ENHANCED AUTHENTICATION BASED ON SECONDARY DEVICE INTERACTIONS
First Claim
Patent Images
1. A method comprising:
- receiving, by a primary device, credential data of a secondary device;
generating, by the primary device, a cryptogram using the credential data of the secondary device; and
transmitting, by the primary device, the cryptogram to an access device to request for authorization to use an account associated with a user of the primary device, wherein the authorization is granted based on verification of the cryptogram and an interaction activity pattern of interactions between the primary device and a set of communication devices including the secondary device.
2 Assignments
0 Petitions
Accused Products
Abstract
Enhance authentication techniques may include receiving credential data of a secondary device by a primary device, generating a cryptogram using the credential data of the secondary device, and transmitting the cryptogram to an access device to request for authorization to use an account associated with a user of the primary device. The authorization can be granted based on verification of the cryptogram and an interaction activity pattern of interactions between the primary device and a set of communication devices including the secondary device.
42 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a primary device, credential data of a secondary device; generating, by the primary device, a cryptogram using the credential data of the secondary device; and transmitting, by the primary device, the cryptogram to an access device to request for authorization to use an account associated with a user of the primary device, wherein the authorization is granted based on verification of the cryptogram and an interaction activity pattern of interactions between the primary device and a set of communication devices including the secondary device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A communication device comprising:
-
a processor; and a memory storing computer readable instructions, which when executed by the processor, cause the communication device to perform operations including; receiving credential data of a secondary device; generating a cryptogram using the credential data of the secondary device; and transmitting the cryptogram to an access device to request for authorization to use an account associated with a user of the communication device, wherein the authorization is granted based on verification of the cryptogram and an interaction activity pattern of interactions between the communication device and a set of user devices including the secondary device. - View Dependent Claims (20)
-
Specification