Visa Inc.
Enhanced authentication based on secondary device interactions

Last updated:

Abstract:

Enhance authentication techniques may include receiving credential data of a secondary device by a primary device, generating a cryptogram using the credential data of the secondary device, and transmitting the cryptogram to an access device to request for authorization to use an account associated with a user of the primary device. The authorization can be granted based on verification of the cryptogram and an interaction activity pattern of interactions between the primary device and a set of communication devices including the secondary device.

Status:
Grant
Type:

Utility

Filling date:

7 Feb 2020

Issue date:

10 Aug 2021