Visa Inc.
Cloud-based transactions methods and systems

Last updated:

Abstract:

Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include receiving a cryptogram generation key replenishment request that includes transaction log information derived from transaction data stored in a transaction log on a communication device, verifying that the transaction log information in the replenishment request is consistent with the previously received transaction information, and providing a new cryptogram generation key to the communication device in response to verifying the transaction log information in the replenishment request.

Status:
Grant
Type:

Utility

Filling date:

10 Apr 2018

Issue date:

26 May 2020