Patent classifications
G06Q20/382
Real-time payment system, method, apparatus, and computer program
Tracking account positions in a real-time payments system is provided. Each of a plurality of participants is linked to a funding agent account via an ACH network, thereby creating a plurality of linked participants. Each of the plurality of linked participants is provided access to a current prefunded position of the funding agent through the ACH network. An unsettled financial position of each of the plurality of participants is compared to the current prefunded position of the funding agent. A determination is made whether to perform a financial settlement for a corresponding one of the plurality of participants based on the comparison. The financial settlement for the corresponding participant is performed when it is determined that the unsettled financial position of the corresponding participant is not greater than the current prefunded position of the funding agent.
Visual image authentication
Methods and systems described herein authenticate a user and help secure transaction. A display screen presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a user selects a sequence of visual images as a means of authenticating the user and logging into a financial account or other corporate account. In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize, and select. In an embodiment, a user presses his or her finger or fingers on a display screen to select images as a method for authenticating and protecting communication from malware. In an embodiment, non-determinism in hardware helps unpredictably vary the image selected, the image location, generate noise in the image, or change the shape or texture of the image. In some embodiments, visual image authentication helps Alice and Bob detect if Eve has launched a man-in-the-middle attack on their key exchange.
Authenticating Based on Behavioral Transactional Patterns
Aspects described herein may allow for authenticating a user by generating a customized set of authentication questions based on patterns that are automatically detected and extracted from user data. The user data may include transaction data collected over a period of time. By automatically detecting user patterns that correspond to user behavior over a period of time, an authentication system may be able to generate information that is recognizable to an authentic user but difficult to guess or circumvent for any other user.
DYNAMIC VALUE APPENDED TO COOKIE DATA FOR FRAUD DETECTION AND STEP-UP AUTHENTICATION
There are provided systems and methods for a dynamic value appended to cookie data for fraud detection and step-up authentication. A service provider, such as an electronic transaction processor for digital transactions, may utilize computer cookies for authentication and/or login for a user account. In order to further secure cookies from being compromised and used by malicious parties for fraudulent account access, the service provider may add or append a dynamic value that changes at each subsequent login to the computer cookie. The dynamic value may be used so that if a computer cookie is misappropriated, only one device may use the cookie once without the cookie updating and invalidating the cookie with another device or application on the device. Thereafter, when a login is requested, the dynamic value is matched to an expected value by the service provider when determining whether to authenticate the device.
Method for the encryption of payment means data, corresponding payment means, server and programs
A method for encrypting a piece of payment means data is disclosed. This method is implemented by a payment means having a data processor. Such a method has at least one iteration of the following steps: obtaining a current piece of payment means data from a memory of the payment means; generating a following piece of payment means data as a function of the current piece of payment means data and as a function of an encryption key of the payment means; replacing the current piece of payment means data by the following piece of payment means data within the memory of the payment means.
Protocol flow for proposing a transaction
A method and system are provided to support a decentralized distributed ledger in which transactions are recorded by parties to the transactions without the use of a blockchain. A distributed ledger system provides a protocol framework that supports the development of protocol flows. A protocol flow is computer code that controls the performance of a transaction by the party or parties to the transaction. Protocol flows can be developed for different types of transactions. The distributed ledger system allows transactions to be proposed, accepted, and notarized by a notary and stored without the use of a blockchain ledger. The distributed ledger system can avoid the expense of the computational and storage resources needed to redundantly verify a transaction and store evidence on the many nodes of a blockchain distributed ledger.
Threat information sharing based on blockchain
Systems and methods provide a platform for threat information sharing. A method comprises transmitting an access permission request to a blockchain network. The request asks for access to cyber threat information stored in at least one cyber threat information storage system. The information may come from a plurality of organizations. The blockchain network may include a blockchain ledger storing access control information from the plurality of organizations. Upon receipt of a reference to an access permission token generated by the blockchain network using at least one smart contract, a transaction request to the cyber threat information server may be sent. In response to the transaction request including the reference to the access permission token, the requested cyber threat information may be retrieved from the cyber threat information server.
Systems and methods for tracking stored accounts
A computer-implemented method includes receiving an indicator that a consumer stored account details associated with an account with a resource provider computer of a resource provider in an add-account event. The transaction details associated with the add-account event are displayed to the consumer at a display interface of a computer device if the consumer is enrolled in an account-on-file tracking system configured to track add-account events for the account. The method may further include providing the consumer with one or more transaction control selections at the display interface that allow the consumer to place transaction controls on the account stored with the resource provider computer.
Digital account controls portal and protocols for federated and non-federated systems and devices
Systems, methods, and apparatuses for a secure digital controls portal enabling enhanced control over account functionalities and usage of secure information provided to third party systems and devices maintained by various federated and non-federated provider computing systems of various product and service providers. The secure digital controls portal can interface with various provider computing systems via custom APIs protocols. The API protocols may utilize APIs that are particular to the software and hardware operated by the various provider computing systems. The secure digital controls portal can also standardize information from the various provider computing systems. The secure digital controls portal can be a central portal accessible via a client application running on a user device that enhances one-stop switch control and security of a user's digital footprint.
Methods and systems for acoustic authentication
Systems and methods are disclosed for generating an acoustic authentication data entry interface. One method comprises generating a random sequence of characters and a visual user interface element comprising a plurality sections, each section of the visual user interface element being associated with a respective character of the generated random sequence of characters. A section of the visual user interface elements is displayed to a user. Concurrently, an audio recording of a character associated with the displayed section is played to the user. Based on determining user selection of the displayed section, the character associated with the displayed section is logged as part of an authentication data. When all of the characters constituting the authentication data are logged, an electronic transaction authorization request is sent to an acquirer processor.