CLOUD-BASED TRANSACTIONS METHODS AND SYSTEMS

Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction cryptogram, and sending a token instead of a real account identifier and the transaction cryptogram to an a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: FLURSCHEIM, Christian, MAKHOTIN, Oleg, LOPEZ, Eduardo, SHARMA, Sanjeev, SHEETS, John, JONES, Christopher, GUGLANI, Abhishek, SEVANTO, Jarkko Oskari, OR, Tai Lung Burnnet, WONG, Erick, AABYE, Christian, NGO, Hao, PATEL, Bharatkumar
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction cryptogram, and sending a token instead of a real account identifier and the transaction cryptogram to an access device to conduct the transaction. The LUK may be associated with a set of one or more limited-use thresholds that limits usage of the LUK, and the transaction can be authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds.