G06Q20/3226

Authenticating a customer to a risk level using an authorization token

Disclosed herein are system, method, and computer program product embodiments for authenticating a mobile user via an authentication method determined based on a token level associated with the action being completed. An authentication token is created corresponding to the token level and the authentication token is sent to the mobile device. This authentication token may be used to authenticate subsequent actions and engage various services to complete the actions using application programming interfaces. The authentication token stored on the mobile device obviates the need for a user to authenticate multiple times to complete actions requiring a similar token level. The system may authenticate the identity of the mobile user using various authentication methods.

ZERO KNOWLEDGE BLOCKCHAIN ATTRIBUTION
20230059384 · 2023-02-23 ·

A content publisher may transfer an impression token value to a user in response to the content publisher displaying an advertisement for a merchant to the user. The content publisher may record the transfer on a zero knowledge blockchain. The merchant may transfer a conversion token value to the user in response to the user making a purchase from the merchant. The merchant may record the transfer on the zero knowledge blockchain. The user may transfer the impression token value and the conversion token value to a measurement company. The measurement company may calculate attribution and lift results for the advertisement.

Driver activity and vehicle operation logging and reporting
11587091 · 2023-02-21 · ·

A method for logging and reporting driver activity and operation data of a vehicle. The method utilizes an onboard recorder operatively connected to a data bus of the vehicle and configured to continuously electronically monitor and obtain vehicle operation data including vehicle mileage data. Data processing software is operable for generating an hours of service log and a vehicle fuel tax log.

Systems and methods for responsive data transfer and anonymizing data using tokenizing and encrypting
11587076 · 2023-02-21 · ·

Described herein are systems and methods for securely obtaining payment information from a recipient on a payer's mobile device within an application on the payer's mobile device. The securely obtained information can be decrypted in the application, and the recipient information can be extracted. The extracted recipient information can be validated and used by the application to initiate a fund transfer to the recipient's account from the payer's account. The application can include a user interface that can allow the payer to anonymize the payment, securing the privacy of the payer.

Payment Accessory Integration System for Mobile Computing Devices

A system comprises: a payment accessory including: a payment accessory including: at least one payment data sensor, and an accessory housing defining a mounting interface carrying a set of electrical contacts; and an adapter including: an adapter housing defining (i) an accessory bay configured to removably receive the mounting interface of the payment accessory, and (ii) a device interface opposite the accessory bay, the device interface configured to couple the adapter to a mobile computing device to interconnect the electrical contacts of the mounting interface with the mobile computing device.

Digital Key With Monetary Value
20220366408 · 2022-11-17 ·

The disclosure is directed to use of digital keys in providing access to secured locations, goods and resources as well as other assets. The access may be fee based with the disclosure further directed to including fee payment authorization into the access process. Electronic locks may be employed within modules to faciltiate the access. The digital keys may be accompanied with commands for the electronic locks and/or modules accomodating them to execute in the course of providing the access. The digital keys may be shared, limited to single or multiple use and may be lock agnostic. The commands may be sent from a smart mobile device and be digitally signed for subsequent attestation by the lock for authenticity verification. The digital keys may be generated and otherwise handled under one of a series of escalating security encryption methods typically used and reserved for financial transactions.

Generating barcodes utilizing cryptographic techniques

Various embodiments are generally directed to secure generation of barcodes using cryptographic techniques. An application may receive a request to generate a barcode. The application may receive encrypted data from a communications interface of a contactless card associated with an account. The application may receive, from a server, verification of the encrypted data and an encrypted authorization token associated with the account. The application may generate the barcode utilizing the encrypted authorization token.

Mobile agent point-of-sale (POS)

Systems and methods are disclosed for conducting transactions and financial transfers utilizing a mobile device communicatively coupled with a mobile communications network and executing a mobile point-of-sale application. According to some embodiments, the mobile point-of-sale application is adapted to conduct money transfer transactions by communicating transaction information through the mobile communications network to a money transfer provider system that processes the money transfer and communicates receipt information to the mobile point-of-sale application. Additionally, according to some embodiments, an account associated with an agent of the money transfer provider can be used in money transfer transactions conducted by the mobile point-of-sale application.

SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

Systems and methods for cryptographic authentication of contactless cards

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.