption performed by thesecurity component 110 has been, for the sake of consistency andunderstanding, described herein as accomplished by way of, e.g., anasymmetric PKI public key or certificate, other arrangements can existeither alternatively or in addition to. For example, one variation couldinclude encrypting data 106 with a single use symmetric key, and thenpassing the symmetric key encrypted by an asymmetric public key alongwith data. Cryptographic algorithm(s), key length and/or otherparameters of cryptographic information 512 can be predefined by thesolution, or specified by the payment processor, payment object, oranother payment component 504, as well as by a third party agency orassociation.

Furthermore, as indicated supra, one object of the claimed subjectmatter can be to isolate the POS application 204 from unencrypted data106. In accordance therewith, the POS front-end 114 and the paymentback-end 506 have been largely described herein as being exclusive ofthe POS application 204. For example, data 106 can be encrypted at thePOS front-end 114, pass through the POS application 204 as encrypteddata 112, then be decrypted at the payment back-end 506. However, incertain situations, either one or both of the POS front-end 114 and thepayment back-end 506 can include aspects of the POS application 204. Forinstance, some vendors implement POS service objects and/or POSmiddleware as, e.g., external modules and/or external libraries loadedby the POS application 204. Likewise, payment objects and/or paymentmiddleware can also be implemented by the POS application 204 in asimilar manner. As such, in these cases and for the sake of a morecomprehensive understanding, it should be called out that front-endinterface 102 and/or security component 110 can exist as an (or part ofan) external module (etc.) of the POS application 204. Similarly, thesame goes for the back-end interface 502 and/or the decryption component510

FIGS. 8, 9 and 10 illustrate process flow diagrams ofcomputer-implemented methods. While, for purposes of simplicity ofexplanation, the one or more methods shown herein, e.g., in the form ofa flow chart, are shown and described as a series of acts, it is to beunderstood and appreciated that the subject invention is not limited bythe order of acts, as some acts may, in accordance with the claimedsubject matter, occur in a different order and/or concurrently withother acts from that shown and described herein. For example, thoseskilled in the art will understand and appreciate that a methodologycould alternatively be represented as a series of interrelated states orevents, such as in a state diagram. Moreover, not all illustrated actsmay be required to implement a methodology in accordance with theclaimed subject matter.

Referring now to FIG. 8, an exemplary flow chart of procedures defininga method 800 for configuring interfaces is illustrated. At referencenumeral 802 a first interface can be configured for interacting with aPOS component. The POS component can be, e.g., a POS input device suchas a MSR device, a MICR device, a PIN pad, an RFID transceiver, or thelike. In addition, the POS component can be a POS object associated withthe POS input device; or the POS component can be POS middleware.Regardless of the type of POS component, the first interface can beconfigured to interact with the POS component and, e.g., be operativelycoupled to the POS component.

At reference numeral 804, a second interface can be configured forinteracting with a payment component. The payment component can be,e.g., a payment processor, a payment object associated with the paymentprocessor. In addition, the payment object can be payment middleware orthe like. Accordingly, irrespective of the type of payment component athand, the second interface can interact with the payment component.

Turning now to FIG. 9, an exemplary flow chart of procedures defining amethod for intercepting and encrypting information associated with apayment instrument before it is transmitted to a POS application isdepicted. Generally, at reference numeral 902, transaction data withinformation relating to a purchase instrument can be received. Thepurchase instrument can be, e.g., a credit card, a debit card, a checkor other negotiable instrument, a contactless card or other device withan RFID transponder, etc. It is to be appreciated that the transactiondata can be received by the first interface (described supra inconnection with FIG. 8) at substantially any POS component (alsodescribed supra in connection with FIG. 8).

