Patent classifications
G06F21/313
METHODS AND SYSTEMS FOR ACOUSTIC AUTHENTICATION
Systems and methods are disclosed for generating an acoustic authentication data entry interface. One method comprises generating a random sequence of characters and a visual user interface element comprising a plurality sections, each section of the visual user interface element being associated with a respective character of the generated random sequence of characters. A section of the visual user interface elements is displayed to a user. Concurrently, an audio recording of a character associated with the displayed section is played to the user. Based on determining user selection of the displayed section, the character associated with the displayed section is logged as part of an authentication data. When all of the characters constituting the authentication data are logged, an electronic transaction authorization request is sent to an acquirer processor.
Systems and methods for authentication and fraud detection
Systems and methods are provided to stop both external and internal fraud, ensure correct actions are being followed, and information is available to fraud teams for investigation. The system includes components that can address: 1) behavioral analytics (ANI reputation, IVR behavior, account activity)—this gives a risk assessment event before a call gets to an agent; 2) fraud detection—the ability to identify, in real time, if a caller is part of a fraudster cohort' and alert the agent and escalate to the fraud team; 3) identity authentication—the ability to identify through natural language if the caller is who they say they are; and 4) two factor authentication—the ability to send a text message to the caller and automatically process the response and create a case in the event of suspected fraud.
Systems for Securing Transactions Based on Merchant Trust Score
Systems for securing transactions based on merchant trust score are disclosed. The system may receive information identifying a merchant from a user device and, in response, retrieve transaction data associated with the merchant and receive website data in response to receiving information identifying the merchant. The system may use a machine learning model to generate a merchant trust score for the merchant, and determine whether the merchant trust score is less than a predetermined threshold. The system may also generate or retrieve an alternative payment method and provide related information or a recommendation to the user device.
Authentication system and method for operating an authentication system
An authentication system for authenticating a human requester requesting a service, wherein the authentication system is configured to establish via a first and a second port of the authentication system an authentication communication channel comprising a first communication channel to the requester and a second communication channel to a human authenticator, such that at least one of an audio stream of a voice of the requester, a video stream of a face of the requester and a 3D-data stream of the face of the requester is transmittable between the end node device of the requester and the end node device of the authenticator; and to record a confirmation message of the authenticator, wherein the confirmation message confirms or rejects at least one of the claimed identity and the requested service.
Communication Channel Enhancement
A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests and/or customer service agent control over a customer's access device. Some embodiments include logic configured to manage and enhance communication channels between devices.
SYSTEM AND METHOD OF LOGGING INTO A WEB SERVER
A system and method of logging into an information system without the use of a password. The information system first registers with a verification server. A user may then register with the verification server and create a unique identifier. When the user attempts to sign into the information system, the user may submit their unique identifier to the information system using a computer. The information system then transmits the unique identifier to the verification server to authenticate the user. The verification server then transmits a confirmation request to the user to verify the user requested the login. The user may then send an affirmative message to the verification server which in turn notifies the information system. The information system then logs the user in without the use of a password.
User identity authenticating method and device for preventing malicious harassment
A user identity authenticating method and device for preventing malicious harassment are described. The method includes: after a user logs in an internet website, unique first authentication code information is generated and stored; the first authentication code information and a Short Message (SMS) Uplink (UL) service number used for identifying the internet website uniquely are displayed on a website page; after the user sends an SMS including second authentication code information input by the user to the corresponding SMS UL service number, an acquired second authentication code is matched with a stored first authentication code, if the matching succeeds, then the authentication succeeds. The embodiments in the disclosure can avoid possible malicious harassment effectively, thus avoiding legal risks which a website service provider may confront to some extent, and improving the satisfaction of its service. In addition, the increase of processing load and performance influence of the website service provider's server, which are caused by triggering the sending of a large number of authentication codes maliciously, can be avoided in the disclosure.
Systems for Securing Transactions Based on Merchant Trust Score
Systems for securing transactions based on merchant trust score are disclosed. The system may receive information identifying a merchant from a user device and, in response, retrieve transaction data associated with the merchant and receive website data in response to receiving information identifying the merchant. The system may use a machine learning model to generate a merchant trust score for the merchant, and determine whether the merchant trust score is less than a predetermined threshold. The system may also generate or retrieve an alternative payment method and provide related information or a recommendation to the user device.
SYSTEM FOR IMPROVING DATA SECURITY WHEN REDEEMING DATA
When personally identifiable information (PII) is to be stored or updated, a system first seeks consent from the user for the PII store or update. If the user grants consent, then the system stores the PII in the user's personal device or updates the PII stored in the user's personal device. The system then retrieves that PII and generates a token representing that PII. Even if the token were taken by a malicious user, it would not be possible for the malicious user to determine the user's actual PIT from the token. In this manner, the security of the PII is improved over conventional systems.
Systems and methods for initiating an authenticated session
A server comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to send, via the communications module and to a remote computing device, a signal causing the remote computing device to display a unique code and a telephone number; monitor at least one instant messaging account associated with the telephone number for the unique code; after determining that the unique code has been received at the at least one instant messaging account associated with the displayed telephone number, determine that authentication for a particular account has been successful; and in response to determining that authentication for the particular account has been successful, initiate an authenticated session.