Visa Inc.
Enhanced authentication based on secondary device interactions
Last updated:
Abstract:
Enhance authentication techniques may include receiving credential data of a secondary device by a primary device, generating a cryptogram using the credential data of the secondary device, and transmitting the cryptogram to an access device to request for authorization to use an account associated with a user of the primary device. The authorization can be granted based on verification of the cryptogram and an interaction activity pattern of interactions between the primary device and a set of communication devices including the secondary device.
Status:
Grant
Type:
Utility
Filling date:
13 Apr 2016
Issue date:
24 Mar 2020