G06Q20/4012

METHOD AND SYSTEM FOR MULTI-MODAL TRANSACTION AUTHENTICATION
20220012740 · 2022-01-13 ·

This invention relates to systems and methods for authenticating transactions using a mobile device based primarily on the introduction of a layer of middleware and wherein the Payment Networks, Merchants, Issuing Banks, Credit Reporting Bureaus, Insurance Companies, Healthcare Providers may customize the implementation of the services based on individual strategy and consumer preferences.

BLOCKCHAIN ARCHITECTURE, SYSTEM, METHOD AND DEVICE INCLUDING A HYBRID PUBLIC-PRIVATE ITERATION FOR FACILITATING SECURE DATA COLLECTION AND CONTROLLED DISTRIBUTION USING A DECENTRALIZED TRANSACTION INFORMATION PLATFORM AND TOKEN ECOSYSTEM
20220012731 · 2022-01-13 ·

A distributed transaction and data storage platform including a distributed notary ledger or blockchain and one or more individual user micro-identifier chains that together enable the secure effectuation and recordation of one or more transactions, and/or storage of data in an automated, real-time, zero-trust, globally data law and privacy law centric manner while maintaining transaction party confidentiality and preventing chain poisoning.

Identity authentication, number saving and sending, and number binding method, apparatus and device
11177956 · 2021-11-16 · ·

Disclosed are an identity authentication, number saving and sending, and number binding method, apparatus and device. The identity authentication method comprises: receiving a user identity authentication request sent by a data authentication platform client, wherein the user identity authentication request comprises user authentication information and user identification information, and a data authentication platform server pre-stores the user authentication information and a registration number and a password, which correspond to the user identification information; acquiring, according to the user identification information, the user authentication information pre-stored in the data authentication platform server; matching the user authentication information in the acquired user identity authentication request with the acquired user authentication information pre-stored in the data authentication platform server; when the matching is successful, receiving a result, sent by the data authentication platform client, of confirming the acquisition of the registration number by a user.

BIOMETRIC GENERATE OF A ONE-TIME PASSWORD ("OTP") ON A SMARTWATCH

One-time password (“OTP”) generation on a smartwatch is provided. OTP generation may include communication between an application on a smartwatch and an application on a smartphone. The request for an OTP may be received at the smartwatch. A biometric identifier may also be received at the smartwatch. The smartwatch application may communicate with the smartphone application. An OTP may be generated within a third-party library within the smartphone application. The generated OTP may be transmitted from the smartphone application to the smartwatch application. The OTP may be displayed on the smartwatch.

Apparatus and method to perform point of sale transactions using near-field communication (NFC) and biometric authentication
11222330 · 2022-01-11 · ·

An apparatus and method to conduct financial and other transactions using a wireless computing device. The wireless device includes an input display part, one or more processors, and at least one memory device. The memory device has stored therein a wallet application for completing transactions based on wireless data communications between the computing device and an external electronic device. The memory device further stores at least one electronic credential. The wireless device permits transmission, via a near-field communication (NFC) module, of at least one electronic credential to an NFC reader of the external electronic device based on comparing a biometric characteristic of a user, detected by a biometric characteristic reader, with stored biometric information.

Computerized authorization system and method
11223610 · 2022-01-11 · ·

A computerized authorization system configured to authorize electronically-made requests to an electronic entity. The computerized authorization system comprises a store configured to store an indication of at least one predetermined electronic authorization device configured to authorize each electronically-made request. The computerized authorization system is further configured such that: in response to receiving an electronically-made request to the electronic entity, an indication of the request is output to the at least one predetermined electronic authorization device configured to authorize the request as indicated in the store; and in response to receiving an indication of authorization from the at least one predetermined electronic authorization device, an indication of authorization of the request is output to the electronic entity.

Voice recognition to authenticate a mobile payment

Systems and methods are provided for authenticating mobile payments from a customer account to a merchant. The systems and methods may include a financial service provider receiving a request to authorize an electronic transaction at a point-of-sale. A financial service provider server computer may verify that the customer is present at the point-of-sale using received location data. An image having distorted text such as a captcha may be transmitted to a device at the point-of-sale, and the customer may read the captcha aloud. A voice sample of the customer may be sent to the financial service provider for comparison to stored voice recordings, to verify that the customer's voice sample is authentic if the voice matches a previously generated voice recording for the account. If the voice sample is authentic, the financial service provider may authorize the mobile payment.

Network provisioning and tokenization using a remote terminal

A method of tokenizing sensitive data from a terminal device includes receiving, a connection request comprising a hardware serial number associated with a terminal device and validating the hardware serial number associated with the terminal device. The method includes sending a command to a terminal device that causes the terminal device to display a prompt for sensitive data associated with a user interacting with the terminal device and receiving an encrypted data packet from the terminal device. The encrypted data packet includes the sensitive data. The method includes sending the encrypted data packet to a gateway system for tokenization, receiving a token that represents the sensitive data, and providing the token to the terminal device.

User interfaces for peer-to-peer transfers

The present disclosure generally relates to user interfaces for managing peer-to-peer transfers. In some examples, a device provides user interfaces for initiating and managing transfers. In some examples, a device provides user interfaces corresponding to completed transfers. In some examples, a device provides user interfaces for providing visually distinguishable message object appearances based on message designation. In some examples, a device provides user interfaces for activating accounts for accepting and sending transfers. In some examples, a device provides user interfaces for exchanging accounts for use in a transfer. In some examples, a device provides user interfaces for splitting transfers between two or more accounts. In some examples, a device provides user interfaces for generating and displaying a transfers history list. In some examples, a device provides user interfaces for voice-activation of transfers. In some examples, a device provides visual or haptic feedback corresponding to a transfer operation.

Systems and methods for simulation-based replay of integrated devices
11221930 · 2022-01-11 · ·

A method of simulating device state changes in an integrated system includes receiving a transaction request from a client device, storing the transaction request as a first event in an event log, transmitting the transaction request to a terminal device, storing the transmission of the transaction request as a second event in the event log, receiving a device response from the terminal device, storing the device response as a third event in the event log, and when the integrated system is under test, a simulator replays the stored events in the integrated system under test.