G06F21/45

Break the glass for financial access

Systems, methods, and computer-readable storage media utilized for determining access to a financial account held by a customer of a financial institution. One method includes establishing a communication session with a sensor device, wherein the financial institution computing system continuously receives sensor data over the communication session and receiving, from a point-of-sale (POS) terminal, a payment request. The method further includes retrieving, from the user device via an application programming interface (API), device data including at least application data and receiving, from the sensor device, the sensor data including at least one of geolocation data or biometric data of the sensor device. The method further includes determining the customer experienced an adverse event based on the sensor data and the device data and determining automatically an access level. The method further includes authorizing, by the processor, the payment request utilizing the financial account held by the customer to a designee.

Break the glass for financial access

Systems, methods, and computer-readable storage media utilized for determining access to a financial account held by a customer of a financial institution. One method includes establishing a communication session with a sensor device, wherein the financial institution computing system continuously receives sensor data over the communication session and receiving, from a point-of-sale (POS) terminal, a payment request. The method further includes retrieving, from the user device via an application programming interface (API), device data including at least application data and receiving, from the sensor device, the sensor data including at least one of geolocation data or biometric data of the sensor device. The method further includes determining the customer experienced an adverse event based on the sensor data and the device data and determining automatically an access level. The method further includes authorizing, by the processor, the payment request utilizing the financial account held by the customer to a designee.

SYSTEM AND METHOD FOR MAKING A CONTENT ITEM, RESIDENT OR ACCESSIBLE ON ONE RESOURCE, AVAILABLE THROUGH ANOTHER
20180007411 · 2018-01-04 ·

Systems and methods are provided to make content items, already available on one resource, also available through another, such as through a new location or resource. The content items may be, e.g., videos uploaded by a user or other content. The systems and methods employ a streamlined interface for convenience to the user. In one example, a user of a computer system views a video segment through a first website and re-posts the video segment to a second website by entering a single command or clicking a single button. The websites coordinate the re-posting using credentials previously or contemporaneously entered by the user. Moreover, a content item may be automatically prepared for re-posting on the target website using previously-entered user selections. Playback software from a source website may be posted to a target website to allow access of the content item at the source website.

DETECTING ATTACKS USING COMPROMISED CREDENTIALS VIA INTERNAL NETWORK MONITORING

The threat of malicious parties exposing users' credentials from one system and applying the exposed credentials to a different system to gain unauthorized access is addressed in the present disclosure by systems and methods to preemptively and reactively mitigate the risk of users reusing passwords between systems. A security device passively monitors traffic comprising authorization requests within a network to reactively identify an ongoing attack based on its use of exposed credentials in the authorization request and identifies accounts that are vulnerable to attacks using exposed credentials by actively attempting to log into those accounts with exposed passwords from other networks. The systems and methods reduce the number of false positives associated with attack identification and strengthens the network against potential attacks, thus improving the network's security and reducing the amount of resources needed to securely manage the network.

BOOTING USER DEVICES TO CUSTOM OPERATING SYSTEM (OS) IMAGES
20180012022 · 2018-01-11 ·

Example implementations relate to custom operating system (OS) images. For example, booting a user device to a custom OS image includes presenting a user interface (UI) for creating a custom OS image for portable use, storing the custom OS image on a database for information technology (IT) management purposes, sending, based on a request, the custom OS image from the database to an secure external device, and authenticating, based on a policy, the custom OS image on the secure external device for use on a user device without an OS image or a hard drive disk (HDD).

BOOTING USER DEVICES TO CUSTOM OPERATING SYSTEM (OS) IMAGES
20180012022 · 2018-01-11 ·

Example implementations relate to custom operating system (OS) images. For example, booting a user device to a custom OS image includes presenting a user interface (UI) for creating a custom OS image for portable use, storing the custom OS image on a database for information technology (IT) management purposes, sending, based on a request, the custom OS image from the database to an secure external device, and authenticating, based on a policy, the custom OS image on the secure external device for use on a user device without an OS image or a hard drive disk (HDD).

Consumable chip and communication method for consumable chip

Provided is a consumable chip and a communication method thereof. The method is adopted for a consumable chip including a first consumable MCU unit, a verification cryptographic operation unit and a second consumable MCU unit; the method includes: when the first consumable MCU unit is incompatible with the printer, the first consumable MCU unit activating the second consumable MCU unit to execute a second consumable chip core processing flow, and calling the verification cryptographic algorithm function program of the verification cryptographic operation unit to calculate a new verification password; after the first consumable MCU unit inquires that the second consumable MCU unit has completed the second consumable chip core processing flow, the first consumable MCU unit reading the new verification password and sending to the printer, the new verification password is received by the printer to achieve compatibility between the first consumable MCU unit and the printer.

Consumable chip and communication method for consumable chip

Provided is a consumable chip and a communication method thereof. The method is adopted for a consumable chip including a first consumable MCU unit, a verification cryptographic operation unit and a second consumable MCU unit; the method includes: when the first consumable MCU unit is incompatible with the printer, the first consumable MCU unit activating the second consumable MCU unit to execute a second consumable chip core processing flow, and calling the verification cryptographic algorithm function program of the verification cryptographic operation unit to calculate a new verification password; after the first consumable MCU unit inquires that the second consumable MCU unit has completed the second consumable chip core processing flow, the first consumable MCU unit reading the new verification password and sending to the printer, the new verification password is received by the printer to achieve compatibility between the first consumable MCU unit and the printer.

Methods and systems for secure cross-platform token exchange

Systems and methods are disclosed for cross-platform token exchange. One method comprises receiving a primary token exchange request from an upstream entity, generating an ancillary detokenization request based on the primary token exchange request, and transmitting the ancillary detokenization request to an input token vault. An ancillary detokenization response comprising sensitive data may then be received from the input token vault, and one or more ancillary tokenization requests may be generated based on the ancillary detokenization response and the primary token exchange request. The one or more ancillary tokenization requests may be transmitted to one or more output token vaults. Subsequently, one or more ancillary tokenization responses may be received from the one or more output token vaults, each ancillary tokenization response comprising an output token. A primary token exchange response may be generated based on the one or more ancillary tokenization responses and transmitted to the upstream entity.

SYSTEMS AND METHOD FOR PAYMENT TRANSACTION PROCESSING WITH PAYMENT APPLICATION DRIVER
20180012213 · 2018-01-11 · ·

A pre-certified payment application driver code configured to satisfy requirements of a particular level of a credit card data security certification compliance may be integrated with first and second POS applications to generate first and second integrated applications, respectively, as a fully integrated, tested and production-ready solution. Each integrated application meets all levels of data security compliance requirements and enables data security-compliant transactions with end-to-end encryptions by enabling, in response to a POS application initiating a payment transaction, a payment terminal to share an encryption key with a payment server. Each integrated application can receive payment data encrypted with the encryption key, transmit the encrypted payment data to the payment server for processing the payment transaction using the encrypted payment data, and receive a processing result of the payment transaction from the payment server and communicate the processing result to the POS application.