G06Q20/3821

Techniques for repeat authentication

The invention provides an authentication technique that involves provision of a new authentication credential for each authentication attempt. The requestor of the new authentication credential is required to provide a previous authentication credential in order to successfully receive the new authentication credential. The previous authentication credential has however been de-authorised so it cannot be used to authenticate the requestor, only to successfully obtain a new authentication credential. The requestor then authenticates using the new authentication credential. The cycle is repeated for as many repeat authentication attempts as are made by the requestor.

Electronic system and computerized method for verification of transacting parties to process transactions

The present disclosure generally relates to electronic systems and computerized methods for verification of transacting parties to process transactions. A payment network server receives details of a transaction fulfilled by an agent and generates a transaction identification plaintext. A first party keyset for the first transacting party and an agent keyset for the agent is identified. The server generates cryptograms and ciphertexts encrypted by the first party keyset and agent keyset and sends the cryptograms to the first transacting party and agent. An encrypted cryptogram contains an encrypted ciphertext which contains a plaintext representing the transaction identification plaintext. The ciphertexts are exchanged between the first transacting party and agent by a computer handshake for decryption. The plaintexts are extracted from the ciphertexts and compared against the transaction identification plaintext for verifying the first transacting party and agent.

Apparatus and method for improved payment experience
11568379 · 2023-01-31 · ·

A method for handoff of a transaction for completion includes: registering a payment instrument with a server and storing a payment token that represents the payment instrument; storing a device identifier that corresponds to the payment token in the database record; via a point-of-sale terminal, reading the payment instrument, and transmitting it to the server; via the server, using the payment token to access the device identifier and transmitting a push notification to a device corresponding to the device identifier; upon acceptance of the push notification, executing an application on the device and simultaneously displaying details for the transaction on both the device and the point-of-sale terminal; receiving transaction completion data that is entered via the device and transmitting the transaction completion data to the server; and completing the transaction at the server and notifying the point-of-sale terminal and the device that the transaction is complete.

Mobile device based identity verification

Apparatuses, systems, methods, and computer program products are presented for mobile device based identity verification. An apparatus includes a data module configured to receive sensor data from a hardware device associated with a user. An apparatus includes a transaction module configured to receive transaction data associated with a transaction. An apparatus includes a verification module configured to verify an identity of a user making a transaction based on received sensor data. A transaction may be allowed in response to verifying a user's identity.

METHOD AND SYSTEM OF BILLING FOR CHARGING A VEHICLE BATTERY LEVERAGING A PRE-ARRANGED PAYMENT METHOD
20230230074 · 2023-07-20 ·

A method and system provided for a single-action with which the customer places an order and receives goods by the single action of connecting an electrical vehicle (EV) to a charging station according to the business terms associated with this invention, the affiliated organizations that purchase or support the operation of the invention participate in a business “franchise” operation whereby all affiliated organizations increase their revenues as the volume of EV charging events increases.

System and method for dual email and web based checkout in an unsegmented list
11562350 · 2023-01-24 · ·

A system and method for leveraging email to complete a checkout for registered and unregistered customers of the e-commerce system are disclosed. The system and method include receiving, by an email payment gateway, an email message comprising a customer email address and a token. The token includes transaction information for a transaction from a third party vendor. The system and method further include determining a registration status of a customer based on the customer email address, wherein the registration status is one of a registered customer of the e-commerce system or an unregistered customer of the e-commerce system. The system and method further include decoding the token and sending an email message to the customer email address based on the registration status and the decoded token.

TOKENIZED CONTROL OF PERSONAL DATA
20230230067 · 2023-07-20 ·

A device and method for managing personal data. A request for an identifier (ID) token corresponding to a user is received from a virtual wallet. The ID token is generated and transmitted to the virtual wallet, where the ID token is then presented to a third-party entity by a device of the user. A request for the personal data corresponding to the ID token is received from the third-party entity. A trustworthiness score is determined that corresponds to the third-party entity based at least in part on an analysis of entity data corresponding to the third-party entity. The trustworthiness score and received request are transmitted to the virtual wallet and passed on to the user device. An indication of acceptance of the request and encrypted personal data associated with the generated ID token are received from the virtual wallet and transmitted to the third-party entity for processing.

Systems and methods for authentication using radio frequency tags

Systems and methods for authentication using radio frequency tags are disclosed. In one embodiment, a method for approving a requested operation from a secondary user of a resource that is controlled by a primary user may include (1) a back end comprising at least one computer processor receiving, from a mobile application that is executed by a mobile device associated with a secondary user, a requested operation involving a resource that is controlled by a primary user; (2) the back end receiving a unique identifier from the secondary user mobile application, the unique identifier being read by the mobile application from a tag associated with the secondary user; (3) the back end determining that the received unique identifier matches a stored unique identifier that is associated with the secondary user; and (4) the back end approving the requested operation and communicating the approval to the secondary user mobile application.

Interoperable mobile-initiated transactions with dynamic authentication
11562351 · 2023-01-24 · ·

A transaction is pre-staged by providing transaction preferences, such as a financial instrument, a transaction type, and a transaction amount, to a user device. The user device captures a visual code at a terminal, such as an ATM. The visual code includes terminal attributes, including a signed hash and call-back URI. The user device authenticates the visual code using the signed hash and requests the transaction through the issuer server. The issuer server creates and sends the card data to the call-back URI. The terminal uses the card data to create a transaction request it routes to through its acquirer server.

Method and system for augmented feature purchase
11704652 · 2023-07-18 · ·

A computer-implemented augmented reality-based method provides a user device access to data content by processing of camera image captured by the user device to identify a candidate visual area, which are then processed to identify visual features indicative of available data content. The identified features are compared to visual features of database objects indicative of available data content, and a determination made regarding the object that corresponds to the identified features. Instructions are then generated to augment a display of the camera image with selectable image features. In response to a selection of one of the selectable image features, a determination is made regarding whether the user device has permission to access the data content associated with the selected image feature. If not, a payment settlement arrangement is implemented for the user device to gain access permission to the data content.