Patent classifications
G06Q20/3223
Split Secret Cryptography Based Security in IoT Implemented Payment Transactions or Credentials
The invention provides methods, systems and computer program products for securely provisioning an internet-of-things (IoT) device for implementing an electronic payment transaction. The invention comprises (i) retrieving a first credential element from the client device, and a second credential element from a router, (ii) generating payment credential data by applying split secret cryptography based reconstruction to the first credential element and the second credential element, (iii) retrieving a unique identifier associated with the IoT device, (iv) generating a combined data element comprising the payment credential data and the unique identifier associated with the loT device, (v) applying split secret cryptography based splitting to the combined data element to generate a first verifiable secure element and a second verifiable secure element, (vi) storing the first verifiable secure element and the retrieved unique identifier within the router, and (vii) storing the second verifiable secure element within the IoT device.
Processing a mobile payload
In one embodiment, a method includes receiving, by a payment server and from a messaging application executing on a first mobile device operated by a first user, a request to initiate a payment transaction using a payment application. The request includes a payment amount and an identifier associated with the first user. The method includes facilitating a first adjustment to a balance associated with the financial account of the first user in the data store identified based on the identifier. The method includes generating a link associated with the first adjustment and transmitting the link to the first mobile device. The method includes, upon receiving from a second user operating a messaging application, an indication that the second user has interacted with the link within the messaging application, facilitating a second adjustment of a balance of a financial account of the second user according to the payment amount.
SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT
Systems and methods for securely generating and printing documents are disclosed. For example, processor(s) of a computer system may receive information for the document from a computing device through a network, verify the information for the document, and upon verification, generate document generation data using at least a portion of the information for the document. The document generation data may include document metadata that enables generation of an image of the document and/or the image of the document. Upon the processor(s) verifying first authentication information of a first code associated with a printing device received from the computing device through the network and second authentication information of a second code associated with the computing device received from the printing device through the network, the processor(s) may transmit the document generation data to the printing device through the network, and cause the printing device to print the image of the document.
Methods and systems for collecting and releasing virtual objects between disparate augmented reality environments
Methods and systems are disclosed for collecting and releasing virtual objects between disparate augmented reality environments. One method comprises receiving user selection to collect an object in a first environment displayed on a user device at a first time. A search request may then be transmitted to a content server from which a virtual object corresponding to the collected object is received in response. The virtual object may be stored in a user library associated with a user identifier of the user. When a second environment is displayed on the user device, the virtual object may be added to the second environment in response to receiving user selection to add the virtual object and determining that the user is associated with the user identifier.
VALUE TRANSFER VIA FACIAL RECOGNITION
A user device includes a display, a camera, and an application. The application is structured to: receive first image data of a first user from a first input of the camera; receive second image data of a second user from a second input of the camera; receive a payment amount of a bill; detect a location of the first user; determine a recommended division of the payment amount of the bill based on the first user, the second user, and the location; receive a first value of the payment amount owed by the first user and a second value of the payment amount owed by the second user; and initiate a transfer of funds from a first user account associated with the first user based on the first value and from a second user account associated with the second user based on the second value.
Data transfer via tile overlay
A management system of a computing device provides enhanced functionality via selectable icons (e.g., tiles), presented on a home screen, that may be overlaid to perform overlay operations such as data transfer, payment, and/or granting of certain authorizations or permissions. Users are able to more readily perform cross-application and/or cross-entity operations via, for example, the operating system of a computing device without needing to engage with as many entities (or applications thereof). Tile overlay operations may be managed and reviewed via an application.
Information processing device, information processing method, payment system and program
An information processing device obtains order identification information capable of identifying an order placed by an order-placing person, transmits, as payment information, the order identification information, causes a printing process of a print medium to be executed, the print medium being capable of identifying the order identification information and gives, to another information processing device when an additional order placed by the order-placing person is received, an invalidation command which invalidates the order identification information in such a way that a payment with respect to the order identification information on an order not paid yet and placed by the same order-placing person is disabled.
SYSTEM AND METHOD FOR IMPLEMENTING A KEY-CODE BASED MONEY TRANSFER
A system includes a processor and a non-transitory computer readable medium coupled to the processor. The non-transitory computer readable medium comprises code that when executed by the processor, causes the processor to receive a money transfer amount indicative of an amount of funds to be transferred to a recipient. The processor generates a key code associated with the money transfer amount that is provided to a user of the system and given to the recipient by the user. The key code is programmed by the processor to enable the recipient to use the key code to redeem the amount of funds associated with the money transfer amount.
MOBILE SERVICES REMOTE DEPOSIT CAPTURE
Systems and methods disclosed herein include a mobile solution to enable users to perform financial transaction over a network using a mobile device. These techniques allow users to maintain a single personal account identifier or number (“PAN”) on the user's mobile device and to utilize it to access a plurality of linked financial accounts and sub-accounts. Any one of the accounts can be selected by a user on the mobile device to remotely deposit funds to that account based on an image of a financial payment instrument. The image can be obtained using image capture technology on the user's mobile device. Users can perform a financial transaction using the verified images over a network in order to conduct a remote financial transaction such as applying a deposit, a payment, or cash load to a designated account which is linked to the user's mobile account in real-time or near real-time.
METHOD AND SYSTEM FOR IN-STORE PURCHASE OF SECURITY-TAGGED ITEMS WHILE AVOIDING THE POINT OF SALE
A method and a system for enabling in-store purchasing of security-tagged merchandise, avoiding going through the point of sale of a retailer, are provided herein. The method may include the following steps: identifying, using a user-coupled device, a security tag attached to specific item to be purchased, wherein the security-tag is unique to the specific identified item; initiating a purchase request of said item via the user-coupled device, wherein the request includes a price of the item and identifiers of: the item, the security-tag identification, the retailer, and the user; attempting a transaction based on the purchase request, wherein the transaction is capable of being authorised by a third party; and indicating at a data repository associated with an in-store security gate sensitive to said security tag, that the security tag is no longer capable of initiating an alarm.