Patent classifications
G06Q20/388
Blockchain compliance verification network
An example operation includes one or more of capturing message content from messages between a sender and receiver which comprise information about a transfer of value from the sender to the receiver, detecting information about a compliance check within the message content which indicates whether the transfer of value complies with jurisdictional regulations, and recording the message content including the detected information about the compliance check via a blockchain.
METHOD OF USING BIOINFORMATICS AND GEOGRAPHIC PROXIMITY TO AUTHENTICATE A USER AND TRANSACTION
Systems and methods for authenticating payment transactions using a payment card processing system are disclosed. A method for processing one or more payment transactions using a payment processing system in communication with a computer readable storage medium includes receiving a push or pull request from a first device associated with a first user, wherein the push or pull request relates to a transaction with a second device associated with a second user, receiving a first biometric measurement from the first device, and receiving a second biometric measurement from the second device. The method further includes, responsive to determining that the first biometric measurement identifies the first user, determining that the second biometric measurement identifies the second user, and determining that the first device and second device are within a predetermined relative proximity, effecting the transaction based on the push or pull request. A payment network can be configured to store or access a database including a plurality of biometric parameters that identify a plurality cardaccount holders and other transaction requirement parameters.
Method, device and system for securing payment data for transmission over open communication networks
A method for securing payment data for transmission over open communication networks is disclosed. The method comprises establishing a data connection between a first and a second transceiver device, the first transceiver device configured as a merchant device and the second transceiver device configured as a customer transceiver device. The merchant device transmits a first data package which comprises a unique merchant identifier and transaction request data, to the customer transceiver device over the data connection. The merchant device receives a cryptogram from the customer transceiver device. The cryptogram having been generated from using a secret key and a counter value together with the received unique merchant identifier and the transaction request data. The method comprises forming an authorisation request comprising the received cryptogram, merchant identifier and the transaction request data and submitting said authorisation request to at least one of an issuer and an acquirer to facilitate authorisation and processing of said transaction request data.
CLIENT, SERVER, METHOD AND IDENTITY VERIFICATION SYSTEM
A client, a server, a method and an identity verification system are provided. The client is configured to generate a verification code and includes: a transaction initiating unit configured to initiate, in response to a predetermined identity verification event regarding a user, a random transaction between a first account and a second account in a data platform system, so that the random transaction is recorded in the data platform system; a verification code generating unit configured to generate, based on at least information about the random transaction, a verification code for verifying an identity of the user; and a sending unit configured to send the generated verification code to a server, so that the server verifies the identity of the user according to a record of the random transaction and the verification code, the data platform system being a decentralized distributed database and records therein being unchangeable and undeletable.
Methods and systems for cryptographic keys exchange
Embodiments provide methods, and systems for cryptographic keys exchange where the method can include receiving, by a server system, a client public key being part of a client asymmetric key pair from a client device; sending, by the server system, a server public key being part of a server asymmetric key pair to the client device; generating, by the server system, a random value master key and sending the random value master key encrypted using the client public key to the client device; and generating, by the server system, an initial unique session key and sending the initial unique session key encrypted under the random value master key to the client device. A unique session key from the set of the unique session keys is used by the client device to encrypt a session data for transmission to the server system per session.
Method, apparatus, and system for providing a security check
Embodiments of the present application relate to a method, apparatus, and system for providing a security check. The method includes receiving a security verification request sent from a terminal, obtaining first verification element information based at least in part on the security verification request, generating a digital object unique identifier based at least in part on the first verification element information, sending the digital object unique identifier to the terminal, receiving second verification element information from the terminal, and in the event that the first verification element information and the second verification element information are consistent, sending security check pass information to the terminal.
INFORMATION PROCESSING METHOD AND TERMINAL, AND COMPUTER STORAGE MEDIUM
An information processing method includes generating identification information according to a preset manner, and displaying identification information on a multimedia interaction interface, identification information being capable of being scanned by clients so that the clients establish an association relationship with a first event presented on multimedia interaction interface; obtaining identifiers of the clients in association relationship with the first event based on results of clients' scanning of identification information, and establishing a first set of identifiers; when a condition is met, receiving requests from M clients, and identifying identifiers of M clients; screening, based on the first set of identifiers, the identifiers of M clients to obtain N client identifiers matched with any identifier in the first set of identifiers, wherein M and N are both positive integers, and M≧N; and outputting at least one client identifier of N client identifiers according to a preset rule.
AUTHORIZING RADIO REQUENCY TRANSACTIONS USING A VASCULAR SCAN
A method for registering biometric information for use in a transponder-reader system is disclosed. The method includes steps of detecting, verifying and storing a proffered biometric sample. During detecting, a sensor detects a proffered biometric to obtain a biometric sample. During the verifying step, the biometric sample is compared with other stored samples and/or other information. During the storing step, the biometric sample is stored on a database, for use by the transponder-reader system in authorizing transactions.
AUDIO-BASED EXIT DETECTION AND PAYMENT CONFIRMATION FOR COMPUTING DEVICES
Methods and systems for improved exit detection, payment confirmation, and payment authorization verification are provided. In one embodiment, a method is provided that includes transmitting an audio transmission that includes a unique identifier of a facility. The audio transmission may be transmitted to a computing device, which may transmit in response an audio transmission containing a unique identifier and a payment confirmation identifier. The payment confirmation identifier may be compared to a database of payment information and it may be determined that the payment confirmation identifier corresponds to a completed payment. It may further be determined that the user has completed a payment and is permitted to exit the facility.
SYSTEMS FOR LEVERAGING ADDITIONAL USER DATA IN RESOURCE TRANSFER EVENT MESSAGING FOR GENERATING CUSTOMIZED AND REFINED BROWSING EXPERIENCES
Additional user data in resource transfer event messaging is leveraged for generating customized and refined web browsing experiences. Resource transfer messages are configured to include, not only the user data required to affect the resource transfer, but other user data related to the resource transfer event, such as user preference data. The resource transfer event messages are communicated to a resource storage entity, which stores the other user data in resource transfer event repository. In response to a user authenticating with the resource storage entity and accessing a distributed communication network, such as the Internet or the like, the user records are accessed and the additional user data is used to customize the websites that the user navigates.