Patent classifications
G06Q20/3227
Secure authentication based on physically unclonable functions
The invention relates to an electronic device, and more particularly, to systems, devices and methods of authenticating the electronic device using a challenge-response process that is based on a physically unclonable function (PUF). The electronic device comprises a PUF element, a processor and a communication interface. The PUF element generates an input signal based on at least one PUF that has unique physical features affected by manufacturing variability. A challenge-response database, comprising a plurality of challenges and a plurality of corresponding responses, is set forth by the processor based on the PUF-based input and further provided to a trusted entity. During the trusted transaction, the processor generates a response in response to a challenge sent by the trusted entity based on the PUF-based input, and thereby, the trusted entity authenticates the electronic device by comparing the response with the challenge-response database.
Body area network facilitated authentication or payment authorization
Disclosed are examples of a method, a wearable device and a system enabling authentication of a user of a payment account or completion of a purchase transaction via signals generated by the wearable device. A process may include a wearable device generating a modulated signal using an encryption algorithm. The modulated signal may contain authentication information related to the wearable device including a cryptographic authentication message. The modulated signal is output to a biological medium interface of the wearable device that is coupled to a biological medium of a wearer of the wearable device. The biological medium is operable to conduct the modulated signal. A receiving device processes including decrypting and demodulating the modulated signal received from the biological medium. Using the demodulated signal, the authentication information transmitted from the wearable device is obtained. Based on the obtained authentication information, a transaction may be authorized, or a user authenticated.
Systems and methods for displaying payment device specific functions
Some embodiments of the invention provide a convenient system and method of displaying payment device specific functions. In other words, systems and methods are provided that allow different functions to be displayed and used for different payment devices provisioned on a communication device. These embodiments allow users to perform certain allowed functions on one payment device, and other, potentially different functions on another payment device.
Digital wallet for the provisioning and management of tokens
Disclosed are methods and systems for associating payment card credentials with a companion application. In an embodiment, a consumer's mobile device processor receives an instruction to launch a companion application, displays a companion application user interface, and receives selection of an option to obtain payment card credentials from at least one wallet application. The process also includes displaying a list of payment card accounts associated with the selected wallet application for association with the companion application, receiving a selection of at least one payment card account, transmitting payment account credentials of the selected payment account to a wallet server computer, receiving a companion token representing a digitization of the selected payment card account from the wallet server computer, and associating the companion token with the companion application.
Systems and methods for digital identity verification
Systems and methods for digital identity verification are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for digital identify verification may include: (1) receiving, from a user electronic device or at a website, an image of an identity document for a user, the identity document comprising an image of the user; (2) processing the identity document with at least one business-specific rule; (3) extracting identity information from the identity document; (4) determining a match rate of the image of the user on the identity document to a captured image; (5) assigning a verification score to the user based on extracted identity information and the match rate; and (6) publishing the verification score to at least one system.
Authentication techniques in response to attempts to access sensitive information
The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant “who owns this device?” By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.
Alternative service access
Alternative service access with operations including determining that a system has met a plurality of criteria, including the system having a battery level below a threshold, identifying a merchant, generating an authentication token for authorizing a payment using a payment provider, and sending the authentication token to the payment provider.
Relying party risk-adjusted indicator system and method
A method and system capable of generating a relying party risk-adjusted indicator associated with and used by users and parties entering into one or more transactions with a relying party.
SYSTEM AND METHOD OF MULTIPLE CLOSED-LOOP SECURED TRANSACTION
The present invention relates to a system and a method for performing a closed-loop secured transactions using NFC. The method comprises of receiving a payment selection comprising of instrument selection at a secure element of a first user device. The instrument selection is used to automatically select the closed-loop kernel. The invention further encompasses using symmetric key encryption for the payment selection data which can only be decrypted inside the HSM for quick and hassle-free peer to peer (P2P) or peer to merchant (P2M) closed-loop transactions.
Generating a cryptographic key based on transaction data of mobile payments
A base key that is stored at a mobile device may be received. A first dynamic key that is based on the base key may be generated. First transaction data corresponding to a first transaction associated with the mobile device may be received. Furthermore, the first dynamic key may be updated to generate a second dynamic key based on a combination of the first dynamic key and the first transaction data corresponding to the first transaction. Authentication of a second transaction associated with the mobile device may be requested based on the second dynamic key.