Patent classifications
G06Q20/4012
AUTHENTICATION METHOD AND SYSTEM
The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone. The user's operation of the keypad key via the image generates an encoded version of the user's intended input. In one sense the invention can be perceived as superimposing a non-functional image of a scrambled keyboard over an underlying, functional keypad. The image may be any type of electronic image, and may include a video image. The invention is particularly suited for use with, but not limited to, mobile phones, tablet computer, PCs etc. It can be implemented in any system wherein a user's identity must be verified before access is granted to a controlled resource.
DATA PROTECTION WITH TRANSLATION
Systems and methods are disclosed in which data associated with a transaction are protected with encryption. At an access device, a PIN associated with a payment account may be encrypted with a first key derived from an initial key of the access device and sensitive data associated with the payment account may be encrypted with a second key derived from the initial key. At a secure module associated with a host server encrypted sensitive data of an authorization request message may be decrypted. The secure module associated with the host server can re-encrypt the sensitive data using a zone encryption key associated with a payment processing network. A translated authorization request message including the re-encrypted sensitive data can be transmitted by the merchant server to the payment processing network.
Virtual assistant host platform configured for interactive voice response simulation
Aspects of the disclosure relate to using machine learning to simulate an interactive voice response system. A computing platform may establish a virtual assistant session with a mobile banking application executing on a mobile device, which may include authenticating at least one authentication credential associated with an online banking account. The computing platform may receive an assistance message from the mobile device requesting assistance. Using a machine learning model, the computing platform may identify an intent of the assistance message. The computing platform may generate a response message based on the intent of the assistance message. The computing platform may send the response message and one or more commands directing the mobile device to output an audio response file based on the response message to the mobile device, which may cause the mobile device to convert the response message into the audio response file and output the audio response file.
ATM third party products and services
A provider computer system can receive a request for payment of a bill issued by a third party biller. The provider computer system can generate a passcode. Generating the passcode can include transforming data into the passcode. The provider computer system can transmit the passcode. A transaction machine can provide a user interface to receive the passcode. The transaction machine can receive the passcode via the user interface. The transaction machine can transmit a passcode verification request to the provider computer system. The transaction machine can receive a passcode verification message from the provider computer system. The transaction machine can display, responsive to receiving the passcode verification message, payment information associated with the payment of the bill. The transaction machine can receive a payment associated with the bill. The transaction machine can transmit a payment notification to the provider computer system.
METHODS AND SYSTEMS FOR DUAL-TO-SINGLE MESSAGE CONVERSION IN ELECTRONIC TRANSACTIONS
Systems and methods are disclosed for electronic transaction messaging conversion. One method comprises receiving an authorization request message from a point of sale (POS) device, the authorization request message comprising transaction data associated with a transaction. Upon validating the authorization request message, a provisional authorization response message may be generated and sent to the POS device. Subsequently, a capture message may be received from the POS device, requesting clearing and settlement of the transaction. The capture message may be validated and translated to a composite message that is single-message system (SMS)-compatible. The composite message may then be sent downstream for further processing.
OFFLINE COIN PROTOCOL
Systems, methods, apparatus, computer program code and means are provided to operate a first device to receive a coin having value from a second device while offline.
EXTRA SECURITY ELEMENT ON CARDS TO PROTECT AGAINST FRAUD
Authenticating a secure element payment card includes transmitting a cold reset signal to the payment card and receiving an answer-to-reset message therefrom. The answer-to-reset message includes governing rules for performing a transaction, including a rule indicating that a secure data element is to be used to authenticate the payment card. The process also includes receiving payment account details for a payment account associated with the payment card. A payment authorization request message is transmitted to an interchange network and a card authentication request message is then received from the interchange network. The card authentication request message includes an encrypted instruction, which is transmitted to the secure element payment card. The secure data element is received from the payment card and a card authentication request response message is then transmitted to the interchange network. A payment authorization request response message is then received from the interchange network.
Method and system for secure authentication of user and mobile device without secure elements
A method for generating payment credentials in a payment transaction includes: storing, in a memory, at least a single use key associated with a transaction account; receiving, by a receiving device, a personal identification number; identifying, by a processing device, a first session key; generating, by the processing device, a second session key based on at least the stored single use key and the received personal identification number; generating, by the processing device, a first application cryptogram based on at least the first session key; generating, by the processing device, a second application cryptogram based on at least the second session key; and transmitting, by a transmitting device, at least the first application cryptogram and second application cryptogram for use in a payment transaction.
SYSTEMS AND METHODS FOR CONTACTLESS CARD ACTIVATION
A mobile device includes a wireless chip, a display, a processor, and a memory storing instructions that, when executed by the processor, cause the processor to perform operations. The operations include: based on a first short-range wireless communication, receiving a customer-specific uniform resource locator (URL) from the contactless card via a wireless chip; automatically navigating to a website associated with the customer-specific URL; receiving authentication information and automatically populating one or more fields on a graphical user interface (GUI); displaying, by the display, an indication of activation of the contactless card; receiving and accepting a prompt to register the mobile device with the activated contactless card; and based on at least a second short range wireless communication between the registered mobile device and the contactless card, providing a second GUI including an online login portal for accessing an account that is associated with the contactless card.
Device and method for identifying a user
A device and method for identifying a user. The device including a terminal including a touch screen with a set of embossments superimposed on a virtual keyboard and displaying information related to a transaction, a contact and/or contactless smart card reader device, a processor and a memory containing a set of modules and/or algorithms to implement the method including activation of a low vision mode by a double-tap gesture on the screen, the searching for the center of a virtual keyboard where an embossment is located, determination of the positions of the other keys from the central key, choice and storage of a desired key by lifting the finger from the touch screen at the position of the desired key, validation of the choice of key made by a double-tap gesture on the touch screen or validation of the code/PIN by a double-tap gesture on the touch screen.