VALIDATION CRYPTOGRAM FOR TRANSACTION
First Claim
Patent Images
1. A method comprising:
- receiving, by a server computer, an interaction request including interaction details and a first cryptogram, the interaction details including receiver information, wherein the first cryptogram was generated using the receiver information;
verifying, by the server computer, the first cryptogram; and
coordinating, by the server computer, a transfer from a sender to a receiver.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for validating an interaction is disclosed. A first interaction cryptogram can be generated by a first device using information about a first party to the interaction and a second party to the interaction. A second interaction cryptogram can be generated by a second device also using information about the first party to the interaction and the second party to the interaction. Verifying each cryptogram can validate that the interaction details have not been changed, and that both the first party and second party legitimately authorized the interaction.
70 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a server computer, an interaction request including interaction details and a first cryptogram, the interaction details including receiver information, wherein the first cryptogram was generated using the receiver information; verifying, by the server computer, the first cryptogram; and coordinating, by the server computer, a transfer from a sender to a receiver. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A server computer comprising:
-
a processor; and a computer readable medium, the computer readable medium comprising code, executable by the processor, for implementing a method comprising; receiving an interaction request including interaction details and a first cryptogram, the interaction details including receiver information, wherein the first cryptogram was generated using the receiver information; verifying the first cryptogram; and coordinating a transfer from a sender to a receiver. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving, by a first computer, interaction details and a first cryptogram, the interaction details including receiver information, wherein the first cryptogram was generated using the receiver information; sending, by the first computer, an interaction confirmation request to a receiver device associated with the receiver information; receiving, by the first computer, an interaction confirmation response from the receiver device; and sending, by the first computer, to a second computer, an interaction request including the interaction details and the first cryptogram, wherein the second computer verifies the first cryptogram and coordinates a transfer from a sender to a receiver. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A first computer comprising:
-
a processor; and a computer readable medium, the computer readable medium comprising code, executable by the processor, for implementing a method comprising; receiving interaction details and a first cryptogram, the interaction details including receiver information, wherein the first cryptogram was generated using the receiver information; sending an interaction confirmation request to a receiver device associated with the receiver information; receiving an interaction confirmation response from the receiver device; and sending, to a second computer, an interaction request including the interaction details and the first cryptogram, wherein the second computer verifies the first cryptogram and coordinates a transfer from a sender to a receiver. - View Dependent Claims (17, 18, 19, 20)
-
Specification