Patent classifications
G06Q20/4014
Multi-factor authentication utilizing device pairing
Aspects of the present invention disclose a method, computer program product, and system for multi-factor authentication. In response to a request for an action, the method includes one or more processors whether a first authentication credential passes validation. In response to determining that the first authentication credential does pass validation, the method further includes one or more processors determining a second authentication credential, wherein the second authentication credential includes an indication of a wireless connection between a first computing device and a second computing device. The method further includes one or more processors determining whether the second authentication credential passes validation. In response to determining that the second authentication credential passes validation, the method further includes one or more processors allowing execution of the requested response.
System and method for multi-transaction policy orchestration with first and second level derived policies for authentication and authorization
A system and method for authentication policy orchestration may include a user device, a client device, and a server. The server may include a network interface configured to be communicatively coupled to a network. The server may further include a processor configured to obtain, from a client device via the network, a transaction request for a transaction, determine an authorization requirement for the transaction request based, at least in part, on a plurality of authorization policies, individual ones of the plurality of authorization policies being separately configurable by at least one of a relying party and an authorizing party, and complete the transaction based on the authorization requirement having been met.
SYSTEM AND METHOD FOR IDENTITY CHAINING
An identity chaining fraud detection method that allows each current transaction to be linked to other transactions through commonly shared identities. Over a period of time the links create a chain of associated transactions which can be analyzed to determine if identity variances occur, which indicates that fraud is detected. Additionally, if a specific identity is detected as being fraudulent, that identity can be tagged as fraudulent and can be referenced by a plurality of other merchant transaction chains to determine fraud.
ADAPTABLE MESSAGING
Methods, apparatus and systems for operating a payment-enabled mobile device to facilitate a payment transaction with a merchant server. In an embodiment, a mobile device processor of the payment-enabled mobile device receives a payment transaction request from a user, transmits a payment transaction initiation message directly to a merchant server of the merchant, and receives a request message from the merchant server that includes one of a request to provide an Authorization Request Cryptogram (ARQC) or a request to provide user consent information. The user consent information may include cardholder verification results or a request to provide an ARQC. Based on the received request message, the mobile device processor selects a particular mobile payment cardlet to use from a plurality of mobile payment cardlets running in a secure element, generates remote payment data using the particular mobile payment cardlet, and transmits the remote payment data to the merchant server to process the payment transaction.
DYNAMICALLY POPULATED USER INTERFACE FEATURE
Systems, devices and methods that receive data indicative of a description of a product or service available for purchase from a merchant including software instructions that cause the device to perform steps for determining whether a user of the device is recognized by one or more payment processors as having an existing account with each payment processor, and wherein, when the user is identified as having an account with more than one payment processor, the software instructions cause the device to choose a payment processor from the payment processors with whom the user of the device has an account, and wherein the software instructions cause the device to present a payment processor-specific checkout element that identifies the chosen payment processor and to begin the payment process for the product or service with the chosen payment processor upon a user selection of the payment processor-specific checkout element.
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Example embodiments of systems and methods for data transmission between a contactless card, a client application, and a server are provided. The memory of the contactless card may include a first card number table storing a first plurality of card numbers, each card number associated with a user account. A first applet may cycle through the first card number table and transmit each of the first plurality of card numbers to a second applet. In response to detection of one or more gestures by the card, the client application may read one or more of the first plurality of card numbers from the second applet and transmit a verification request associated with the one or more read card numbers to the server, which may compare the one or more read card numbers to a number from a second card number table and transmit a verification determination to authenticate the card.
METHOD FOR DISTRIBUTING COLLECTABLES OWNERSHIP BASED ON BLOCKCHAIN NETWORKS AND ONLINE TRANSACTION SERVER USING THE SAME
A method for distributing collectable ownership based on blockchain networks, including steps of: (a) an online transaction server, in response to acquiring a distribution request for a collectable from an owner, (i) generating an ownership token contract, (ii) generating a contract registering transaction, and (iii) broadcasting the contract registering transaction to a blockchain network, to thereby instruct the blockchain nodes to (iii-1) verify the contract registering transaction, (iii-2) register the ownership token contract, included in the contract registering transaction in the blockchain network, and (iii-3) transfer an ownership token contract ID corresponding to the ownership token contract registered in the blockchain network to the online transaction server.
METHOD OF VERIFYING IDENTITY FOR A COMPUTERIZED ACCOUNT, COMPUTING DEVICE, AND STORAGE MEDIUM
A method of verifying identity for a computerized account, a computing device, and a storage medium are disclosed, the method obtains a username and searches for a verification address corresponding to the username according to a comparison table that records relationships between usernames and verification addresses. The verification address is stored on a blockchain network node, transaction information sent from an account address to the verification address is monitored through the verification address, and the account address is stored on the blockchain network node. If the transaction information sent to the verification address from an account address that matches the username, a prompt indicating that the username is successfully authenticated is sent to a user terminal corresponding to the username. The method enables identity verification in an efficient and a safe manner.
PRODUCT TRANSACTION INFORMATION DISPLAY METHOD AND TRANSACTION PRIVACY PROTECTION SYSTEM BASED ON SMART ACCESSORY
A product transaction information display method and a transaction privacy protection system based on a smart accessory include connecting the smart accessory to obtain a display of transaction information and one-click sending transaction instructions to complete the transaction. The smart accessory stores a user key and personal privacy information, and the encrypted user key and personal privacy information in the smart accessory worn by the user are read to realize a decentralized electronic identity or a decentralized identity (DID) method.
POINT-OF-INTEREST-BASED ANTI-VEHICLE THEFT SYSTEMS AND PROCESSES FOR USING THE SAME
A sensing device can include at least one sensor, positioning circuitry, a transceiver, and a computing device in communication with the at least one sensor, the positioning circuitry, and the transceiver. The computing device can determine a location of a vehicle via the positioning circuitry. The computing device can determine that a point of interest (POI) associated with a predefined category of POIs corresponds to the location. The computing device, via the transceiver, can determine that a person is moving away from the vehicle based on a measurement associated with a remote device. The computing device can enter into an armed mode in response to the determinations. The computing device can detect an intrusion into a vehicle while in the armed mode based at least in part on measurements from the at least one sensor. The computing device can generate an alarm in response to the intrusion.