Visa Inc.
Offline authentication
Last updated:
Abstract:
Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction cryptogram, and using a signature key to generate a signature. The transaction can be an offline data authentication transaction, and access can be granted based on authentication of the signature prior to verifying the transaction cryptogram.
Status:
Grant
Type:
Utility
Filling date:
21 May 2015
Issue date:
24 Nov 2020