At reference numeral 904, a public key corresponding to a financialinstitution can be retrieved. The public key can reside in a data storeand accessed based upon information associated with a purchaseinstrument. Additionally or alternatively, the public key can beretrieved from the financial institution during a transaction, e.g., ifthe public key is not already in the data store, the public key needs tobe updated, or the like. At reference numeral 906, the public key can beemployed for encrypting the point-of-sale transaction data obtained fromthe payment instrument, e.g., in accordance with a PKI arrangement. Atreference numeral 908, the encrypted POS transaction data can betransmitted to a POS application (or another application)

Turning now to FIG. 10, an exemplary flow chart of procedures defining amethod for intercepting and decrypting transaction data after thetransaction data has traversed a POS application is illustrated. Atreference numeral 1002, encrypted POS transaction data can be receivedfrom a POS application. For example, the POS transaction data can bereceived and encrypted prior to exposure to any application on apoint-of-sale front-end. At reference numeral 1004, a private key can beemployed for decrypting the encrypted POS transaction data. The privatekey can be associated with, e.g., a public key employed for encryptionat the point-of-sale front-end (e.g., a key pair) in accordance with aPKI arrangement.

FIGS. 11A-11E illustrate various arrangements for end-to-end processingof POS transaction, and can be referenced together simultaneously. Theassorted components are intended to reflect at least one particularaspect, but it is to be appreciated other arrangements are possible andcontemplated to be within the scope and spirit of the claimed subjectmatter. For example, FIGS. 11A-11E illustrate an MSR device 1102 as theprimary input device for the sake of easy of understanding andconsistent reference, but it should be understood that other inputdevices could be utilized as well. Moreover, the remaining componentscould exist in various other embodiments as well.

FIG. 11A depicts aspects of a conventional POS transaction. An MSRdevice 1102, e.g., at a point-of-sale location can obtain data 1104(e.g., by reading a magnetic stripe of a credit card for instance). TheMSR device 1102 can then pass the data 1104 read from the magneticstripe to an associated service object 1106. The service object 1106 candecode the raw data 1104 and forward the data 1104 to a POS application1108. The POS application 1108 can send a payment request along with thedata 1104 to the payment object 1110 (or in some cases, although notspecifically depicted, directly to a payment processor 1114). Uponreceipt of the information from the POS application 1108, the paymentobject 1110 can transmit a request to the payment processor 1114 and/orforward the data 1112 to the payment processor 1114. It is to beappreciated that data 1112 can be substantially similar to data 1104,but data 1112 may or may not be encrypted depending upon, e.g., aconfiguration of the payment processor 1114 back-end.

FIG. 11B illustrates an arrangement in accordance with one aspect of theclaimed subject matter. In particular, the conventional arrangementdescribed in FIG. 11A can be modified as described herein in order topass a public key 1118 from the payment processor 1114 to apoint-of-sale front-end, such as to the MSR device 1102 itself.Accordingly, sensitive transaction data such as data obtained from thepayment instrument can be encrypted as early as is feasible. Inparticular, the POS application 1108 (or another application running onfront-end hardware, etc.) will not have access to this information in anunencrypted form. As depicted, only encrypted data 1116 passes to theremaining components (e.g., 1106, 1108, 1110 . . . ) to the paymentprocessor 1114.

FIG. 11C shows one aspect of the claimed subject matter in which theencryption of transaction data is accomplished at the MSR service object1106 rather than the MSR device 1102. For example, this aspect can beemployed in cases where the MSR device 1102 is not easily adaptable toprovide for encryption. The public key 1118 can be transmitted from thepayment processor 1114 to the MSR service object 1106 where data 1104can be encrypted. Thus, encrypted data 1116 can be delivered to the POSapplication 1108, then on to the payment object 1110 and finally to thepayment processor 1114.

FIG. 11D depicts one aspect of the claimed subject matter in which thedecryption performed at the payment object 1110 rather than at thepayment processor 1114. It is to be understood that although theencryption is depicted to occur at the MSR service object 1106, theencryption operations could also occur at the MSR device 1102 asdescribed supra, in connection with FIG. 11B. Accordingly, although notshown, public key 1118 could also be transmitted to the MSR device 1102,and, in such a case, the data 1104 shown as passing to MSR serviceobject 1106 could be encrypted data 1116 instead. Regardless, the POSapplication 1108 is in receipt only of encrypted data 1116, which isforwarded to the payment object 1110 where encrypted data 1116 can bedecrypted as detailed herein. Thus, data 1112 (which may or may not bedecrypted, e.g., in accordance with a configuration employed at thepayment back-end) can be transmitted to the payment processor 1114.

