G06Q20/38215

SECURE OFF-CHAIN BLOCKCHAIN TRANSACTIONS
20230237475 · 2023-07-27 ·

Provided herein is a computer-implemented method, a system, and a non-transitory computer-readable storage medium. The system may be implemented using a blockchain network. The computer-implemented method includes: i) attaching a digital asset of a first entity to an exchange platform; ii) computing a first shared key associated with the digital asset using a key of the first entity and a first key of the exchange platform; iii) generating and broadcasting a first blockchain transaction to a blockchain network; and iv) initiating, by the first entity, transfer of ownership of the digital asset from a first entity to a second entity; v) computing a second key and a second shared key; vi) replacing the first key associated with the exchange platform with the second key associated with the exchange platform; and vii) detaching, by the second entity, the deposit from the exchange platform using the second shared key.

SYSTEM AND METHOD FOR USING IMAGE DATA TO TRIGGER CONTACTLESS CARD TRANSACTIONS
20230237465 · 2023-07-27 · ·

A method for controlling a near field communication between a device and a transaction card is disclosed. The method includes the steps of capturing, by a front-facing camera of the device, a series of images of the transaction card and processing each image of the series of images to identify a darkness level associated with a distance of the transaction card from the front of the device. The method includes comparing each identified darkness level to a predetermined darkness level associated with a preferred distance for a near field communication read operation and automatically triggering a near field communication read operation between the device and the transaction card for the communication of a cryptogram from an applet of the transaction card to the device in response to the identified darkness level corresponding to the predetermined darkness level associated with the preferred distance for the near field communication read operation.

Access Control System for Electric Vehicle Charging
20230005315 · 2023-01-05 ·

An access control system for electric vehicle charging is provided that includes an access device, a secure reservation interface, a reservation server and a smartphone application installed on the smartphone. The access device includes a short-range wireless communication module connected to a processor having control of an electric vehicle charger. The secure reservation interface receives a reservation request for a reservation at a given destination. The reservation server receives the reservation request for the destination, issues a reservation certificate, and transmits the reservation certificate from the reservation server to a smartphone. The smartphone application has access to a short range wireless communication setting corresponding to the access device. The access device receives the reservation certificate from the smartphone application based on use by the smartphone application of the short-range wireless communication setting. The processor activates the electric vehicle charger based on at least the receipt of the reservation certificate.

DEVICE ENROLLMENT SYSTEM AND METHOD

Embodiments related to systems and methods comprising receiving payment data at an access device; receiving an identifier for a mobile device at the access device; and generating and sending an authorization request message to a payment processing network, wherein the payment processing network generates a verification token, which is then sent to the mobile device whereby the mobile device is thereafter used to conduct payment transactions.

METHOD AND SYSTEM, DEVICE AND PAYMENT TERMINAL USING PERSONAL DATA
20230004965 · 2023-01-05 ·

The invention relates to an electronic transaction method for a system comprising a user-associated payment device 3 or 4 and a payment terminal 1. The payment device 3 or 4 and the payment terminal 1 perform a cryptographic key exchange 500 before performing a transaction step 501. The payment device includes personal information PI about the user. The payment terminal includes a transaction policy including a condition relative to the personal information Pi. The method includes a verification step 510, 520, 530, prior to the transaction step 501, for securely verifying the condition of the transaction policy relative to the personal information using the cryptographic key.

System, Method, and Apparatus for Securely Transmitting Data via a Third-Party Webpage

Provided is a computer-implemented method for securely receiving data via a third-party webpage, including: generating configuration data in response to a request from a first system, the configuration data including a public key of a first key pair; digitally signing the configuration data based on a private key of a second key pair; transmitting the configuration data to the first system, the configuration data including code configured to facilitate the first system to embed a plurality of frames in a webpage, wherein the plurality of frames loads content from a domain that is independent from a domain that hosts the webpage; and verifying the configuration data based on a public key of the second key pair. The computer-implemented method may also include receiving, from a master frame of the plurality of frames, encrypted data. Systems and computer program products are also provided.

System, Method, and Computer Program Product for Exchanging Transaction Data

Disclosed are methods for exchanging transaction data, including transmitting a first public encryption key and transaction data associated with a transaction to a computing device via a near field communication (NFC) connection, receiving a second public encryption key and a transaction message associated with the transaction via the NFC connection, and appending the second public encryption key and the transaction message associated with the transaction to a database stored in a memory in communication with at least one integrated circuit, wherein the at least one integrated circuit is powered by an electromagnetic field generated by the computing device. Systems and computer program products are also provided.

PLAN INTERACTION UTILIZING CRYPTOGRAM

A method includes a network processing computer receiving an authorization request message comprising a token and a cryptogram during an interaction between a resource provider and a user. The network processing computer determines user credentials associated with the token. The network processing computer then determines a plan identifier based on the authorization request message. The network processing computer provides the plan identified to an authorizing entity computer.

Identification and verification for provisioning mobile application

Embodiments are directed to the generation of a token associated with a status. The status of the token may affect how the token is treated and the types of restrictions placed on the token. The status of the token may indicate that the token is generated based on verification of secure user data. Alternatively, the status of the token may indicate that the token is generated based on insufficient user data and, as such, restrictions may be imposed on the token. The token requestor may be a mobile application, such as a merchant mobile application provisioned on a user device. In response to a token request from the merchant, the token provider issues tokens with varying status based on a confidence level. The status of the token may be indicated in terms of token assurance level.

Systems and methods for verifying users, in connection with transactions using payment devices

Systems and methods for verifying users in connection with transactions are disclosed. One exemplary method includes, in response to a payment device being inserted at a terminal, initiating, by a security chip of the payment device, a timer and capturing, by a biometric sensor of the payment device, a fingerprint while the timer is unexpired. The method also includes verifying, by the security chip, the captured fingerprint against reference fingerprint data stored in memory in the payment device and, in response to the captured fingerprint being verified, while the timer is unexpired, initiating, by the security chip, with the terminal, a transaction to an account using an account number specific to a biometric application of the payment device. An issuer can recognize verification of a user associated with the fingerprint based on the account number in an authorization request, instead of a different account number for the account.