Visa Inc.
Offline authentication

Last updated:

Abstract:

Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction cryptogram, and using a signature key to generate a signature. The transaction can be an offline data authentication transaction, and access can be granted based on authentication of the signature prior to verifying the transaction cryptogram.

Status:
Grant
Type:

Utility

Filling date:

21 May 2015

Issue date:

24 Nov 2020