Patent classifications
G06Q20/38215
INAUDIBLE VOICE PAYMENT
A method and a system are provided for secure payment card transactions using a voice enabled device. The user device encodes a tokenized payment card transaction into an inaudible soundwave and emits the soundwave via a speaker to the voice enabled device. The voice enabled device, while in a listening state, detects the inaudible soundwave via a microphone. The voice enabled device decrypts the inaudible soundwave and transmits the decrypted tokenized payment for downstream processing by the payment card system.
SECURE AUTHENTICATION BASED ON IDENTITY DATA STORED IN A CONTACTLESS CARD
Systems, methods, articles of manufacture, and computer-readable media for secure authentication based on identity data stored in a contactless card associated with an account. An application may receive an indication specifying to perform an operation. The application may receive encrypted data from the card. The application may receive an indication that the authentication server decrypted the encrypted data. The application may determine a type of data required to authorize the operation. The application may receive data comprising passport data or driver license data from the card. The application may determine that the data satisfies a rule for authorizing the operation and authorize performance of the operation based on the authentication server verifying the encrypted data and the data satisfying the at least one rule.
TRANSACTION SUBMISSION PROCESSING OVER DISTRIBUTED LEDGER NETWORKS
Systems for processing transaction submissions over a distributed ledger network are provided. Such a system includes an exchange platform and a settlement platform. The settlement platform is to generate settlement instructions comprising a set of net positions held by transaction participants with respect to transaction submissions submitted to the exchange platform by the transaction participants for exchange of assets via an off-ledger settlement entity. The settlement platform is to host a private distributed ledger network to store a record of positions held by the transaction participants with respect to the assets, update the record of positions according to the settlement instructions, and transmit an update of the record of positions to the off-ledger settlement entity.
GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES
Various embodiments are generally directed to secure generation of barcodes using cryptographic techniques. A processor of a contactless card may generate a cryptogram based on a cryptographic algorithm and a diversified key stored in a memory of the contactless card. The processor may receive an encrypted authorization token based on verification of the cryptogram by a server. The processor may generate a barcode utilizing the encrypted authorization token.
GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES
Various embodiments are generally directed to secure generation of barcodes using cryptographic techniques. An application may receive a request to generate a barcode. The application may receive encrypted data from a communications interface of a contactless card associated with an account. The application may receive, from a server, verification of the encrypted data and an encrypted authorization token associated with the account. The application may generate the barcode utilizing the encrypted authorization token.
AUTHENTICATION FOR THIRD PARTY DIGITAL WALLET PROVISIONING
Various embodiments are directed to securely verifying an identity of a user who is requesting to add or link a financial instrument to a third-party digital wallet using one-tap contactless card authentication. The financial instrument may be added or linked to the third-party wallet in at least two scenarios: pull provisioning and push provisioning. In either provisioning scenarios, the user may be required to authenticate the financial instrument being added or linked by successfully verifying the identity of the user via the one-tap contactless card authentication at a banking application associated with the financial instrument.
SECURE E-COMMERCE PROTOCOL
An E-commerce protocol is provided. The E-commerce protocol has been developed as a solution to malicious attacks such as credit card fraud and stealing of various financial data, wherein the malicious attacks appeared particularly in a cyber world. With the help of the E-commerce protocol, a manipulated version of user information in an E-commerce database removes security risks of compromising on E-commerce systems. Even though a user does not have to share personal information of the user with E-commerce companies, an application also eliminates a necessity of entering the user information for each online transaction.
AUTHENTICATION DECISION ENGINE FOR REAL-TIME RESOURCE TRANSFER
Systems, computer program products, and methods are described herein for authentication decision engine for real-time resource transfer. The present invention is configured to electronically receive, from a computing device associated with a user, a resource distribution request at a first time; generate a notification on a computing device associated with a resource distribution source; dynamically generate a first resource authentication code based on at least the resource distribution request; transmit control signals configured to cause the computing device associated with the user to display the first resource authentication code to the user; dynamically generate a second resource authentication code based on at least the resource distribution request; transmit control signals configured to cause the computing device associated with the resource distribution source to display the second resource authentication code to the resource distribution source; initiate an execution of the resource distribution request at a second time
Systems and methods for smart card mobile device authentication
A method of authenticating a mobile pay feature on a mobile device using a smart card is disclosed. The method includes offering a mobile pay functionality to a user on a mobile device and receiving an affirmative user input to enable the mobile pay functionality. A contactless logic disposed in the mobile device receives an encrypted authentication code from a subject smart card and attempts to authorize the mobile device user and the mobile device itself to use the smart card for mobile pay transactions. Once the mobile device and the user are authorized, the mobile pay function is enabled.
SYSTEMS AND METHODS FOR DYNAMIC PASSPHRASES
Systems, devices, methods, and computer readable media are provided in various embodiments relating to generating a dynamic challenge passphrase data object. The method includes establishing, a plurality of data record clusters, representing a mutually exclusive set of structured data records of an individual, ranking the plurality of feature data fields based on a determined contribution value of each feature data field relative to the establishing of the data record cluster, and identifying, using the ranked plurality of feature data fields, a first and a second feature data field of the plurality of feature data fields. The method includes generating the dynamic challenge passphrase data object, wherein the first or the second feature data field is used to establish a statement string portion, and a remaining one of the first or the second feature data field is used to establish a question string portion and a correct response string.