Patent classifications
G06Q20/4012
Systems and methods for processing purchase transactions using a mobile device
Systems and methods are provided for enabling an ecommerce purchase transaction on a mobile device without requiring a user to enter payment card information during each transaction. A payment card token may be generated by the mobile payment application in response to receiving payment card information associated with a payment card. A unique user code associated with the payment card token may be generated. A payment card token may be communicated via a magnetic stripe reader communicatively coupled to the mobile device. The ecommerce purchase transaction may be completed by sending the payment card token from the mobile device to an online merchant upon entering the requisite unique user code.
PINpad with integrated camera/scanner and independent security processing
A peripheral PINpad is connected to a host terminal. The PINpad includes an integrated camera/scanner, a secure processor, secure storage, and a network interface. The PINpad is configured to process in an independent mode of operation and a host-dependent mode of operation. Images captured by the integrated camera/scanner are decoded on the PINpad. The decoded image information, depending on a processing context, is not provided to and is not available to the host terminal. The PINpad is further configured to perform network interactions with external servers independent of the host terminal.
SYSTEMS AND METHODS FOR CLOUD BASED MESSAGING BETWEEN ELECTRONIC DATABASE INFRASTRUCTURE
A method of cloud based messaging includes receiving a message and a message topic from a message sender, storing the message topic and the message on a message queue, retrieving the message from the message queue, translating the message from a message bus protocol to a recipient protocol and transmitting the translated message to a message recipient.
KEYPAD DULCET AUTHENTICATION CARDLESS PAYMENT TECHNOLOGY
Architecture and methods may be provided to enable a user to authenticate and complete a cardless transaction at a point-of-sale (“POS”) device. The POS device may include a keypad configured to receive a sequence of keypresses. The POS device may also include a processor configured to record the sequence of keypresses and tag each keypress with a time-stamp. The POS device may include a keypress controller configured to determine from the sequence of keypresses, a number of keypresses, a frequency of each keypress and a time-delay between each keypresss. The sequence of keypresses may be transmitted to a secure transaction network and, using a machine-learning pattern identifier, be configured to identify a pattern to the sequence of keypresses based off of the determined number of keypresses, the frequency and time-delay and then further verify that the pattern matches to a stored pattern to authenticate the cardless transaction.
SMART CARD PROVIDING SELECTABLE PAYMENT OPTIONS
Typically, online transactions, such as online purchases of products or services require entering sensitive transaction information into a third-party web browser or application. This may expose sensitive transaction information to an increased risk of inadvertent disclosure. Apparatus and methods are provided for a smart card which enables users to securely complete online transactions without entering any sensitive transaction information into a third-party system. The smart card may include a microprocessor and wireless interface. The wireless interface may provide wireless communication capabilities and the ability to initiate online payments based on information captured by the touch-sensitive screen. The wireless interface will receive communications from a merchant or issuer bank requesting payment. The microprocessor may be configured to offer multiple selectable payment options to the user.
Apparatus for authentication and payment based on web, method for authentication and payment based on web, system for authentication and payment based on web and non-transitory computer readable storage medium having computer program recorded thereon
The present invention provides that a credit card authentication value is divided into meaningless information block 1 and information block 2, the information block 1 can be transmitted to a user authentication device that is physically insulated, and the user authentication device that encodes the information block 1 on the basis of payment PIN information received from user equipment and keeps the encoded information block 1, and decodes the encoded information block 1 on the basis of the payment PIN information and transmits the information block 1 to the credit card permission request device, when there is a request from the credit card permission request device, thereby determining whether there is forgery in payment on a web. Accordingly, security in payment can be improved.
SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS PROVIDING AN IDENTITY-STORING BROWSER
A method includes: communicating data from a browser, operating on a computing device, to an electronic shopping cart during a transaction; receiving user-authenticating data from a user interface of the computing device; decrypting secure user data stored to the computing device; authenticating a user based on the user-authenticating data and the decrypted secure user data; in response to authenticating the user, transmitting an indication of payment from the browser to the electronic shopping cart; processing the transaction after transmitting the indication of payment; and recording the transaction in a blockchain stored on the computing device.
Validation Service For Account Verification
A method and system for authorizing a secure transaction using a portable device is disclosed. The method includes an authorization process performed in real-time that includes two phases: an authentication phase and a transaction processing phase. In the authentication phase, a resource provider system may receive a cryptogram from a portable device and verify the cryptogram. Upon the resource provider system obtaining an authentication response indicator, the transaction processing phase may include the resource provider system generating and transmitting an authorization request message to a processing computer. The resource provider system may then receive an authorization response message from the processing computer including an authorization response indicator, which completes the authorization process.
Hardware Device for entering a PIN via Tapping on a Touch Screen Display
A device and associated methods for entering a PIN via tapping are disclosed. The device can be configured to determine a number of taps provided by a PIN holder on a touch sensor in representation of a PIN digit and to store the number of taps as a digit in a sequence that represents the PIN. Indications for interaction with the device can be provided to PIN holders in the form of auditory cues. A visually impaired PIN holder may be able to complete a PIN entry process by following the indications for interaction, tapping on a touch sensor a number of times equal to the value of the digit of the PIN to be entered, and performing gestures mapped to commands for the device.
Authentication method and system
The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone. The user's operation of the keypad key via the image generates an encoded version of the user's intended input. In one sense the invention can be perceived as superimposing a non-functional image of a scrambled keyboard over an underlying, functional keypad. The image may be any type of electronic image, and may include a video image. The invention is particularly suited for use with, but not limited to, mobile phones, tablet computer, PCs etc. It can be implemented in any system wherein a user's identity must be verified before access is granted to a controlled resource.