Patent classifications
G06Q20/4012
Embedded card reader security
Techniques described herein are directed to embedded card reader security. In an example, personal account number data read from a payment instrument may be temporally and/or spatially separated from personal identification number data utilized to complete a payment for products. Temporal separation may include removing the personal account number data from a merchant device prior to request personal identification number data. Spatial separation may include utilization of trusted execution environments, separated embedded card reader applications, intermediary applications, and/or trust routines, for example to enable different components of a merchant device, and/or components of other devices and systems to handle personal account number data and personal identification number data.
Systems and methods for contactless card activation
A method, apparatus, and system of activating and using a contactless card are disclosed. A mobile device includes a wireless chip structured to allow short-range wireless communications (e.g., a near-field communication), a processor, and a memory storing instructions. The mobile device is configured to communicate with a contactless card via a short-range wireless communication and receive a customer-specific uniform resource locator (URL) from the contactless card via a wireless chip. In response, the mobile device is configured to automatically open a web browser and navigate to a website associated with the customer-specific URL. The customer-specific URL identifying the client associated with the contactless card. The mobile device then prompts, via a GUI on the display, a user for authentication information, and based on a verification of the authentication information, display a confirmation page indicating activation of the contactless card.
DYNAMIC ONLINE BANKING HONEYPOT ACCOUNT SYSTEM
A computer-implemented method for processing online banking transactions is disclosed. The computer-implemented method includes identifying a first transaction request utilizing an alternate PIN associated with an alternate account linked to a primary account. The computer-implemented method further includes determining that the first transaction request is invalid based on a PIN policy corresponding to the alternate PIN associated with the alternate account linked to the primary account. The computer-implemented method further includes responsive to determining that the first transaction request is invalid, dynamically altering an allowable transaction limit for the alternate account according to the PIN policy.
Uplink control information transmission methods for carrier aggregation
A method and apparatus for transmitting uplink control information (UCI) for Long Term Evolution-Advanced (LTE-A) using carrier aggregation is disclosed. Methods for UCI transmission in the uplink control channel, uplink shared channel or uplink data channel are disclosed. The methods include transmitting channel quality indicators (CQI), precoding matrix indicators (PMI), rank indicators (RI), hybrid automatic repeat request (HARQ) acknowledgement/non-acknowledgement (ACK/NACK), channel status reports (CQI/PMI/RI), source routing (SR) and sounding reference signals (SRS). In addition, methods for providing flexible configuration in signaling UCI, efficient resource utilization, and support for high volume UCI overhead in LTE-A are disclosed.
Multimode retail system
A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a customer, the high security input to be communicated by the secure input module in cipher text, and the low security input to be communicated by the secure input module in plaintext. The multimode system is adapted to operate in a high security mode and a low security mode. The multimode system is adapted to enter the low security mode upon detection by the multimode system of a security breach condition. In the high security mode, the secure input module accepts low security input and high security input. In the low security mode, the secure input module accepts the low security input and does not accept the high security input.
Methods and systems for acoustic authentication
Systems and methods are disclosed for generating an acoustic authentication data entry interface. One method comprises generating a random sequence of characters and a visual user interface element comprising a plurality sections, each section of the visual user interface element being associated with a respective character of the generated random sequence of characters. A section of the visual user interface elements is displayed to a user. Concurrently, an audio recording of a character associated with the displayed section is played to the user. Based on determining user selection of the displayed section, the character associated with the displayed section is logged as part of an authentication data. When all of the characters constituting the authentication data are logged, an electronic transaction authorization request is sent to an acquirer processor.
SECURE PAYMENT SYSTEMS AND METHODS
A method may comprise: receiving, via a secure payment system, transaction information associated with a real estate transaction, the transaction information including an escrow account, a buyer name, and a buyer contact, the escrow account configured to receive a good funds payment for an earnest money deposit or a closing payment; receiving, via the secure payment system, a first request to transfer the good funds payment from a user account of a user to the escrow account; querying, via the secure payment system, information associated with the user account; generating, via the secure payment system, a second request for payment to a financial institution of the user account; receiving, via the secure payment system, a notification that the second request for payment was approved by the user; and in response to receiving the notification, transferring the good funds payment from the user account of the user to a secure payment account of the secure payment system.
Wireless devices for storing a financial account card and methods for storing card data in a wireless device
A non-transitory computer-readable medium stores instructions causing a processor to generate a menu displaying representations of a plurality of cards, the cards having associated card data; receive, from a user input device, a selection corresponding to a selected one of the cards; update the menu to display a representation of the selection; and authorize transmission of the card data associated with the selected card to complete a transaction.
Zero-knowledge proof-based virtual cards
Disclosed are various embodiments for issuing virtual cards to client devices. Also disclosed are embodiments for provisioning a transaction terminal to process transactions with virtual cards. A zero-knowledge proof algorithm can be utilized to validate the transactions. A virtual card can be based upon a public key of a client device that is managed by a hardware security module.
METHOD AND SYSTEM FOR PIN LOGIN AUTHENTICATION
A method and system is described for authenticating computer users using full login authentication to initialize a work session and then using an authentication by a PIN value when access is required in a fast moving workplace context.