Enhanced authentication based on secondary device interactions
First Claim
Patent Images
1. A method comprising:
- receiving, by a primary device, credential data of a secondary device;
generating, by the primary device, a cryptogram using the credential data of the secondary device; and
transmitting, by the primary device, the cryptogram to an access device to request for authorization to use an account associated with a user of the primary device, wherein the primary device interacts with the access device without presence of the secondary device, and wherein the authorization is granted based on verification of the cryptogram and an interaction activity pattern of interactions between the primary device and a set of communication devices including the secondary device.
2 Assignments
0 Petitions
Accused Products
Abstract
Enhance authentication techniques may include receiving credential data of a secondary device by a primary device, generating a cryptogram using the credential data of the secondary device, and transmitting the cryptogram to an access device to request for authorization to use an account associated with a user of the primary device. The authorization can be granted based on verification of the cryptogram and an interaction activity pattern of interactions between the primary device and a set of communication devices including the secondary device.
21 Citations
19 Claims
-
1. A method comprising:
-
receiving, by a primary device, credential data of a secondary device; generating, by the primary device, a cryptogram using the credential data of the secondary device; and transmitting, by the primary device, the cryptogram to an access device to request for authorization to use an account associated with a user of the primary device, wherein the primary device interacts with the access device without presence of the secondary device, and wherein the authorization is granted based on verification of the cryptogram and an interaction activity pattern of interactions between the primary device and a set of communication devices including the secondary device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A communication device comprising:
-
a processor; and a memory storing computer readable instructions, which when executed by the processor, cause the communication device to perform operations including; receiving credential data of a secondary device; generating a cryptogram using the credential data of the secondary device; and transmitting the cryptogram to an access device to request for authorization to use an account associated with a user of the communication device, wherein the communication device interacts with the access device without presence of the secondary device, and wherein the authorization is granted based on verification of the cryptogram and an interaction activity pattern of interactions between the communication device and a set of user devices including the secondary device. - View Dependent Claims (19)
-
Specification