G06Q20/388

PROCESSING MESSAGES FOR ATTRIBUTE-VALUE PAIR EXTRACTION
20230214873 · 2023-07-06 ·

A device may process a message associated with an account to identify a first identifier that identifies a third party. The device may identify a match between the first identifier and transaction information related to an individual associated with the account. The transaction information may include a set of first identifiers that identify a respective set of third parties. The transaction information may facilitate identification of one or more messages that is likely to include account information. The device may tag the message with a second identifier based on the match. The device may receive, from another device, the message based on the message being tagged with the second identifier. The device may process the message to identify the account information related to another account. The device may extract identified account information from the message. The device may perform an action related to extracted account information or the message.

AUTHENTICATION WITH OFFLINE DEVICE
20230216844 · 2023-07-06 · ·

A first user device can transmit an interaction request to a remote computer via a long range communication channel. The first user device can receive an authentication request message from the remote computer and can then transmit the authentication request message to a second user device via a short range communication channel. The first user device can then receive an authentication response message comprising a response value from the second user device via the short range communication channel. The first user device can then transmit the authentication response message to the remote computer causing the remote computer to verify the response value and perform further processing if the response value is verified.

System and method for interoperable mobile wallet

A computer system includes one or more processors and machine readable storage media coupled to the one or more processors having instructions stored therein that cause the computer system to: receive a request for a dynamic token on behalf of a payor; route the request to a first financial institution; receive a message from a second financial institution including a merchant identifier and the dynamic token having a code comprising account information of the payor; identify the first financial institution based on the code; route the dynamic token and the merchant identifier to the first financial institution; receive the account information of the payor; and route the account information of the payor to the second financial institution to process a payment from an account of the payor to an account of the merchant.

Dynamic Question Presentation in Computer-Based Authentication Processes

Methods, systems, and apparatuses are described herein for improving computer authentication processes by dynamically adjusting questions presented during authentication. A request for access to an account may be received. A first authentication question may be generated based on a first transaction of a plurality of transactions associated with an account. Based on whether a response to the first authentication question is correct or not, a second or third transaction of the plurality of transactions may be selected, and a second authentication question might be generated based on the selected transaction. It may be determined whether to provide access to the account based on a response to the second authentication question.

Prioritizing Holds When Selecting Transactions for Transaction-Based Knowledge-Based Authentication

Aspects discussed herein may relate to techniques for authenticating a user using transaction-based authentication questions. Hold transactions conducted using a financial account may be identified and verified. The hold transactions may be transactions that do not post to the financial account, and therefore are not provided on any financial account statement. The transaction-based authentication questions may be generated based on the identified and verified hold transactions. The user may be authenticated based on responses by the user to the transaction-based authentication questions. Malicious actors that gain access to financial account statements are unlikely to answer the transaction-based authentication questions correctly as they are based on financial transaction data that is not provided on the financial account statements.

Detecting Separate Login During Action Based Knowledge-Based Authentication and Disqualifying Validity

Aspects described herein may relate to techniques for detecting login activity to a financial account during a knowledge-based authentication process. The login activity may be related to access to an online interface for the financial account. The detection of login activity during the authentication process my indicate that the integrity of the authentication process is compromised as login access may provide an individual with transaction data that may be used to answer transaction-based authentication questions. As a result of detecting login activity, an alternative authentication process may be initiated or an authentication request related to the financial account may be denied.

System and method for processing a card-not-present payment transaction by a purchaser using a friend's card for obtaining a reward

A server and method for processing a card-not-present transaction whereby a purchaser selects to use one or more friends' card to obtain a reward is disclosed. The server comprises at least a computer processor to: (i) receive, from a merchant server, a payment request including a contact mechanism for the friend(s); (ii) send a selection request to the friend(s) using the contact mechanism; (iii) receive, from the friend(s) a selection response including card number(s) eligible for the reward; (iv) request the issuer server(s) for authentication and blocking the amount; (v) track a cumulative amount dynamically and repeat steps (iii) and (iv) until equal to or greater than the payment amount; (vi) generate a virtual card number for one time use based on the card number(s); and (vii) send a payment response to the merchant server including the virtual card number for the purchaser to complete the transaction.

SYSTEMS AND METHODS FOR CONTACTLESS CARD COMMUNICATION AND KEY PAIR CRYPTOGRAPHIC AUTHENTICATION USING DISTRIBUTED STORAGE
20220405766 · 2022-12-22 ·

Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to receive an authentication request. The processor may be configured to transmit a notification. The processor may be configured to receive a response that is responsive to the notification, the response comprising a ciphertext and input data. The processor may be configured to generate a Fast Identity Online (FIDO) key pair including a FIDO public key and a FIDO private key. The processor may be configured to encrypt a challenge using the FIDO private key. The processor may be configured to transmit the FIDO public key to decrypt the challenge so as to complete the authentication request.

PEER-TO-PEER MONEY TRANSFERS
20220398592 · 2022-12-15 ·

Systems and methods for peer-to-peer money transfers are disclosed. The system may allow senders to transmit money transfers to receivers. The system may receive a money transfer request from the sender comprising the designated receiver, a money transfer amount, and a sender transaction account. The system may generate a receiver transaction account associated with the designated receiver, wherein the receiver transaction account comprises the money transfer amount. The system may provide the receiver access to the receiver transaction account using different channels, including by providing a digital transaction instrument or a physical transaction instrument.

Alternative service access
11526864 · 2022-12-13 · ·

Alternative service access with operations including determining that a system has met a plurality of criteria, including the system having a battery level below a threshold, identifying a merchant, generating an authentication token for authorizing a payment using a payment provider, and sending the authentication token to the payment provider.