Patent classifications
G06Q20/3226
Multi-Function Data Key
A data key for secure financial and other types of data transactions with a key-shaped case, lightbox touch sensor carrying a removable wafer, processor, secure memory, general-purpose memory, battery, antenna, speaker, microphone, and a dual-purpose USB and chip pin pad. Bluetooth, NFC and/or RFID provides the ability to pair the data key through a wireless channel with another device, such as a smartphone, using a pairing button on the back of the data key. The data key provides chip-and-pin type security to online financial transactions. Dual-device (multi-factor) security requires both the data key and another communication device registered to an authorized user to be present to activate the data key for secure operations. Device pairing enables geo-proximity features, such as dual-device security with a paired device, key finder, phone finder, and panic button. The data key may provide secure, remotely programmable security for building and equipment access.
MULTIFACTOR AUTHENTICATION THROUGH CRYPTOGRAPHY-ENABLED SMART CARDS
There are provided systems and methods for multifactor authentication through cryptography-enabled smart cards. A user may engage in transactions or other online interactions that may require multifactor authentication, such as by providing a secondary or further piece of evidence or information that is used to more securely trust the user and that they are not another malicious user. The user may utilize a physical card that includes a microchip embedded to a surface, where the microchip includes a key or other cryptographic signing function to be able to be scanned and digitally sign a request for authentication from a computing device. A user's computing device may then be brought into close proximity to the microchip when a request to scan the card's microchip is received. The user's computing device may then use wireless signals to activate the microchip and perform a multifactor authentication.
Method and system for performing mobile device-to-machine payments
A device with one or more processors, memory, and two or more communication capabilities obtains, from a payment module, an authorization request via a first communication capability (e.g., Bluetooth). The device sends, to a server, the authorization request via a second communication capability distinct from the first communication capability (e.g., cellular or WiFi technology). In response to sending the authorization request, the device obtains, from the server, authorization information via the second communication capability. After obtaining the authorization information, the device detects a trigger condition to perform a transaction with a payment accepting unit associated with the payment module. In response to detecting the trigger condition, the device sends, to the payment module, at least a portion of the authorization information via the first communication capability.
Point of interest data creation for use with location-aware mobile devices
Interacting between users of mobile devices is provided by initiating a desired interaction at a first user device using a gesture sensed by the first user device, determining a gesture area, submitting a desired interaction request for interaction with associated users within the gesture area, and sending a notification to user devices indicating the desired interaction of the first user with one or more users of a local subset, wherein the notification identifies the first user with an identifier independent of identifiers used by the first user outside of interactions with a remote server.
FRAUD DETECTION SYSTEM, FRAUD DETECTION DEVICE, FRAUD DETECTION METHOD, AND PROGRAM
A fraud detection system for executing predetermined processing when a detection target is detected by using a detection device, the fraud detection system comprising at least one processor which determines, before the detection target is detected, whether a predetermined action has been performed by a user having a user terminal; executes, when it is determined that the predetermined action has been performed, fraud detection on the user based on identification information stored in the user terminal; and executes, when the detection target is detected, the predetermined processing based on an execution result of the fraud detection.
METHODS FOR CONDUCTING ELECTRONIC PAYMENT TRANSACTIONS WITH SCANNABLE CODES
One embodiment of the invention provides for making electronic payments by scanning a merchant 2D code located near the point of sale with the customer's cell phone and transmitting the code or data embodied by the code to a payment center where the merchant's account can be credited and the customer's account debited without transmitting account information over the airwaves. In another embodiment of the invention, both parties transmit the same randomly generated 2D code or data embodied by the code to the payment center where they are matched to each other and to the buyer and seller to process the transaction. In a further embodiment of the invention, an inked tattoo or barcode marking is employed as a password to authorize access to smartphone applications for example, to make an electronic payment over a threshold amount.
PROCESSING USING MACHINE READABLE CODES AND SECURE REMOTE INTERACTIONS
A method is disclosed. The method includes receiving, by an application on a communication device from an access device, a unique identifier associated with a resource provider in a transaction. The method also includes transmitting, by the application, a message comprising the unique identifier and an access data reference identifier associated with access data to a remote server computer associated with the application. The remote server computer searches a database for access data using the access data reference identifier, retrieves the access data, and provides the access data to a transport computer which processes the transaction using the access data.
Integrated mobile trusted service manager
Embodiments of the present invention are directed to a centralized trusted service manager system in the form of a trusted service manager interconnectivity service hub, which facilitates and provides communications between entities involved I mobile contactless payment systems. One embodiment is directed to a method for processing a message related to a mobile payment application on a secure element of a mobile communication device through an interconnectivity services hub including receiving the message from a first entity in a first protocol and determining a trusted service manager associated with the secure element from among a plurality of trusted service managers using a routing table comprising routing information. Then the method continues by determining a second protocol corresponding to the trusted service manager associated with the secure element, translating the message into the second protocol, and sending the translated message to the trusted service manager which communicates with the secure element.
Method and system for asynchronous mobile payments for multiple in-person transactions conducted in parallel
A mobile consumer device with a display, processor(s), and memory: identifies a merchant device in proximity to the consumer device based on broadcasted information transmitted by the first merchant device, the broadcasted information including a first identifier corresponding to the first merchant device; transmits the first identifier to a server and receives from the server an electronic communication including identification and transaction information associated with the merchant; displays the identification information, receives user selection of the merchant identification information; and in response, displays the merchant transaction information, receives supplemental user information, and transmits the supplemental transaction information to the server for completion of the transaction.
Processing interrupted transaction over non-persistent network connections
An offline retail machine comprising a short-range transceiver, one or more processors, and memory performs communications operations via one or more mobile devices. The communications operations include establishing via the short-range transceiver a connection with a first mobile device, and transmitting first information to the first mobile device. Upon not receiving an acknowledgement that the first information was received by a remote server, the offline retail machine maintains the first information in the memory and establishes, via the short-range transceiver, a connection with a second mobile device, appends the first information to second information, and transmits the first and second information to the second mobile device. Upon receiving acknowledgement that the first and second information were received by a remote server, the offline retail machine deletes the first and second information.