G06Q20/382

Systems and methods for designing, designating, performing, and completing automated workflows between multiple independent entities

A computer-based method is provided for managing a transaction including provision of a process intelligence engine comprising a workflow aligner and process tool box, receiving deal parameters at the process intelligence engine, defining transaction subjects, each requiring the participation of at least one network partner, where each transaction subject is a requirement for achieving the objective of the transaction, defining, for each transaction subject, a plurality of subject goals to be addressed by a network partner, and defining, for each subject goal at least one action item required for satisfying the subject goal. The subject goals are then sequenced by the workflow aligner by defining prerequisites for at least one subject goal and transaction modules are defined based on the sequencing. During execution of a deal using the method, subject goals are not made available until prerequisite subject goals have been completed.

SYSTEMS AND METHODS FOR PREVENTION OF UNAUTHORIZED ACCESS TO RESOURCES OF AN INFORMATION SYSTEM
20180005232 · 2018-01-04 ·

An information security system prevents unauthorized access to resources of an information system. The information security system includes a fingerprint scanner that provides fingerprint data, a radio transceiver that stores encrypted data including fingerprint data from authorized users in a first portion and second data in a second portion, and a hub device that receives the encrypted data and the fingerprint data associated with the scanned fingerprint of a user, decrypts the first portion of the encrypted data to provide decrypted fingerprint data, compares the decrypted fingerprint data with the fingerprint data associated with the scanned fingerprint of the user, identifies the user as an authorized user when the decrypted fingerprint data matches the fingerprint data associated with the scanned fingerprint of the user, and provides the second data to the third party device via the second data interface when the user is identified as the authorized user.

Network token system

Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for providing, along with a token, a token assurance level and data used to generate the token assurance level. At the time a token is issued, one or more Identification and Verification (ID&V) methods may be performed to ensure that the token is replacing a PAN that was legitimately used by a token requestor. A token assurance level may be assigned to a given token in light of the type of ID&V that is performed and the entity performing the ID&V. Different ID&Vs may result in different token assurance levels. An issuer may wish to know the level of assurance and the data used in generating the level of assurance associated with a token prior to authorizing a payment transaction that uses the token.

Committing data to blockchain based on approximate hash verification

An example operation may include one or more of receiving a data block for storage on a blockchain from an orderer node, the data block comprising a full-step hash of a storage request and a reduced-step hash of the storage request, performing an approximate hash verification on the data block based on the reduced-step hash of the storage request included in the data block, and in response to a success of the approximate hash verification, committing the data block among a hash-linked chain of data blocks stored within a distributed ledger of a blockchain.

SYSTEM AND METHOD OF GIFT CARD REDEMPTION
20180012206 · 2018-01-11 ·

Systems and methods for online redemption of gift cards purchased through a secondary market comprises modifying a third-party application operating on a computing device to establish bi-directional communication between the third-party application and a gift card redemption application that operates on the computing device. Inject a code to the third party application to modify the visual presentation of the checkout page within the third party application to obscure gift card details when entered into the third party application to complete the transaction. Identify navigation to a checkout page within the third party application, and identify transaction completion within the third party application. Initiate recording of a transaction at the checkout page. Request payment through the gift card redemption application, access encrypted gift card details with the gift card redemption application. Monitor the third party application for completion of the transaction. Complete recording and store a record of the transaction.

Secure remote payment transaction processing including consumer authentication

Embodiments of the invention are directed to methods, apparatuses, computer-readable media, and systems for securely processing remote transactions. One embodiment is directed to a method of processing a remote transaction initiated by a communication device. The method comprising a server computer receiving a payment request including encrypted payment information that is encrypted using a first key. The encrypted payment information including security information. The method further comprises decrypting the encrypted payment information using a second key, obtaining an authentication response value for the remote transaction from an authentication computer associated with an issuer, updating the decrypted payment information to include the authentication response value, re-encrypting the decrypted payment information using a third key, and sending a payment response including the re-encrypted payment information to a transaction processor. The transaction processor decrypting the re-encrypted payment information using a fourth key and initiating a payment transaction using the decrypted payment information.

SYSTEMS AND METHODS FOR PAYMENT PROCESSING ON PLATFORMS

Systems and methods for payment processing on devices are provided. Such systems and methods enable payment processing to be completed with a peripheral device (such as a magnetic card reader) and a point of sales system, without the need for extensive developer integration. The system receives a payment charge amount from a point of sales system. The system also detects (or dynamically populates) peripheral devices that are used to capture account information. The peripheral device is a supported device type with an associated library, which includes data for properly interfacing with the peripheral device. The system provides the captured account data, a merchant ID and the amount of the charge to a payment management system. The system likewise receives a response (approve or decline) from the payment management system.

CONSUMER AUTHENTICATION SYSTEM AND METHOD
20230004957 · 2023-01-05 · ·

A method for authenticating a consumer. The method includes receiving an authorization request message associated with a consumer conducting a transaction with a portable consumer device. A challenge message is sent to the consumer, where the challenge message is dynamic or semi-dynamic. A challenge response message is received from the consumer, and an authorization response message is sent to the consumer. The authorization response message indicates whether or not the transaction is authorized.

CARD MANAGEMENT METHOD, USER TERMINAL, SERVER, CARD MANAGEMENT SYSTEM AND STORAGE MEDIUM

A card management method, a user terminal, a server, a card management system and a storage medium are provided. The method includes: sending a card binding message to a server, wherein the card binding message includes card authentication information of a card to be bound; receiving a card type of the card to be bound and dedicated card information for the card to be bound sent by the server, wherein the dedicated card information includes a card transaction identifier; loading the dedicated card information for the card to be bound onto a security element, wherein the dedicated card information for the card to be bound together with matching universal personalization data are useable to perform transaction verification of the card to be bound, and the matching universal personalization data is first-type universal personalization data or second-type universal personalization data that matches the card type of the card to be bound.

Variable-Step Authentication for Communications in Controlled Environment
20230006989 · 2023-01-05 ·

A variable-step authentication system and a method for operating for performing variable-step authentication for communications in a controlled environment is disclosed. The variable-step authentication system may include a communication device and a server. The variable-step method includes steps for determining an authentication process that involves a number of authentication steps. The number of authentication steps is variable and dependent on a trust level associated with each participant in the communication.