CLOUD-BASED TRANSACTIONS METHODS AND SYSTEMS
First Claim
1. A method for enhancing security of a communication device when conducting a transaction using the communication device, the method comprising:
- receiving, from a remote computer, a limited-use key (LUK) that is associated with a set of one or more limited-use thresholds that limits usage of the LUK;
generating, by the communication device, a transaction cryptogram using the LUK; and
sending, to an access device, a token instead of a real account identifier and the transaction cryptogram to conduct the transaction, wherein the transaction is authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction cryptogram, and sending a token instead of a real account identifier and the transaction cryptogram to an access device to conduct the transaction. The LUK may be associated with a set of one or more limited-use thresholds that limits usage of the LUK, and the transaction can be authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds.
-
Citations
24 Claims
-
1. A method for enhancing security of a communication device when conducting a transaction using the communication device, the method comprising:
-
receiving, from a remote computer, a limited-use key (LUK) that is associated with a set of one or more limited-use thresholds that limits usage of the LUK; generating, by the communication device, a transaction cryptogram using the LUK; and sending, to an access device, a token instead of a real account identifier and the transaction cryptogram to conduct the transaction, wherein the transaction is authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A communication device comprising:
-
a processor; and a memory coupled to the processor and storing a mobile application that performs operations for enhancing security of the communication device when conducting transactions using the communication device, the operations including; receiving a limited-use key (LUK) that is associated with a set of one or more limited-use thresholds that limits usage of the LUK; generating a transaction cryptogram using the LUK; and sending a token instead of a real account identifier and the transaction cryptogram to an access device to conduct the transaction, wherein the transaction is authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification