G06Q20/4012

System and method for mobile pin synchronization

The present invention relates to a method and system for synchronizing a personal identification number (PIN) value stored in a mobile computing device, with a PIN value stored on a remote server. The remote server receives a request from the mobile computing device to record a PIN value, the request comprising the PIN value. The PIN value is recovered from the received request and stored at the remote server. An instruction set arranged to record the PIN value in a secure hardware element comprised within the mobile computing device is generated and transmitted to the mobile computing device. The instruction set executes on the mobile computing device in order to record the PIN value on the secure hardware element.

Merchant managed method and system for text-to-pay subscriptions at a billing server

A subscription identifier is communicated between the billing server and subscription server. The billing server receives a subscription identifier text message from the user device. The billing server identifies a carrier server from the subscription identifier text message. The billing server receives an authorization text message from the user device in response to an authorization request text message and charges an account of the carrier server that has been identified. If the charge has been successful, then the billing server transmits a renewal notification text message to the subscription server. The subscription server updates an account having the subscription identifier to reflect a new expiration.

Method and system for utilizing blockchain and telecom network for two factor authentication and enhancing security

A method for conveying a one-time password using blockchain includes: receiving proposed transaction data from a merchant system including payment credentials, receiving account details, and a transaction amount; identifying user account data associated with the payment credentials including an account identifier; identifying a one-time password; transmitting the one-time password and account identifier to a third party system; receiving a data identification value from an external computing device; identifying a blockchain data value included in a blockchain including a password value based on the received data identification value; validating, the identified one-time password based on the password value; and initiating payment of the transaction amount from a first transaction account associated with the payment credentials to a second transaction account associated with the receiving account details upon validation of the identified one-time password.

Mobile device management

A device may receive information associated with a particular entity and trigger, based on the information, a status for the particular entity. The device may transmit, based on triggering the status, a list of a plurality of mobile devices and may receive an identified set of mobile devices from the list of the plurality of mobile devices. The device may further receive, from a selected mobile device, a request to perform an action and receive a string of characters from the selected mobile device. The device may further transmit, based on receiving the string of characters, an instruction command to the selected mobile device when the string of characters matches a verification string of characters.

Methods and systems for detecting suspicious or non-suspicious activities involving a mobile device use

Systems and methods are disclosed for detecting a suspicious and/or a non-suspicious activity during an electronic transaction performed by a user device. One method comprises identifying, by a monitoring and detection component, a starting check point in the electronic transaction. The monitoring and detection component may then receive contextual data from one or more sensors of the user device. Based on the contextual data and a machine learning model, the monitoring and detection component may determine whether an expected behavior occurred. Entry of user credentials may be enabled in response to determining that the expected behavior occurred, whereas the electronic transaction may be terminated in response to determining that the expected behavior did not occur.

Mobile wallet artificial intelligence card underwriting
11669828 · 2023-06-06 · ·

A mobile wallet computing system associated with a mobile wallet database includes a mobile wallet circuit structured to present a mobile wallet interface a mobile wallet user. The mobile wallet interface includes a first portion that includes a graphical depiction of a user payment vehicle associated with a financial institution, the first portion including a first interaction point that enables the user to initiate a sequence to engage in a mobile wallet transaction using the mobile wallet. The interface also includes a second portion that includes a second interaction point and a third interaction point, the second interaction point enabling the user to access a functionality enabling the user to indicate a transaction preference for a transaction with an entity other than the mobile wallet provider or financial institution, the third interaction point enabling the user to indicate a preference to initiate communications with the financial institution.

WEARABLE PERSONAL DIGITAL DEVICE FOR FACILITATING MOBILE DEVICE PAYMENTS AND PERSONAL USE
20170293740 · 2017-10-12 ·

Provided are a wearable personal digital device and related methods. The wearable personal digital device may comprise a processor, a display, biometric sensors, activity tracking sensors, a memory unit, a communication circuit, a housing, an input unit, a projector, a timepiece unit, a haptic touch control actuator, and a band. The processor may be operable to receive data from an external device, provide a notification to a user based on the data, receive a user input, and perform a command selected based on the user input. The communication circuit may be communicatively coupled to the processor and operable to connect to a wireless network and communicate with the external device. The housing may be adapted to enclose the components of the wearable personal digital device. The band may be adapted to attach to the housing and secure the wearable personal digital device on a user body.

Biometric generate of a one-time password (“OTP”) on a smartwatch

One-time password (“OTP”) generation on a smartwatch is provided. OTP generation may include communication between an application on a smartwatch and an application on a smartphone. The request for an OTP may be received at the smartwatch. A biometric identifier may also be received at the smartwatch. The smartwatch application may communicate with the smartphone application. An OTP may be generated within a third-party library within the smartphone application. The generated OTP may be transmitted from the smartphone application to the smartwatch application. The OTP may be displayed on the smartwatch.

Fraud deterrence for secure transactions
11257080 · 2022-02-22 ·

An illustrative fraud deterrent method includes presenting an identity verification option for a first website displayed in a web-browser, the option including offering a login to a third-party website, unrelated to the first website. The method further includes receiving login information for a first user account on the third-party website and verifying the login information through a verification service associated with the third-party website, to verify that the login information is valid for the first user account, identified by the login information. The method additionally includes verifying an identity at the first website, responsive to the verification.

Sharing output device between unsecured processor and secured processor

A point of sale (POS) device includes an output device such as a speaker, a display screen, or a network interface. The POS device also includes a secure enclosure housing a secure processor and tamper detection circuitry for detecting attempts to tamper with the secure enclosure. Use of the output device is shared between the secure processor and a main processor via a switch that is controlled by the secure processor. The secure processor can switch control of the output device from the main processor to itself and can output an output dataset via the output device in a number of scenarios. These scenarios include the secure processor detecting an attempt to tamper with the secure enclosure, the secure processor recognizing that the main processor is behaving suspiciously, or the secure processor wanting to output sensitive information. The output dataset may include visual data, audio data, or network data.