Patent classifications
G06Q20/382
AUTHENTICATION CARD DEGRADATION SECURITY
A first access attempt to perform a secure transaction is received, from a first user. The secure transaction is related to an authentication card that has a physical exterior. An authentication card profile related to the authentication card of the first user is retrieved based on the first access attempt. The authentication card profile describes a set of one or more degradation characteristics, each degradation characteristic of the set of degradation characteristics describes a degradation of the physical exterior of the authentication card. A validation status of the authentication card is determined. The determination is based on the first access attempt and on the set of degradation characteristics. A security response related to the first access attempt is performed in response to the validation status.
Email address token integration
A system and method to facilitate transactions between a customer and a vendor is disclosed. The system and method include receiving a response email, wherein the response email includes a short lookup token associated with the transaction between a customer and a vendor; determining the long token associated with the short lookup token; decoding the long token; performing a validation of the decoded long token; and processing the transaction, on a condition that validation is approved. A system and method may also include receiving an email, the email includes a short lookup token integrated into the string of characters that compose the email address and is associated with the transaction between a customer and a vendor; determining a long token associated with the short lookup token; decoding the long token; performing a validation of the decoded long token; and processing the transaction, on a condition that validation is approved.
Systems and methods for substitute low-value tokens in secure network transactions
Methods and systems are disclosed for enabling the creation of substitute low-value token creation, comprising providing software content to a content delivery network wherein, when transmitted to a user browser, the software content is configured to enable the user browser to create a substitute low-value token if a token service is unavailable, wherein the content delivery network is configured to provide the software content to at least one user browser, and receiving the substitute low-value token from a merchant system, the substitute low-value token having been generated by the user browser in response to the user browser being unable to obtain a low-value token from the token service.
Scalable systems and methods to transfer control of virtual objects of a virtual world implemented on multiple hosts
In a virtual environment implemented using multiple hosts, a first host maintains records identifying virtual objects and entities which control the virtual objects. When a second host receives a request of a first entity acquiring the control of a virtual object from a second entity, the second host instructs the first host to: update a first record to remove the virtual object from a view simulation of the virtual world servicing the second entity; and adding a second record associating the first entity with the virtual object but having an indicator that prevents the rendering of the virtual object for the first entity. At the time for the completion of the control transfer to the first entity, the second host instructs the first host to update the second record to remove the indicator and thus allow the virtual object to be rendered in the view simulation servicing the first entity.
Method for processing transaction data, corresponding communications terminal, card reader and program
A method for processing transaction data, implemented by a communications terminal having a touch screen. The method includes: detecting a necessity of entering a piece of personal identification data; transmitting to a card reader connected to the communications terminal a request for supporting a display of a virtual keypad, the request comprising a piece of data representing a passage of the communications terminal from a “master” mode to a “slave” mode of operation, the slave mode leading to implementation of the method for processing transaction data under the exclusive control of the card reader; of entry, by the user on the virtual keypad, of the piece of personal identification data; and receiving, from the card reader, the piece of personal identification data.
System and method for rendering virtual currency related services
Technique introduced here relates to virtual currency related services, and more specifically, to tools for providing crypto or other digital currency (e.g. bitcoin) related services, including bitcoin DNS service, sending bitcoins over social media communication networks, a bitcoin trading platform and secure storage services for bitcoin.
Injecting exchange items into an exchange item marketplace network
A method begins by monitoring exchange item transactions occurring in an exchange item marketplace network. The method continues with generating trend information based on the monitored exchange item transactions and determining attributes for a targeted marketing program based on the trend information. The method continues with identifying a subset of buyer computing devices based on the attributes. The method continues by generating offer information based on the targeted marketing program and sending the offer information to the subset of buyer computing devices. When receiving a purchase request from a buyer computing device, the method continues by generating an exchange item request regarding an exchange item and sending the exchange item request to a branded server associated with the exchange item. The method includes receiving offer exchange item information from the branded server and sending at least a portion of the offer exchange item information to the buyer computing device.
Securing an exchange item associated with fraud
A method for execution by a marketplace server includes detecting fraudulent acquisition of an exchange item by a first computing device, where the exchange item has a static identifier (ID) and a dynamic ID that is generated based on exchange item security parameters associated with the exchange item. The method further includes deactivating the dynamic ID and the exchange item security parameters in response to the detecting fraudulent acquisition, where the static ID of the exchange item remains active and valid. The method further includes generating second exchange item security parameters for the exchange item. The method further includes generating a second dynamic ID based on the second exchange item security parameters, where the second dynamic ID establishes the exchange item for utilization in an exchange item marketplace network. The method further includes updating a record in a marketplace database to include the second dynamic ID.
Network Data Analytics in a communications network
A network data analytics function, which may be implemented as a service, is disclosed which provides a new and improved network data analytics capability in 5G core networks.
System and method for interoperable mobile wallet
A computer system includes one or more processors and machine readable storage media coupled to the one or more processors having instructions stored therein that cause the computer system to: receive a request for a dynamic token on behalf of a payor; route the request to a first financial institution; receive a message from a second financial institution including a merchant identifier and the dynamic token having a code comprising account information of the payor; identify the first financial institution based on the code; route the dynamic token and the merchant identifier to the first financial institution; receive the account information of the payor; and route the account information of the payor to the second financial institution to process a payment from an account of the payor to an account of the merchant.