Patent classifications
G06Q20/38215
Systems and methods for linking high-value tokens using a low-value token
Embodiments include methods and systems for linking high-value tokens using a low-value token, comprising receiving, from an electronic data server, a first high-value token and a request for a low-value token, the first high-value token being associated with sensitive data associated with a user, and the low-value token being associated with a subset of the sensitive data associated with the user. The methods and systems further comprise providing the low-value token to the electronic data server, and receiving, from a second electronic data server, the low-value token and a request for a second high-value token, the low-value token having been provided to the second electronic data server by the electronic data server. The methods and systems further comprise generating a second high-value token associated with the sensitive data associated with the user, and providing the second high-value token to the second electronic data server.
Validating a customer in an electronic transaction
In a method of validating a customer in an electronic transaction, an electronic interface of a vendor requests a first set of personal information to validate a customer. The first set of personal information is requested as a portion of a transaction between the electronic interface and a customer device used by the customer. Responsive to the customer's authorization, the electronic interface receives from the customer device an encrypted token which includes a second set of personal information which identifies the customer and encompasses at least a portion of the first set of personal information. The encrypted token is provided to the customer device from a third-party via an application on the customer device and is configured with the second set of personal information prior to the transaction. The electronic interface completes the transaction using the second set of personal information decrypted from the encrypted token to validate the customer.
METHODS AND SYSTEMS FOR NETWORK-ENABLED ACCOUNT CREATION USING OPTICAL DETECTION
Provided is a network-enabled method for creating an online account using a network of devices. The method comprises: receiving by an authentication system, a request to create an online account with an online server; generating a visual graphical code by the authentication system, which is displayed on a display screen and comprises a validation identity; acquiring image data of the visual graphical code from a user device with aid of optical detection apparatus, by capturing an image of the visual graphical code displayed on the display screen; processing the image data to extract the validation identity; based on the validation identity identifying an online serve provider associated with the online server and user information categories associated with the online account; and based on identification information related to the user identifying the user, and the data to the online server for the online account with the online server.
SYSTEMS AND METHODS FOR PROVIDING CARD INTERACTIONS
A method including receiving a first application user credential associated with a user profile; comparing, for a first match, the first application user credential with a stored second application user credential, wherein the stored second application user credential is associated with a user identity; and responsive to finding a first match, verifying the user identity by performing the following: communicating with a card using near field communication; receiving a public key of a key pair of the card and cardholder identification information of an account holder of the card; instructing the card to generate a digital signature; receiving the digital signature from the card; verifying the digital signature using the public key; and comparing, for a second match, at least a portion of the user identity with at least a portion of the cardholder identification information.
Systems, Methods, and Computer Program Products for Authenticating Devices
Disclosed are non-limiting methods for authenticating devices, including receiving a request for a device authentication identifier, transmitting a device authentication request message via a frame embedded in a webpage of a merchant website, the device authentication request message including challenge data associated with a challenge, receiving a device authentication response message via the frame embedded in the webpage of the merchant website based on the device authentication request message, the device authentication response message including challenge response data associated with a challenge response, transmitting the device authentication identifier message based on the device authentication response message, receiving a transaction request message for a transaction, including the device authentication identifier and transaction data associated with the transaction, determining the device score based on the device authentication identifier, and generating an authorization request message based on the transaction data and the device score. Systems and computer program products are also disclosed.
VIRTUAL CODE-BASED TRANSACTION SYSTEM, METHOD AND PROGRAM
The present invention provides a virtual code-based transaction system, method and program, wherein the method includes a virtual code reception step in which a virtual code verification means receives a virtual code, and the virtual code is generated by a virtual code generation function included in a virtual code generation means, searching, by the virtual code verification means, for a storage location of a User Identification (UID) in the virtual code, searching, by the virtual code verification means, for control command information stored by matching the searched UID, and performing a control command based on the extracted control command information, wherein the virtual code verification means stores a plurality of UIDs and changes control command information matched to each of the plurality of UIDs every preset period.
Multi-purpose device having multiple certificates including member certificate
Embodiments of the invention relate to systems and methods for provisioning and using a multi-purpose device. The device contains information regarding a plurality of memberships. The device contains one or more membership certificate chains, comprising multiple certificates, wherein a membership provider certificate is signed by a private key associated with a membership root certificate authority, and wherein a member certificate is signed by a private key associated with the membership provider certificate. The member certificate includes member attributes regarding the user, such as member benefit information. The device also includes a payment certificate chain, comprising multiple certificates, wherein a payment provider certificate is signed by a private key associated with a payment root certificate authority, and wherein a payment certificate is signed by a private key associated with the payment provider certificate. The payment certificate includes payment attributes regarding the user, such as a payment account.
Managing transactions in multiple blockchain networks
Disclosed are computer-implemented methods, non-transitory computer-readable media, and systems for managing transactions in multiple blockchain networks. One computer-implemented method includes identifying a first transaction in a first blockchain network that is a first Hash Time Locked Contract (HTLC) transaction in the first blockchain network, identifying a second transaction in a second blockchain network that is a second HTLC transaction in the second blockchain network different from the first blockchain network, determining that a first transaction commit time of the first HTLC transaction is earlier than a second transaction commit time of the second HTLC transaction and a first secret hash of the first HTLC transaction has a same value as a second secret hash of the second HTLC transaction, and in response, determining that the first HTLC transaction and the second HTLC transaction are associated with each other and related to a cross-chain transaction.
Encapsulation of payment information
Various embodiments relate to a method performed by a processor of a computing system. An example method includes receiving a digitally signed cross-border payment message, the digitally signed cross-border payment message generated by digitally signing a first hash of a cross-border payment message with a first financial institution private key. A first financial institution public key is retrieved, the first financial institution public key of a public/private key pair that includes the first financial institution private key. The first financial institution public key is verified that it is associated with a first financial institution. A second hash of the cross-border payment message is generated. The second hash is digitally signed with the first financial institution public key to generate a verification cross-border payment message, wherein data integrity of the cross-border payment message can be verified if the verification cross-border payment message matches the digitally signed cross-border payment message.
CLIENT AUTHENTICATION USING SPLIT KEY SIGNING ON A BLOCKCHAIN PLATFORM
An approach is disclosed on a blockchain platform for authenticating clients. A public and private key is created at a client device. The private key into is split two or more parts. The split private key part is split into to two or more client devices including a first client device and a remaining client devices. Signing to authenticate a challenge to login using a partial key part occurs at the first client device. The challenge is sent to the remaining client devices wherein the remaining client devices that sequentially sign using short range wireless network connection and respond back to the challenge to login without a password.