G06Q20/4014

Computer system and computer-implemented method for secure payment transaction

A computer implemented system and method is disclosed for providing a secure payment transaction between a customer and a merchant. The system includes at least a computer processor and a data storage device, the data storage device comprising instructions operative by the processor to: receive, from an acquirer bank of the merchant, a payment request comprising a payment instrument associated with a customer and a merchant token associated with a merchant, map the merchant token to predefined parameters established by the merchant for performing a merchant authorisation of the payment request, validate the merchant token by checking whether the predefined parameters are met for the payment request, approve or refuse the payment request based on the validation and, if approved, transmit a payment authorisation request to an issuer bank associated with the payment instrument of the customer for issuer authorisation of the payment request and proceed with the secure payment transaction if the issuer authorisation is successful.

Systems and methods for cryptographic authentication of contactless cards

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

Contextual payment and account management infrastructure

A computerized method for providing an interactive graphical user interface (GUI) to a user on a display of a mobile device. The method interacts with the user to obtain information about a first payment account and a second payment account. The method aggregates parameters of the first payment account and the second payment account on a unified GUI on the mobile device. The method further monitors transactions of the first payment account and the second payment account. When a particular transaction conducted by the first payment account includes parameters associated with the second payment, the method identifies that particular transaction and presents a confirmation GUI screen to the user to confirm using the second payment account instead.

Object distribution processing
11501295 · 2022-11-15 · ·

The present disclosure provides an object distribution processing method, device, and system. The object distribution processing method includes: receiving, by an object distribution server, content of an object distribution transaction from a blockchain node, where the content of an object distribution transaction includes a transaction hash specific to the object information to be distributed; after the object distribution server reaches a distribution start time, receiving object distribution requests from a plurality of clients; determining a corresponding award winner from a plurality of object distribution requests; and sending an object distribution message with the hash value to the award winner. With this method, the tamper-resistant characteristic of transaction content in a blockchain is used, and a proof for a transaction hash value specific to initial object information is provided for a user, thereby improving fairness of an object distribution service.

Enabling secure internet transactions in an unsecure home using immobile token
11502843 · 2022-11-15 · ·

This specification discloses devices and methods for a security concept that includes an immobile hardware token (e.g., a “wall token” that is fixed within a wall) which ensures that the more sensitive actions of electronic banking (e.g., money transfers of large sums to foreign bank accounts) can only be done from the account owner's home, but not from a remote place. However, other less sensitive (and lower security risk) actions can still be done from anywhere else. In some embodiments, the hardware token includes sensors to ensure that the token is not moved or tampered with, interfaces to provide distance bounding, and a crypto-processor to provide secure authentication. The distance bounding can be used to determine if the authentication device is in close proximity to the hardware token, which can in turn ensure that the authentication device is within the account owner's home.

Systems and methods for third party token based authentication
11501292 · 2022-11-15 · ·

A method of authenticating a user on behalf of a third party provider by an identity provider computing system is disclosed. The method includes receiving a user token and user device information from the third party provider; identifying the user based on the user token; identifying related user activity based on the user device information; and authenticating the user based on the related user activity.

Transaction processing system

A method for processing a transaction includes receiving, at a terminal and from a user, a selection of a service provider; receiving authentication credential requirements associated with the selected service provider that facilitate authentication of the user by the service provider; and communicating, to the service provider account server, authentication credentials associated with the user that satisfy the authentication credential requirements. When the user is authenticated, the method includes receiving, from the service provider account server, information indicative of an amount owed on an account with the service provider that is associated with the user. The method further includes receiving, via currency processing hardware of the terminal, currency; and communicating transaction information to the service provider account server that indicates an amount of currency received by the terminal to thereby reduce the amount owed on the account by the user. When an amount of currency received by the terminal exceeds and amount owed on the account, the method includes providing, by the terminal, an amount of currency that corresponds to a difference between the amount of currency received and the amount owed on the account.

Systems and methods for screening data instances based on a target text of a target corpus

Systems, apparatuses, methods, and computer program products are disclosed for screening data instances based on a target text of a target corpus. A screening device analyzes a target corpus to generate at least two term dictionaries for the target corpus. The screening apparatus, based on a frequency of a term in the target corpus, determines a term weight for the term; for each data instance, determines term scores for the data instance and the target text based on the term weights; filters the data instances based on the term scores, to generate a short list of data instances; determines term similarity scores between each data instance of the short list and target text based on the term weights; and provides a data instance determined to likely correspond to the target text and an indication of the corresponding term similarity score(s). A term is a word or an n-gram.

CONTROL METHOD, SERVER, AND RECORDING MEDIUM
20220358496 · 2022-11-10 ·

A control method is to be executed by one of a plurality of servers included in an information management system. Each of the plurality of servers owns a distributed ledger. The control method includes: receiving transaction data including a signature generated using any of a plurality of signing keys owned by a user, each of the plurality of signing keys being associated with a reliability; determining whether the reliability associated with the signature included in the transaction data received is higher than or equal to a specified value; storing the transaction data in the distributed ledger, if reliability is determined to be higher than or equal to the specified value in the determining; and executing invalidation processing to invalidate the transaction data, if the reliability is determined to be lower than the specified value in the determining.

Generation of Authentication Questions Based on User-Created Transaction Limitations

Methods, systems, and apparatuses are described herein for improving the accuracy of authentication questions using transaction limitations provided by users. A request for access to an account associated with a user may be received from a user device. An account restrictions database may be queried to determine one or more transaction rules associated with the account. The one or more transaction rules may have been created by the user and indicate limitations on financial transactions that may be performed via the account. An authentication question may be generated that is associated with a violation of the one or more transaction rules. The authentication question may be provided to the user device, and a response to the authentication question may be received. Access to the account may be provided to the user device based on the response.