Validation cryptogram for interaction

A password and key technology, applied in the field of verification password for interaction

Active Publication Date: 2018-11-23
VISA INT SERVICE ASSOC
View PDF18 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although peer-to-peer transactions enable individuals to send va

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Validation cryptogram for interaction
  • Validation cryptogram for interaction
  • Validation cryptogram for interaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Embodiments of the present invention relate to preventing man-in-the-middle attacks, replay attacks, and other fraudulent interactions. Embodiments may prevent these fraudulent interactions by verifying the authenticity of the interaction and interaction parameters. A first party (eg, "sender") may initiate an interaction via a first device (eg, "sender device") to send value to a second party (referred to as a "recipient"). The sender can initiate the interaction by selecting the value to send, selecting the account from which to get the value, and by indicating the recipient to receive the value. The sender device may then generate a password for the interaction. The password may be generated using a key associated with the sender, information identifying the sender, and information identifying the recipient.

[0022] When an interaction request is sent to the interaction processing computer, the interaction processing computer may verify that the password is authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for validating an interaction is disclosed. A first interaction cryptogram can be generated by a first device using information about a first party to the interaction and a second party to the interaction. A second interaction cryptogram can be generated by a second device also using information about the first party to the interaction and the second party to the interaction. Verifying each cryptogram can validate that the interaction details have not been changed, and that both the first party and second party legitimately authorized the interaction.

Description

[0001] Cross References to Related Applications [0002] This application is an International Patent Application claiming the benefit of the filing date of U.S. Provisional Application No. 62 / 308,788, filed March 15, 2016, which is hereby incorporated by reference in its entirety for all purposes. Background technique [0003] Peer-to-peer transactions allow individuals to exchange information and value directly. Peer-to-peer transactions can be implemented by intermediary applications such as digital wallet providers. [0004] For example, Alice can activate the digital wallet application on her mobile device and activate the peer-to-peer transaction function. Alice enters her account credentials and indicates that she wants to send the payment to Bob by entering Bob's phone number. When Alice submits the transaction, Alice's mobile device sends her credentials to the digital wallet provider along with the transaction amount and Bob's phone number. The digital wallet prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60H04L9/08
CPCH04L63/0428H04L63/12H04L9/14H04L9/3247H04L2209/56H04L2463/102H04L9/0618H04L9/30
Inventor P·拉凡德V·莫迪G·L·鲍威尔
Owner VISA INT SERVICE ASSOC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products