International Business Machines Corporation
Secure display of transaction approval code
Last updated:
Abstract:
One or more processors performing an obfuscation action on a display of a first computing device subsequent to activating a transaction application of the first computing device. The method includes one or more processors measuring a distance between the first computing device and a second computing device, wherein the display of the first computing device is directed towards the second computing device. The method further includes the one or more processors determining whether the distance between the first computing device and the second computing device meets a pre-determined threshold distance. In response to determining the distance between the first computing device and the second computing device does meet the pre-determined threshold distance, the method further includes the one or more processors deactivating the obfuscation action on the display of the first computing device and displaying an authorization image directed to the second computing device.
Utility
3 Mar 2020
9 Aug 2022