Patent classifications
G06Q20/4012
METHODS AND SYSTEMS FOR SECURE AUTHENTICATION IN A VIRTUAL OR AUGMENTED REALITY ENVIRONMENT
A method of generating a virtual reality payment authentication entry interface includes receiving, over a computer network, a request for payment authorization; identifying a virtual reality interface; generating a plurality of payment authentication characters in the virtual reality interface; receiving user input associated with at least one character of the plurality of payment authentication characters in the virtual reality interface; and generating a payment authorization response to the request for payment authorization based on the received user input.
METHODS AND SYSTEMS FOR SECURE AUTHENTICATION IN A VIRTUAL OR AUGMENTED REALITY ENVIRONMENT USING AN INTERACTIVE ICON
Methods and systems are disclosed for providing secure authentication in a virtual or augmented reality environment using an interactive icon. One method comprises: receiving, over a computer network, a request for payment authorization; identifying, based on the request for payment authorization, a virtual reality interface; generating an icon in the virtual reality interface, the icon having a randomized display of authentication characters; receiving user input associated with at least one character of the of payment authentication characters in the virtual reality interface; and generating a payment authorization response to the request for payment authorization based on the received user input.
Systems and methods for authentication code entry using mobile electronic devices
Systems and methods for authentication code entry using mobile electronic devices are disclosed. In one embodiment, in an information processing device comprising at least one computer processor, a display, and an input device a method for authentication code entry may include: (1) receiving, at the information processing device, a masking pattern for receiving entry of an authentication code, the masking pattern specifying an order for entering the authentication code; (2) presenting, on the display, a prompt to enter the authentication code in accordance with the masking pattern; (3) receiving, at the input device, a masked authentication code entry where the masked authentication code entry comprises the authentication code entered in accordance with the masking pattern; and (4) storing the masked authentication code entry.
PERSONAL SECURITY MONITORING
Computer-implemented services provide personal security monitoring and/or oversight of interactions between parties that may be initiated online, and in some circumstances extended to real-world in-person interactions. Profiles associated with individuals involved in a transaction may be developed and centrally managed. Profiles may contain, e.g., information concerning a user's identity, historical and/or current location information, user communication information, and the like. Profile information may be used by a central security oversight platform and/or provided to third party systems for, e.g., assessing risks involved in a particular interaction, providing accountability amongst users, and assisting law enforcement or third parties in transaction intercession and/or investigation in the event that an interaction results in negative consequences.
SELF-CENTERING USER INTERFACE FOR INPUTTING INFORMATION
Techniques described herein are directed to, among other things, utilizing a self-centering user interface to receive information associated with a transaction. For instance, a computing device may receive a first input at a first location of a display. The computing device may then determine a positioning for the user interface, where the user interface may be substantially centered about the first location. In some instances, the computing device may display the user interface using the positioning. The computing device may then receive a second input corresponding to swipe from the first location of the display to a second location of the display. The computing device may then determine a symbol included in the user interface based at least in part on the second input. In some instances, the user interface includes a keypad for entering a personal identification number associated with a payment instrument.
Method and system for remote transaction processing using a non-browser based application
A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.
Systems and methods for e-certificate exchange and validation
Systems and methods described herein include first and second devices including one or more processors and memory, the first device being configured to purchase one or more certificates by a first process via one or more blockchain transactions. The second device may be in communication with the first device, and may be redeem the one or more certificates received by a second process via one or more blockchain transactions. The second device may exchange one or more codes to designate the one or more certificates as used on the first device. The system may include one or more servers in communication with the second device, and may be automatically generate a message containing updated redemption information of the one or more certificates when the updated redemption information has been stored in one or more databases, which may be in communication with the one or more servers.
Methods and systems for autonomous dispensing of products
Systems and methods for autonomously dispensing items. A dispensing system receives a first distributed ledger transaction that: i) identifies an item, ii) identifies a container associated with and containing the item, iii) includes a status indicator in a first state identifying the item as present in the container, and iv) includes an authorization code associated with a mobile device. The authorization code is received from the mobile device. The dispensing system creates a second distributed ledger transaction based on the first distributed ledger transaction that changes the status indicator to a second state identifying the item as authorized for dispensing. Responsive to the creation of the second distributed ledger transaction, access is autonomously provided to the item. The dispensing system creates a third distributed ledger transaction based on the second distributed ledger transaction that changes the status indicator to a third state identifying the item as dispensed.
Data processing method, apparatus, and system
A data processing method, apparatus and system, for improving the security and accuracy in the data processing process. The method comprises: receiving target biometric information and verification password information of a target object sent by an acquisition institution server; recognizing, from registered biometric information of a plurality of objects, the registered biometric information matching the target biometric information; determining target account information of the target object according to the recognized registered biometric information; and sending a data processing request to a card issuing institution server corresponding to the target account information, the data processing request comprising the target account information and the verification password information, so that the card issuing institution server performs verification using the verification password information and performs data processing according to the target account information after the verification is passed.
System, method, and computer program product for linking accounts across systems
Provided are computer-implemented methods for linking accounts across systems which may include receiving an authorization request message including transaction data associated with a payment transaction and a primary account number (PAN); identifying a token corresponding to the PAN; transmitting a request message comprising at least a portion of the transaction data associated with the payment transaction and the token to at least one employer system, wherein the at least one employer system is associated with at least one employer institution; and receiving, from the at least one employer system, at least one response message comprising transaction adjustment data associated with an adjustment to the payment transaction. Methods may also include adjusting at least one parameter of the payment transaction based at least partially on the transaction adjustment data. Systems and computer program products are also provided.