FIG. 11E illustrates an aspect of the claimed subject matter wherein atleast one of the front-end or the back-end is not equipped to easilyachieve the encryption/decryption described herein. In particular, ifneither the hardware (e.g., the MSR device 1102) nor the software (e.g.,MSR service object 1106) is able to support encryption, or if such analteration is simply less convenient for the front-end than to utilizemiddleware, then POS middleware 1120 can be employed to receive thepublic key 1118 and/or encrypt the data 1104. Likewise, should theback-end not be organized to handle appropriate decryption at either thehardware level or the software level; or simply if the use of middlewarewould represent a more favorable back-end solution, payment middleware1122 can be utilized to decrypt the data 1116. Once decrypted, the data1104 can be delivered to the payment object 1110, which can then pass tothe payment processor 1114 in the form of data 1112, which may or maynot be encrypted according to some other protocol. It is to beappreciated that

Should we stress here that 1106, 1110, 1120 and 1122 run on the POSsystem as external modules of 1108?

Referring now to FIG. 12, there is illustrated a block diagram of anexemplary computer system operable to execute the disclosedarchitecture. In order to provide additional context for various aspectsof the claimed subject matter, FIG. 12 and the following discussion areintended to provide a brief, general description of a suitable computingenvironment 1200 in which the various aspects of the claimed subjectmatter can be implemented. For example, various components of thesystems and/or aspects thereof described supra can be implemented by wayof the system 1200. Additionally, while the claimed subject matter hasbeen described above in the general context of computer-executableinstructions that may run on one or more computers, those skilled in theart will recognize that the claimed subject matter also can beimplemented in combination with other program modules and/or as acombination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the claimed subject matter may also bepracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and nonvolatile media,removable and non-removable media. By way of example, and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include bothvolatile and nonvolatile, removable and non-removable media implementedin any method or technology for storage of information such ascomputer-readable instructions, data structures, program modules orother data. Computer storage media includes, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

With reference again to FIG. 12, the exemplary environment 1200 forimplementing various aspects of the claimed subject matter includes acomputer 1202, the computer 1202 including a processing unit 1204, asystem memory 1206 and a system bus 1208. The system bus 1208 couples tosystem components including, but not limited to, the system memory 1206to the processing unit 1204. The processing unit 1204 can be any ofvarious commercially available processors. Dual microprocessors andother multi-processor architectures may also be employed as theprocessing unit 1204.

The system bus 1208 can be any of several types of bus structure thatmay further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1206includes read-only memory (ROM) 1210 and random access memory (RAM)1212. A basic input/output system (BIOS) is stored in a non-volatilememory 1210 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1202, such as during start-up. The RAM 1212 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1202 further includes an internal hard disk drive (HDD)1214 (e.g., EIDE, SATA), which internal hard disk drive 1214 may also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1216, (e.g., to read from or write to aremovable diskette 1218) and an optical disk drive 1220, (e.g., readinga CD-ROM disk 1222 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1214, magnetic diskdrive 1216 and optical disk drive 1220 can be connected to the systembus 1208 by a hard disk drive interface 1224, a magnetic disk driveinterface 1226 and an optical drive interface 1228, respectively. Theinterface 1224 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE1394 interfacetechnologies. Other external drive connection technologies are withincontemplation of the claimed subject matter.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1202, the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer, such as zipdrives, magnetic cassettes, flash memory cards, cartridges, and thelike, may also be used in the exemplary operating environment, andfurther, that any such media may contain computer-executableinstructions for performing the methods of the claimed subject matter.

A number of program modules can be stored in the drives and RAM 1212,including an operating system 1230, one or more application programs1232, other program modules 1234 and program data 1236. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1212. It is appreciated that the claimed subjectmatter can be implemented with various commercially available operatingsystems or combinations of operating systems.

