G06Q20/38215

Device provisioning using partial personalization scripts

Embodiments of the invention relate to systems and methods for efficiently provisioning mobile devices with personalization data. For some embodiments, a method is disclosed comprising receiving a request for provisioning comprising device information for a mobile device and user authentication information for a user, generating a partial personalization script, an activation script, and a deletion script using the device information, sending the partial personalization script, the activation script, and the deletion script to an application provider computer, wherein the application provider computer initiates execution of the partial personalization script on the mobile device, authenticating the user authentication information, and sending an activation message to the application provider computer, wherein the application provider computer initiates execution of the activation script.

System and method for downloading an electronic product to a pin-pad terminal using a directly-transmitted electronic shopping basket entry

A method of downloading an electronic product to a pin-pad terminal involves the pin-pad terminal transmitting to a network gateway a transaction proposal for an electronic product from a network device, and receiving from the network gateway a transaction proposal response generated by the network gateway in response to the transaction proposal. The transaction proposal response includes a transaction pointer associated with the electronic product. The pin-pad terminal electronically directly transmits to an electronic cash register coupled to the pin-pad terminal an indication of a payment amount for the electronic product. The pin-pad terminal receives from the electronic cash register confirmation of entry of the electronic product in an electronic shopping basket maintained by the electronic cash register, and transmits the transaction pointer to the network device via the network gateway. The pin-pad terminal receives the electronic product from the network device via the network gateway.

SYSTEMS AND METHODS FOR PEER-TO-PEER TRANSMISSION OF DIGITAL ASSETS
20220044229 · 2022-02-10 ·

This disclosure relates to transaction systems and particularly to transaction systems of a peer-to-peer nature for digital assets. The asset transfer system may store user, user accounts, and transaction information in associated logic tables within a memory of a server hosting the asset transfer system. Through the use of, but limited to, curl functions, the asset transfer system may communicate with remote servers housing user wallets and user wallet information to perform transactions of digital assets between users. Before verification and proof of work can be established to complete the transfer of digital assets, the asset transfer system may report to the users of a transaction the details of the transaction. Users of the asset transfer system need not know encrypted or random keys to perform such digital asset transactions and may transfer digital assets only by identification of a username stored within the asset transfer system.

METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR NETWORK BOUND PROXY RE-ENCRYPTION AND PIN TRANSLATION

A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (ga), the second value (ga) generated based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (mi) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (mi); generate, with the payment network, a public key (pki) based on the second value (ga), the merchant product (M), and the random merchant number (mi) and a random key (rki) based on the merchant product (M) and the random merchant number (mi) for each respective merchant bank; and communicate, with the payment network, the public key (pki) and the random key (rki) to at least one respective merchant bank.

SYSTEMS AND METHODS FOR MEDIA CODECS AND CONTAINERS
20170255912 · 2017-09-07 ·

Systems and methods for enabling and enforcing cryptocurrency transactions associated with at least a portion of data are provided. Systems and methods may include a cryptocurrency transaction service, the cryptocurrency transaction service including one or more transaction servers and one or more ledger processing devices. At least one streaming server configured to associate at least a portion of data with a cryptocurrency transaction and to transmit the at least a portion of data may be provided. A client device may be provided, the client device being configured to receive the at least a portion of data from the streaming server, wherein at least one of the client device and at least one streaming server are configured to initiate a cryptocurrency transaction with the cryptocurrency transaction server based at least in part on the association between the at least a portion of data, the cryptocurrency transaction, and the cryptocurrency transaction service.

SYSTEMS AND METHODS FOR DOMAIN RESTRICTION WITH REMOTE AUTHENTICATION
20170255932 · 2017-09-07 ·

A process for combining domain restriction and remote authentication may include receiving a token from a plug-in application to conduct a transaction associated with a user of a communicating device. The process may include sending an authentication request to a remote access control sever to authenticate the user, and receiving, from the remote access control server, an authentication tracking value that the remote access control server used in generation of an authentication cryptogram. The process may also include generating, using the authentication tracking value, a domain restriction cryptogram that is used for domain restriction of the token, and sending, to the plug-in application, the domain restriction cryptogram.

SYSTEMS AND METHODS FOR SECURING AND GENERATING REAL-TIME PRODUCT DATA STREAMS TO ENABLE LOW-LATENCY TRANSACTIONS
20220237673 · 2022-07-28 ·

The present disclosure includes systems and methods for generating real-time high-frequency product data stream to enable low-latency transactions based on inventory data available from one or more third-party seller platform servers executing a platform that lists a plurality of products. The systems and methods of the present disclosure provide sanitized real-time high-frequency product data stream that is actionable and can be shared with third-party market participants. The system and methods can secure the system that facilitates low-latency transactions using firewalls and access control rules that compartmentalizes access to information using multiple data layers for the sub-systems.

SYSTEMS AND METHODS FOR AUTHENTICATION OF ACCESS TOKENS
20220237609 · 2022-07-28 ·

Systems and methods for authentication may include a first device including a memory, a communication interface, and one or more processors. The memory may include a counter value, transmission data, and at least one key. The one or more processors may be in communication with the memory and communication interface. The one or more processors may be configured to create a cryptogram using the at least one key and counter value, wherein the cryptogram includes the counter value and the transmission data; transmit the cryptogram via the communication interface; update the counter value after cryptogram transmission; receive an encrypted access token via the communication interface; decrypt the encrypted access token; store the decrypted access token in the memory; and transmit, after entry of the communication interface into a communication field, the access token via the communication interface for access to one or more resources, wherein the access token is encrypted.

SYSTEMS AND METHODS FOR SECURE REPROVISIONING
20220239479 · 2022-07-28 ·

Systems and methods for authentication may include a first device having an association with a first account, including a memory containing one or more applets, a counter value, and transmission data, a communication interface, and one or more processors in communication with the memory and communication interface. The first device may create a cryptogram based on the counter value, wherein the cryptogram includes the counter value and the transmission data. The first device may transmit, after entry of the communication interface into a communication field, the cryptogram, and update, after transmission of the cryptogram, the counter value. The first device may receive, via the communication interface, one or more encrypted keys and one or more parameters. The first device may decrypt the one or more encrypted keys and, after decryption of the one or more encrypted keys, switch an association from the first account to a second account.

SYSTEMS AND METHODS FOR NEAR FIELD CONTACTLESS CARD COMMUNICATION AND CRYPTOGRAPHIC AUTHENTICATION
20220237608 · 2022-07-28 ·

Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to receive a cryptogram associated with a first near field communication data exchange format (NDEF) read. The processor may be configured to perform a first factor authentication of the cryptogram. The processor may be configured to receive a first data set, wherein the first data set is associated with a second NDEF read. The processor may be configured to extract metadata from the first data set. The processor may be configured to perform, after the first factor authentication, a second factor authentication based on the metadata. The processor may be configured to generate a message indicative of an outcome of the second factor authentication. The processor may be configured to transmit the message that instructs the processor to effectuate one or more actions.