Patent classifications
G06Q20/4012
System and method to protect privacy of personal-identification-number entry on consumer mobile device and computing apparatus
A system for accepting the input of a PIN comprises a first device receiving a randomized PIN layout derived on a fourth device. The randomized PIN layout is displayed on a display of the first device. A second device comprises an input for accepting a series of key presses to produce a PIN token. The PIN token indicating each of the series of key presses. A third device is in communication with the second device. The third device derives the randomized PIN layout and receives the PIN token from the second device without the PIN token being present on the first device. The third device combines the PIN layout and the PIN token to produce a PIN. The PIN is used to authenticate a transaction. The fourth and third devices each store a shared secret used to independently derive the randomized PIN layout on the fourth and third devices.
ADAPTIVE AUTHENTICATION
Systems and techniques for an adaptive authentication system are described herein. In an example, an adaptive authentication system is adapted to receive a request at a first entity from a second entity for secure data of a user, where the second entity is remote from the first entity. The adaptive authentication system may be further adapted to transmit a prompt to a user device associated with the user for authentication of the user and authentication of the request. The adaptive authentication system may be further adapted to receive a response to the prompt and authenticate the user and the request based on the response. The adaptive authentication system may be further adapted to transmit the secure data of the user to the second entity.
Method, system, and computer program product for network bound proxy re-encryption and PIN translation
A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (g.sup.a), the second value (g.sup.a) generated based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (m.sub.i) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (m.sub.i); generate, with the payment network, a public key (pk.sub.i) based on the second value (g.sup.a), the merchant product (M), and the random merchant number (m.sub.i) and a random key (rk.sub.i) based on the merchant product (M) and the random merchant number (m.sub.i) for each respective merchant bank; and communicate, with the payment network, the public key (pk.sub.i) and the random key (rk.sub.i) to at least one respective merchant bank.
FINANCIAL TRANSACTION SYSTEM AND METHOD
A financial transaction method can include creating a token correlated to a financial account. The method can also include storing the correlation between the token and the financial account in a token database. The method can also include transmitting the token to a mobile computing device operating an application. The method can also include displaying the token on a display of the mobile computing device. The method can also include receiving, over a public network, the token and data associated with a first financial transaction. The method can also include confirming identity between the token transmitted to the mobile computing device and the token received from the secondary computing device. The method can also include transmitting over the public network, approval of the first financial transaction to the secondary computing device in response to the confirming.
Systems and methods for conducting person to person transactions using reward points
Systems and methods for conducting person to person (P2P) transactions using points are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for person-to-person reward points gifting may include: (1) receiving, from a bank customer, a request to issue a reward points gift to a gift recipient, the request identifying gift recipient contact information for the gift recipient and a reward points amount; (2) sending a notification to the gift recipient contact information for the gift recipient to log in a gift recipient account to redeem the reward points gift; and (3) transferring the reward points amount to a gift recipient reward points account.
Keypad dulcet authentication cardless payment technology
Architecture and methods may be provided to enable a user to authenticate and complete a cardless transaction at a point-of-sale (“POS”) device. The POS device may include a keypad configured to receive a sequence of keypresses. The POS device may also include a processor configured to record the sequence of keypresses and tag each keypress with a time-stamp. The POS device may include a keypress controller configured to determine from the sequence of keypresses, a number of keypresses, a frequency of each keypress and a time-delay between each keypresss. The sequence of keypresses may be transmitted to a secure transaction network and, using a machine-learning pattern identifier, be configured to identify a pattern to the sequence of keypresses based off of the determined number of keypresses, the frequency and time-delay and then further verify that the pattern matches to a stored pattern to authenticate the cardless transaction.
SMART CARD
Implementations of a smart card comprising a single smart card for multiple uses which has a number of separate areas that are accessed by one code are provided.
MOBILE SALES DEVICE AND MOBILE SALES SYSTEM
According to one embodiment, a mobile sales device has a storage unit configured to hold items to be sold, a driving unit configured to move the storage unit from location to location, a communication interface configured to connect to a server device, and a processor. The processor is configured to acquire position information indicating a call position designated by a call requesting user from the server device, control the driving unit based on the position information, acquire authentication information from a user at the call position to determine whether the user at the call position is the call requesting user, and permit execution of sales processing relating to items in the storage unit only if the acquired authentication information indicates that the user at the call position is the call requesting user.
Procuring and presenting deposit transaction details
Some implementations can include an application to procure and present transaction details. In some implementations, the application is a software application that presents a user interface comprising transaction details corresponding to a user's transaction. In some implementations, the application provides an option to a user to choose to receive details of a transaction. In some implementations, the user can choose to receive details of the transaction by selecting an option. In some implementations, upon the user selecting the option, the application requests the user to provide access credentials to access an account associated with the user from which details of the transaction can be retrieved. In some implementations, upon the user providing the user access credentials, the application accesses the account associated with the user to retrieve the details of the transaction and then presents the retrieved details of the transaction to the user for review.
Trust-based application to application connectivity
The innovation discloses systems, methods and computer program products that reduce complexity and associated measures that are taken to ensure trust in secured transactions as necessitated by requirements present only in an ecommerce environment that do not have a parallel with traditional bricks and mortar commercial transactions. The innovation enables a multitude of mobile wallet applications to engage and obtain services from ecommerce applications wherein backend processing by a mobile wallet server obtains and delivers funds to ecommerce applications without sharing a subset of sensitive data, associated with a mobile wallet application user for the secured transactions. The innovation further provides for a wallet network to be initiated and engaged in which the secured transactions can take place, adopting and adapting social network application connectivity.