Patent classifications
G06Q20/38215
METHOD AND SYSTEM FOR FACILITATING SECURE CARD-BASED TRANSACTIONS
A transaction card comprises at least one input button that receives a transactional input provided by a cardholder of the transaction card for initiating a secure card-based transaction. The input button is coupled to an electronic chip which when activated generates an electrical signal based on the transactional input. The electrical signal includes encrypted transactional data associated with the transaction card. A signal transmitter that is coupled to the electronic chip receives the electrical signal from the electronic chip, converts the electrical signal to one or more light pulses, and transmits the one or more light pulses to one of a terminal device or a user device for executing the transaction. The transaction is processed by an issuer of the transaction card based on the encrypted transactional data included in the one or more light pulses.
Systems and methods for facilitating biometric tokenless authentication for services
Systems and methods for tokenless authorization are provided. Obtaining an electronic representation of an initial biometric sampling of a registrant. Applying the initial electronic representation to a template data construct producing a unique digital identifier (UDI). Obtaining account information constructs corresponding to an account by the registrant with a third party. Generating a unique secure identification number (SIN) using the UDI and the account information constructs. Storing a unique link from the UDI to the account information constructs. Receiving a request for service and an electronic representation of a second biometric sampling. Forming the UDI by applying the second electronic representation to the template data construct. Verifying the UDI corresponds to the stored UDI to reconstruct the unique SIN from the UDI and using this unique SIN to retrieve the account information constructs using the indexed data structure. Transmitting the request and the unique SIN to the third party.
METHOD AND SYSTEM FOR REGULATION OF BLOCKCHAIN-BASED PAYMENTS
A method for ensuring regulatory oversight of transaction activity and storage thereof on a blockchain includes: establishing a secure communication channel between a first computing system associated with a first entity and a second computing system associated with a second entity; receiving transaction data from the first computing system, wherein the transaction data includes a first digital certificate from the first computing system and second digital certificate from the second computing system; identifying a regulatory node that has regulatory oversight of the first entity or the second entity; transmitting at least a portion of the transaction data to the regulatory node; receiving a third digital certificate from the regulatory node; and posting a transaction hash including the first digital certificate, second digital certificate, and third digital certificate to a blockchain.
VALIDATION AND STORAGE OF TRANSACTION DATA FOR A BLOCKCHAIN
A system includes a memory and a processor configured to execute computer instructions stored in the memory that when executed cause the system to perform operations. The operations include receiving transaction data associated with a transaction via a transaction component. The operations include incorporating at least a portion of the transaction data into a security process associated with challenge-response authentication of a data block for the transaction data. The data block includes cryptographic hash data for another data block in a blockchain associated with the data block. The operations include validating the data block associated with the blockchain based on the security process.
SYSTEM AND METHOD FOR ASSESSING A DIGITAL INTERACTION WITH A DIGITAL THIRD PARTY ACCOUNT SERVICE
A system and method for assessing digital interactions with a digital third party accounts can include receiving user account credentials for authentication with an external computing system, storing the user account credentials in association with a authentication token and communicating the authentication token to a computing device of an external application service; receiving, through a programmatic communication interface, a request that references the authentication token and digital interaction details; programmatically authenticating, using the stored user account credentials, as a user account with the external computing system and retrieving account data; processing the account data in combination with the digital interaction details and thereby generating a digital interact assessment; and initiating execution of a digital interaction based in part on the digital interaction assessment.
SYSTEMS AND METHODS FOR CREATING DYNAMIC SESSIONS FOR MOBILE APPLICATION INTEGRATION
Systems and methods for mobile application integration are described. These may include receiving a payment request a mobile application, sending a payment application detection request, receiving a detection response, and sending a customized user interface to the mobile device. The customized user interfaces are determined by whether an associated payment application is present on the mobile device and whether the mobile device is authenticated with the payment processing platform. These techniques can allow for a better user experience when interacting with the payment processing platform.
ANIMATED TWO-DIMENSIONAL BARCODE CHECKS
Systems and methods are disclosed to provide an animated 2D barcode check that is used to securely and efficiently transmit financial information between mobile devices. The financial information includes a check written by a payer and transmitted to a merchant. The check includes account information of the payer and of the merchant with a payment service provider, a payment amount, and a cryptographic signature that has been certified by the payment service provider. The payer's mobile device encodes the check into a sequence of 2D barcodes and displays the sequence of 2D barcodes in a loop that is scanned by a camera on the merchant's mobile device. The merchant uses the cryptographic signature to verify the validity of the signature on the check without having Internet connectivity to the payment service provider. The merchant may later present the check to the payment service provider to receive payment.
System and methods for using limit-use encrypted code to transfer values securely among users
A system and method for facilitating a secured value transfer. A first user and the system obtain a pair of encryption and decryption apparatuses. The first user creates a request including his unique identifier and a value to be transferred. The first user encrypts the request using the encryption apparatus and sends it to the second user. The second user sends to the system the request and the second user's unique identifier. The system uses the decryption apparatus to decrypt the request. The system checks the usage of the request against a threshold limit. After a successful usage check, the system then transfers the value from the first user to the second user. The system may comprise (a) a plurality of system server for exchanging data with users' personal computing devices, registering users, and conducting transactions, and (b) data storages storing user accounts and other persistent data.
PROVISIONING OF ACCESS CREDENTIALS USING DEVICE CODES
Systems and methods are described for provisioning access credentials to a mobile device using device and authorization codes. Once provisioned, a mobile device can be used to conduct a transaction.
METHOD FOR AUTHENTICATING PAYMENT DATA, CORRESPONDING DEVICES AND PROGRAMS
A method for authenticating at least one piece of data during a payment transaction taking place between a merchant's communications terminal and a user device of the type including transmission, by the communications terminal, of at least one piece of data to be signed, to the user device by using a near field communications wireless data link. The method includes: obtaining the piece of data to be signed; obtaining an identifier of the communications terminal; signing, within a secured processing unit of the communications terminal, by using a key of the communications terminal, the piece of data to be signed and the identifier of the communications terminal, delivering signed pieces of data; transmission of the signed pieces of data to the user device; and reception, from the user device, of a piece of encrypted data establishing the authentication of the signed pieces of data.