×

Cloud-based transactions methods and systems

  • US 9,972,005 B2
  • Filed: 12/19/2014
  • Issued: 05/15/2018
  • Est. Priority Date: 12/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for enhancing security of a communication device when conducting a transaction using the communication device, the method comprising:

  • receiving, from a remote computer by the communication device, a limited-use key (LUK) that is associated with a set of one or more limited-use thresholds that limits usage of the LUK, wherein the LUK is usable for more than one transaction;

    generating, by the communication device, a transaction cryptogram using the LUK;

    sending, to an access device by the communication device, a token instead of a real account identifier and the transaction cryptogram to conduct the transaction, wherein the transaction is authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds;

    sending, to the remote computer by the communication device, a replenishment request for a second LUK, the replenishment request including transaction log information derived from transaction data that is unique for each of a plurality of transactions conducted using the LUK, the transaction data being stored in a transaction log on the communication device; and

    receiving, from the remote computer by the communication device, the second LUK when the transaction log information in the replenishment request matches transaction log information at the remote computer, the second LUK being a different key than the LUK.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×