Patent classifications
G06Q20/388
Method and system for payment card verification via blockchain
A method for conveyance of payment credentials through a third party data source includes: storing, in a memory of a computing device, at least a first public key and payment credentials associated with a transaction account; generating, by a generation module of the computing device, a machine-readable code encoded with at least the first public key; displaying, by a display device interfaced with the computing device, the generated machine-readable code; generating, by the generation module of the computing device, a key pair comprised of at least a private key and a second public key; encrypting, by an encryption module of the computing device, the payment credentials using the private key; and electronically transmitting, by a transmitting device of the computing device, the encrypted payment credentials to a publicly accessible data source.
Systems and methods for securely verifying a subset of personally identifiable information
Disclosed are systems and methods for securely verifying a subset of personally identifiable information (PII) of a first user to a second user is disclosed. A computer-implemented method may include receiving a query request from the second user through a second user application to verify the subset of PII of the first user; prompting the first user, through a first user application, to authenticate the query request; in response to the first user authenticating the query request, processing the query request to identify, in a secured database, the subset of PII of the first user stored in the secured database, to generate an identified subset of PII; comparing the subset of PII to the identified subset of PII to determine if a condition is satisfied; based on the comparing, generating an answer to the query request; and transmitting the answer to the second user through the second user application.
AUTHENTICATION SYSTEM AND METHOD FOR SERVER-BASED PAYMENTS
A method of performing a payment transaction employing a two-factor authentication mechanism. In an embodiment, a user device operated by a user during a payment transaction engages in cryptographic processing with a cryptographic function having a secret key encoded therein. The cryptographic function is stored in a storage device of the user device, and the secret key serves as a first authentication factor. The method also includes the user device utilizing a second authentication factor, which was implemented using only software security techniques, in performing the payment transaction.
Secure call center communications
This disclosure describes techniques for authenticating a person that seeks to engage in a voice call session with a call center agent, an interactive voice response system, or other system. In one example, this disclosure describes a method that includes storing information associating an authorized device with an account; receiving, over a network and from a device operated by a user, authentication credentials for the user; determining, based on the authentication credentials, that the user is authorized to access the account; receiving, over the network and from the device operated by the user, a request to engage in a voice conversation; responsive to receiving the request, accessing the phone number associated with the authorized device; and initiating a voice call session by placing a call, over the network, to the phone number associated with the authorized device.
Automatic User Identification and Authentication System
A system strengthens the identification and authentication process by bringing in additional information about the user that was previously unused. The merchant in the system first provides a pre-authentication token generated using the information provided through the user's payment card. If a processing server and/or identification server validate that information, the pre-authentication token is communicated back to the merchant. The merchant then initiates a pre-authentication session and provides in that session information about the user in the merchant's possession (e.g., information gleaned from security camera footage like apparent age, height, gender, license plate number, hairstyle, etc.) The pre-authentication session is then communicated to the processing server and/or identification server to be used to further identify and authenticate the user.
Mobile payment system and method
A merchant website automatically detects whether a customer device has a registered payment application; if so, the website generates a custom protocol message that is triggered on checkout to initiate payment via the payment application. Details of the transaction are passed to the payment application via a payment server so that the user can authorize the transaction within the payment application.
SYSTEMS AND METHODS FOR PROVIDING ACH TRANSACTION NOTIFICATION AND FACILITATING ACH TRANSACTION DISPUTES
A system and method for identifying incoming ACH transactions involving subscriber accounts at a financial institution, comparing the ACH transaction details with preset notification criteria, suspending any ACH transaction that satisfy the preset criteria so that the transaction does not post to the account, notifying the subscriber of the incoming ACH transaction, providing the subscriber with the option to either authorize or dispute the ACH transaction, and facilitating the dispute process according to applicable banking rules by requesting further information from the subscriber and forwarding the dispute information to the ACH operator.
DEVICE AND METHOD FOR PROVIDING EXTERNAL ACCESS TO MULTI-DROP BUS PERIPHERAL DEVICES
An electronic device includes a slave interface configured for coupling to a machine controller of a machine via a multi-drop bus (MDB), a host interface configured for coupling to a first peripheral device of the machine, and memory storing one or more programs to be executed by the one or more processors and comprising instructions for: registering the electronic device as a slave to the machine controller, registering the first peripheral device as a slave to the electronic device, receiving from a mobile device a request to access signals generated by the first peripheral device, validating the request, and sending a reset command to the first peripheral device via the host interface, the reset command including a directive to update a signal destination address of the first peripheral device from a controller address of the machine controller to a device address of the electronic device.
BATCHED AND SECURE STAKE REWARDS CALCULATION
A method includes determining, by a stake account manager, to distribute rewards to one or more stake accounts of a stake pool, obtaining privately stored stake account information of the one or more stake accounts and a rewards balance of the stake pool, calculating a reward amount of the rewards balance owed to each stake account of the one or more stake accounts based on the privately stored stake account information, and performing a batched and secure calculation technique on the calculated reward amounts to produce a batched and secure rewards distribution summary. The batched and secure rewards distribution summary ensures that each reward amount is calculated correctly and that the privately stored stake account information remains private. The method further includes publishing the batched and secure rewards distribution summary to the blockchain. The publishing the batched and secure rewards distribution summary deposits reward amounts to the each stake account.
Method and system for a secure registration
Methods and apparatus for secure registration to enable transactions between a first user and a vendor that is facilitated by a payment server are disclosed. The method may comprise storing a form soliciting customer information including a plurality of fields, wherein at least one of the plurality of fields is associated with an attribute. The method including receiving a copy of the form including customer data in all of the plurality of fields and transmitting a first subset of the customer data based on the attribute associated with the first subset of the customer data. The method including receiving a token in response to the transmission of the first subset of customer data and transmitting the token and a second subset of the customer data, wherein the second subset is based on the attribute associated with the second subset of customer data.