A user can enter commands and information into the computer 1202 throughone or more wired/wireless input devices, e.g., a keyboard 1238 and apointing device, such as a mouse 1240. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 1204 through an input deviceinterface 1242 that is coupled to the system bus 1208, but can beconnected by other interfaces, such as a parallel port, an IEEE1394serial port, a game port, a USB port, an IR interface, etc.

A monitor 1244 or other type of display device is also connected to thesystem bus 1208 via an interface, such as a video adapter 1246. Inaddition to the monitor 1244, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1202 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1248. The remotecomputer(s) 1248 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer1202, although, for purposes of brevity, only a memory/storage device1250 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1252 and/orlarger networks, e.g., a wide area network (WAN) 1254. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich may connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 1202 isconnected to the local network 1252 through a wired and/or wirelesscommunication network interface or adapter 1256. The adapter 1256 mayfacilitate wired or wireless communication to the LAN 1252, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adapter 1256.

When used in a WAN networking environment, the computer 1202 can includea modem 1258, or is connected to a communications server on the WAN1254, or has other means for establishing communications over the WAN1254, such as by way of the Internet. The modem 1258, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1208 via the serial port interface 1242. In a networkedenvironment, program modules depicted relative to the computer 1202, orportions thereof, can be stored in the remote memory/storage device1250. It will be appreciated that the network connections shown areexemplary and other means of establishing a communications link betweenthe computers can be used.

The computer 1202 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE 802.11(a, b,g, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE 802.3 or Ethernet).Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, atan 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, orwith products that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic 12 BaseT wiredEthernet networks used in many offices.

Referring now to FIG. 13, there is illustrated a schematic block diagramof an exemplary computer compilation system operable to execute thedisclosed architecture. The system 1300 includes one or more client(s)1302. The client(s) 1302 can be hardware such as a digital camera withcomputer interface support and/or software (e.g., threads, processes,computing devices). The client(s) 1302 can house cookie(s) and/orassociated contextual information by employing the claimed subjectmatter, for example.

The system 1300 also includes one or more server(s) 1304. The server(s)1304 can also be hardware and/or software (e.g., threads, processes,computing devices). The servers 1304 can house threads to performtransformations by employing the claimed subject matter, for example.One possible communication between a client 1302 and a server 1304 canbe in the form of a data packet adapted to be transmitted between two ormore computer processes. The data packet may include a cookie and/orassociated contextual information, for example. The system 1300 includesa communication framework 1306 (e.g., a global communication networksuch as the Internet) that can be employed to facilitate communicationsbetween the client(s) 1302 and the server(s) 1304.

Communications can be facilitated via a wired (including optical fiber)and/or wireless technology. The client(s) 1302 are operatively connectedto one or more client data store(s) 1308 that can be employed to storeinformation local to the client(s) 1302 (e.g., cookie(s) and/orassociated contextual information). Similarly, the server(s) 1304 areoperatively connected to one or more server data store(s) 1310 that canbe employed to store information local to the servers 1304.

What has been described above includes examples of the variousembodiments. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing the embodiments, but one of ordinary skill in the art mayrecognize that many further combinations and permutations are possible.Accordingly, the detailed description is intended to embrace all suchalterations, modifications, and variations that fall within the spiritand scope of the appended claims.

In particular and in regard to the various functions performed by theabove described components, devices, circuits, systems and the like, theterms (including a reference to a “means”) used to describe suchcomponents are intended to correspond, unless otherwise indicated, toany component which performs the specified function of the describedcomponent (e.g., a functional equivalent), even though not structurallyequivalent to the disclosed structure, which performs the function inthe herein illustrated exemplary aspects of the embodiments. In thisregard, it will also be recognized that the embodiments includes asystem as well as a computer-readable medium having computer-executableinstructions for performing the acts and/or events of the variousmethods.

In addition, while a particular feature may have been disclosed withrespect to only one of several implementations, such feature may becombined with one or more other features of the other implementations asmay be desired and advantageous for any given or particular application.Furthermore, to the extent that the terms “includes,” and “including”and variants thereof are used in either the detailed description or theclaims, these terms are intended to be inclusive in a manner similar tothe term “comprising.”

