Patent classifications
G06Q20/4014
Method for generating an access code to an event
A computer-implemented method is provided for generating an access code to an event, comprising: a user obtaining an access right to the event from an access provider; the user authenticating themselves to the access provider using a legal form of identification comprising one or more biometric identifiers and the user generating an access code using a mobile device wherein the user provides biometric data and if approved, the access code is generated as a combination of the access right to the event, the user and the mobile device. By using these three data inputs, a substantially unique access code is generated. Complicated authentication, such as facial recognition at an entrance to the event, is no longer required, as it has already been performed before approaching the access code reader.
SECURE RESOURCE MANAGEMENT TO PREVENT FRAUDULENT RESOURCE ACCESS
Systems and methods for secure resource management are provided. A secure resource management system includes a resource record repository, such as a secure database or a blockchain, for storing resource records for resources. The resource records contain information of resource providers, information of resource users having a right to obtain resources, and resource transaction histories. Responsive to a request to verify an authorized user of a resource, the secure resource management system further queries the resource record repository, retrieves the resource record, determines the resource user currently having a right to obtain the resource as the authorized user of the resource, and transmits the verification result in response to the request. The verification result identifies the authorized user of the resource and can be used to grant access to the resource by the authorized user.
Methods and systems for authorizing a real-time transaction with a third party platform
Systems and methods for authorizing a real-time transaction with a third party platform (TPP). The system includes a memory that stores instructions for authorizing the real-time transaction with the TPP. The system also includes a processor configured to execute the instructions. The instructions cause the processor to: generate a tokenized personal identification number (PIN) based on a request to register with the TPP, the request including a customer PIN and an authorization token; transmit the tokenized PIN and the authorization token to the TPP, wherein the TPP stores the tokenized PIN and the authorization token; in response to receipt, at the TPP, of a request for the real-time transaction from a customer, receive the tokenized PIN from the TPP; decrypt the tokenized PIN to extract the customer PIN; and transmit instructions including the customer PIN to a service provider, the instructions comprising a command to provide access to a vehicle.
Computer system and computer-implemented method for processing an electronic commerce transaction using a network
A payment network server for processing an electronic commerce (e-commerce) transaction initiated by a customer is described. The server comprises at least a computer processor and a data storage device, where the data storage device comprises instructions operative by the processor to: (i) receive, from a merchant server, an authentication request, the authentication request comprising at least a payment card identifier associated with a payment card; (ii) generate an authentication code associated with the e-commerce transaction for authenticating the customer; (iii) store, in a payment network database, the authentication code as a stored authentication code; (iv) transmit, the authentication code for transmission to the customer and an indication of the payment card to an issuer server; (v) receive, from the merchant server, a customer entered authentication code which was entered by the customer into a merchant website associated with the merchant server; (vi) determine if the customer entered authentication code matches the stored authentication code; if the customer entered authentication code matches the stored authentication code: (vii) generate an authentication indication; (viii) store, in the payment network database, the authentication indication as a stored authentication indication; and (ix) transmit, to the merchant server, an authentication response comprising the authentication indication.
Secure card not present transactions using chip-enabled cards
Techniques are described for performing secure card not present (CNP) transactions using integrated circuit chip-enabled cards. The techniques include continually or periodically tracking a location of a user's card by a user computing device, e.g., a “smart” phone, and storing a log of datasets relating to the location of the user's card at a server device. Based on the tracking, the user computing device may alert the user via a push notification or other message when the user's card is not within a preset range of the user computing device. In addition, an authentication server determines a location of a purchaser computing device attempting to perform a CNP transaction using the user's card information, and compares the location of the purchaser computing device with a most recent location of the user's card retrieved from the log of datasets to determine whether to approve the CNP transaction.
Systems and methods for establishing identity for order pick up
Example embodiments of systems and methods for secure online order pick up and data transmission system between transmitting and receiving devices are provided. In an example embodiment, a user may be required to confirm his or her identity prior to using an application, utilizing enhanced or restricted features of an application or device, viewing sensitive information, or taking certain actions. A transmitting device, such as a contactless card, may be employed as means for confirming a user's identity and access these features.
AUTHORIZATION DEVICE
Provided is an authorization device that enables approval of a user's payment transaction with no need for separate verification by telephone or the like. In an authorization server (100), a traffic based authorization determination unit (102) determines legitimacy of payment by a user terminal (300) in an affiliated store server (200) being a payment server on the basis of traffic information containing access time of the user terminal (300) and server information being an access destination. Then, an authorization control unit (101) performs processing for enabling a payment transaction on the basis of this determination result.
SELECTIVE TRANSACTION AUTHORISATION METHOD AND SYSTEM
A selective transaction authorization method and system wherein the payment authorization request includes restriction information indicating a restricted purchase is requested, and the payment authorization request is declined or authorized according to a status of the account with which the purchase is being attempted.
Method for proving digital assets of transaction platform
The present invention discloses a method for proving digital assets of a transaction platform. An asset transaction platform and a server are involved. The method for proving digital assets of the transaction platform comprises: step 1: taking snapshot of a user identity and a user assets amount of each of all users by the sever; step 2: exporting the snapshots of the user identity and the user assets amount into a user asset list; step 3: setting mathematical hash functions; step 4: generating a merkle tree by using a string combined hash value of each of the users as a leaf node, and storing the merkle tree; and step 5: verifying valid user provisions and the total amount of assets of all users on the transaction platform, and drawing a conclusion. By combining a mathematic algorithm and a computer, the present invention provides users with an entrusted method for verifying the valid user provisions and the total amount of the assets of users on the platform, while protecting the asset privacy of each of the users.
System for User Authentication
A computer-implemented method of authenticating the identity of a user is provided, where the user is associated with a computer signature and is in possession of a cell phone. The method involves obtaining a current geographical location of the cell phone, determining if the computer signature is associated in a database with a stored geographical location of the phone, and, if the computer signature is associated in the database with a stored geographical location, comparing the stored geographical location to the current geographical location of the phone.