Patent classifications
G06Q20/401
SYSTEMS AND METHODS FOR PREVENTION OF UNAUTHORIZED ACCESS TO RESOURCES OF AN INFORMATION SYSTEM
An information security system prevents unauthorized access to resources of an information system. The information security system includes a fingerprint scanner that provides fingerprint data, a radio transceiver that stores encrypted data including fingerprint data from authorized users in a first portion and second data in a second portion, and a hub device that receives the encrypted data and the fingerprint data associated with the scanned fingerprint of a user, decrypts the first portion of the encrypted data to provide decrypted fingerprint data, compares the decrypted fingerprint data with the fingerprint data associated with the scanned fingerprint of the user, identifies the user as an authorized user when the decrypted fingerprint data matches the fingerprint data associated with the scanned fingerprint of the user, and provides the second data to the third party device via the second data interface when the user is identified as the authorized user.
INTELLIGENT AUTHENTICATION
Systems and methods for intelligently authenticating payment transactions are disclosed. A user initiates a payment transaction to purchases goods or services from a merchant. The merchant sends a payment initiation request to a server computer in communication with a payment processing network and an issuer. The server computer queries various databases to determine one or more available communication channels that may be used as authentication channels by the issuer. The server computer also determines one or more communication channels, available for use by a mobile device of the user, that may be used as authentication channels to authenticate the payment transaction. The user is provided with a list of available/eligible authentication channels. User selects one of the authentication channels and the issuer is notified of the selection. The issuer uses the selected authentication channel to communicate with the user and authenticate the payment transaction.
METHOD FOR PROCESSING AN AUTHORIZATION TO IMPLEMENT A SERVICE, DEVICES AND CORRESPONDING COMPUTER PROGRAM
A method for processing, by a processing entity, of an authorization to implement a service and/or access an item. The method includes: reception, from a requesting device, of a request for implementing a service and/or accessing an item; searching for an indicator of dependency from at least one piece of data of said request for implementation; when an indicator of dependency is present, obtaining an authorization from a verification device to implement said service and/or access said item.
PROVISIONING ACCOUNT NUMBERS AND CRYPTOGRAPHIC TOKENS
Disclosed herein are systems and methods for real-time provisioning of new card numbers to users of a consumer computing system. A consumer computing system (“CCS”) may have servers and databases situated within a banking infrastructure in order to provide various features to users via a software application executed by a client device. The software application may interact with the CCS servers, such that the CCS servers and the software application offer the client device and the user certain features not ordinarily available in conventional banking infrastructures. These features may include the real-time provisioning of card numbers for a user's banking account. In operation, the client device may submit a request for a new card number to a CCS server, which may be generated in real-time and active in the payment stream when the card number is generated.
SYSTEM AND METHOD FOR PROCESSING AN ONLINE TRANSACTION REQUEST
A computer server includes a transaction processor that is configured to receive from a POS terminal an incoming authorization request that includes an original numeric value, a token cryptogram and an identification number identifying an identity token; confirm that the token cryptogram was generated from the original numeric value and a cryptographic key associated with the token; determine primary and secondary numeric values from the original numeric value and a user profile associated with the identification number; confirm that the secondary numeric value is not greater than the balance in a loyalty points account associated with the identification number; transmit to an authorization server a revised authorization request that includes the identification number and the primary numeric value; and receive from the authorization server a confirmation message confirming that the primary numeric value is not greater than the balance in a payment account associated with the identification number.
Systems and methods for automated validation for proprietary security implementations
Systems and methods are disclosed for automated validation for proprietary security implementations. One method includes: receiving, from each of a plurality of merchants, a list of security service providers used by the merchant; enabling connection with the each of the security service providers of the received list of security service providers used by the merchant; receiving, from each of the listed security service provider with connection enabled, security service information as it pertains to the merchant of the plurality of merchants; generating a security service profile for each merchant of the plurality of merchants, based on the received security service information from each security service provider of the received list of security service providers of the merchant; and outputting the security service profile of the merchant of the plurality of merchants to an electronic storage medium.
PKI-based user authentication for web services using blockchain
Methods, systems, storage media for authentication are described. On the methods includes receiving, at a smart contract on a distributed ledger, a signed authentication challenge. The method includes verifying the identity of the user who signed authentication challenge. The method includes raising an event that indicates that the user has been authenticated; wherein a server listens for events from the smart contract, and associates a session between the browser and the server with the user based on the event.
Method, apparatus, and computer-readable medium for secured multi-lateral data exchange over a computer network
A method and apparatus for secured, multi-lateral, assured data transfer over a computer network for the assured exchange of data between counterparties related to qualifying transactions, the method being accomplished by a distributed computing system including a distributed ledger platform and an off-chain data host platform. On-chain authorization tokens are used to track data access rights, enforce access policies, and control distribution of encryption keys.
WEARABLE ACCESSORY WITH LIGHTING EFFECT
A wearable accessory having an embedded processor in a substrate for creating a synchronously presented lighting effect at a controlled access venue and a method for creating a synchronously presented lighting effect at a controlled access venue while controlling access to the venue, simultaneously using a wearable accessory that coordinates with the performance allowing each audience member with a wearable accessory to synchronously perform with the performance.
DATA PROCESSING METHOD AND APPARATUS FOR VIRTUAL RESOURCE
Aspects of the disclosure provide a data processing apparatus having interface circuitry and processing circuitry. The interface circuitry is configured to obtain data related to at least two resource accounts, and related to resource transfer of the at least two resource account. The processing circuitry configured to construct resource transfer relationships of the at least two resource accounts according to the data, calculate, based on the resource transfer relationships, similarity measurements between the at least two resource accounts according to a preset calculation rule, and output, according to the calculated similarity measurements, a resource account with a similarity measurement satisfying a preset condition.