1. A front-end system configured to facilitate a secure Point-of-Sale(POS) transaction environment, comprising: a POS component configured torequest a public key from an external back-end component in response toinitiation of a POS transaction and to receive the public key, the POScomponent being a portion of a POS device; a front-end interfaceconfigured to attach to the POS component, wherein the front-endinterface is further configured to intercept unencrypted data obtaineddirectly from a payment instrument; and a security component configuredto encrypt the unencrypted data using an encryption key and the publickey, such that the data may only be decrypted by the external back-endcomponent with a private key, and such that neither sensitiveunencrypted data associated with the payment instrument nor tools neededto decode the data are accessible by a POS application executed by thePOS device.
 2. The front-end system of claim 1, wherein the securitycomponent is configured to receive the encryption key from the externalback-end component.
 3. The front-end system of claim 2, wherein thesecurity component is configured to query the external back-endcomponent for the encryption key.
 4. The front-end system of claim 1,wherein the security component is configured to obtain the encryptionkey from an internal location within the front-end system.
 5. Thefront-end system of claim 1, wherein the POS component is a POS inputdevice.
 6. The front-end system of claim 5, wherein the POS input deviceis at least one of a Magnetic Stripe Reader (MSR), a Magnetic InkCharacter Recognition (MICR) device, a Personal Identification Number(PIN) pad, a Radio Frequency Identification (RFID) transceiver, or alight source-based scanner.
 7. The front-end system of claim 1, whereinthe POS component is a POS service object.
 8. The front-end system ofclaim 1, wherein the POS component is POS middleware or a combination ofa POS service object and POS middleware.
 9. The front-end system ofclaim 1, wherein the security component is configured to employ a PublicKey Infrastructure (PKI) to encrypt the data.
 10. The front-end systemof claim 1, wherein the payment instrument is at least one of a creditcard, a debit card, a charge card, a check, a contactless card, or anegotiable instrument.
 11. A method that facilitates a securePoint-of-Sale (POS) transaction environment, comprising: isolating, by aPOS device, unencrypted data obtained from a payment instrument, whereinthe unencrypted data is inaccessible to a POS application executedwithin the POS device; requesting a public key from a source external tothe POS device in response to a POS transaction being initiated;encrypting the unencrypted data using an encryption key and the publickey, wherein the unencrypted data is converted into encrypted data thatmay only be decrypted by an external back-end component with a privatekey; and transmitting the encrypted data to the external back-endcomponent.
 12. The method of claim 11, further comprising receiving theencryption key from the external back-end component.
 13. The method ofclaim 12, further comprising querying the external back-end componentfor the encryption key.
 14. The method of claim 11, further comprisingobtaining the encryption key from an internal location within the POSdevice.
 15. The method of claim 11, wherein the transmitting isperformed by the POS application.
 16. The method of claim 11, whereinthe encrypting further comprises employing a Public Key Infrastructure(PKI) to encrypt the data.
 17. A computer-readable storage medium thatfacilitates a secure Point-of-Sale (POS) transaction environment,comprising: computer-readable instructions, the computer-readableinstructions including instructions for causing at least one processorto: intercept unencrypted data associated with a payment instrument,wherein the intercepting isolates the unencrypted data from a POSapplication executed within a POS device and the intercepting occurs atthe POS device; request a public key from a source external to the POSdevice in response to a POS transaction being initiated; encrypt theunencrypted data using an encryption key and the public key, wherein theunencrypted data is converted into encrypted data that may only bedecrypted with a private key; and provide the encrypted data to the POSapplication.
 18. The computer-readable storage medium of claim 17,wherein the computer-readable instructions including instructions forcausing at least one processor to receive the encryption key from anexternal back-end component.
 19. The computer-readable storage medium ofclaim 18, wherein the computer-readable instructions includinginstructions for causing at least one processor to query the externalback-end component for the encryption key.
 20. The computer-readablestorage medium of claim 17, wherein the computer-readable instructionsincluding instructions for causing at least one processor to retrievethe encryption key from an internal location within the POS device.