G06Q20/4014

SYSTEMS AND METHODS FOR AUTHENTICATION CODE ENTRY IN TOUCH-SENSITIVE SCREEN ENABLED DEVICES
20180005240 · 2018-01-04 ·

Systems and methods for authentication code entry in touch-sensitive screen enabled devices are disclosed. In one embodiment, a method for entering data to a data entry device comprising at least one computer processor and a touch-sensitive screen may include (1) the touch-sensitive screen sensing a first input comprising at least one finger touch; (2) the touch-sensitive screen sensing a release of the first input; (3) the at least one computer processor determining a first number of finger touches in the first input; and (4) the at least one computer processor using the first number of finger touches to identify a first portion of an authentication code.

REAL TIME VERIFICATION OF TRANSFERS OF FUNDS
20180005241 · 2018-01-04 ·

A computer-implemented method included receiving a first request to verify a first requested transfer of funds from a first account to a first merchant prior to the first merchant receiving an acceptance of the first requested transfer of funds; identifying a first instance of an application program installed on a first mobile wireless device as being associated with the first account; causing, in response to receiving the first request, a first notification of the first requested transfer of funds to be presented on the first mobile wireless device via the first instance of the application program; determining that the first requested transfer of funds is not approved by a user of the account based on a first message received from the first instance of the application program or a failure to receive a message from the first instance of the application program within a predetermined period of time; and causing use of the first account to be disabled in response to the determination that the first requested transfer of funds is not approved by a user of the account.

Mobile application with dynamic feature set

A computing device may include a provider application and data defining perceptible elements that provide users with various functionalities in more easily consumable stages. The application may determine that the user is at a first level of sophistication based on user activities and/or circumstances, and present a first set of perceptible elements in response thereto to provide a first set of functionalities. The application may then determine the user is at a second, higher level of sophistication based on subsequent activities and/or circumstances, and present a second set of perceptible elements to provide a second set of functionalities that includes at least one new functionality not provided via the first set of perceptible elements. Applications can be less resource intensive by evolving to strategically tailor available functionality to the circumstances and needs of particular users.

Systems and methods for use in authenticating consumers in connection with payment account transactions

Disclosed are exemplary embodiments of systems and methods for use in authenticating consumers and/or computing devices to payment accounts. In an exemplary embodiment, a method generally includes generating, by a computing device, an authentication request for a consumer in response to a transaction by the consumer at a merchant. The transaction involves a payment account associated with the consumer, and the authentication request includes a direction to move a communication device associated with the consumer in a manner consistent with a reference movement. The method also includes receiving, by the computing device, an indication of movement of the communication device; comparing, by the computing device, the movement of the communication device to a reference movement; and then authenticating, by the computing device, the consumer to the payment account in connection with the transaction when the comparison indicates that the movement of the communication device matches the reference movement.

Method and apparatus of identifying a transaction risk

A method and an apparatus for identifying a transaction risk are disclosed. The method includes obtaining risk identification information of a sub-network to which a node relating to a transaction to be identified belongs; and identifying a risk of the transaction to be identified based on the risk identification information of the sub-network to which the node relating to the transaction to be identified belongs, wherein the sub-network is a network acquired by partitioning a relationship network based on connectivity, the relationship network is a network built up with entities and activities relating to a plurality of transactions. Embodiments of the present disclosure build up entities and activities relating to a transaction to be identified into a relationship network, and identify whether a risk exists in the transaction to be identified using risk identification information of the network which is difficult to be found or changed, and thus are able to identify a transaction risk in a more effective manner.

REDUCING AUTHENTICATION REQUIREMENTS FOR DATA TRANSMISSIONS
20180012225 · 2018-01-11 · ·

A method of reducing authentication requirements for data transmissions includes receiving a request for a data transmission between a sender and a receiver. The request includes an amount of data associated with the data transmission. An overall confidence level is determined between the receiver and the sender. A data transmission protection mechanism is selected based on the overall confidence level between the receiver and the sender. The data transmission is performed based on the selected data transmission protection mechanism.

DATA PROCESSING METHOD AND APPARATUS FOR VIRTUAL RESOURCE

Aspects of the disclosure provide a data processing apparatus having interface circuitry and processing circuitry. The interface circuitry is configured to obtain data related to at least two resource accounts, and related to resource transfer of the at least two resource account. The processing circuitry configured to construct resource transfer relationships of the at least two resource accounts according to the data, calculate, based on the resource transfer relationships, similarity measurements between the at least two resource accounts according to a preset calculation rule, and output, according to the calculated similarity measurements, a resource account with a similarity measurement satisfying a preset condition.

Transaction resolution data platform

Methods, systems, and apparatuses are described herein for the direct sharing and use of transaction data separately from transaction authorization processes. Transaction metadata associated with a transaction may be received and validated. Authorization information corresponding to the transaction may be received. The degree to which the transaction metadata is tested may be based on a predicted time of receipt of the authorization information. The transaction metadata and authorization information may be correlated. A computing device may determine whether to authorize the financial transaction based on the authorization information and the correlated transaction metadata. All or portions of the transaction metadata may be provided to one or more users after the transaction has been authorized or denied.

Systems and methods for imposing physical actions, by endpoints, based on activities by users

Systems and methods are provided for imposing physical actions, by endpoints, based on activities by users. One such method includes imposing a physical actions via a drone, by an endpoint associated with the drone, based on an activity undertaken by a user. The method includes receiving, by a computing device, an activity message including data indicative of an activity of a user and retrieving at least on rule from a data structure based on the data indicative of the activity where the at least one rule includes a physical action for said activity of the user. The method then includes identifying, by the computing device, the physical action from the at least one rule and transmitting, by the computing device, an order for the physical action to an endpoint, whereby the endpoint commands a drone to perform the physical action.

Biometric, Behavioral-Metric, Knowledge-Metric, and Electronic-Metric Directed Authentication and Transaction Method and System
20180012227 · 2018-01-11 ·

A system to authenticate an entity and/or select details relative to an action or a financial account using biometric, behavior-metric, electronic-metric and/or knowledge-metric inputs. These inputs may comprise gestures, facial expressions, body movements, voice prints, sound excerpts, etc. Features are extracted from the inputs and each feature converted to a risk score, which is then translated to a representative value, such as a letter or a number, i.e., a code or PIN that represents the input. For user authentication, the code is compared with a data base of legitimate/authenticated codes. In some embodiments a user selects specific information elements, such as an account or a payment amount using one or more of a biometric, a behavior-metric, an electronic-metric and/or a knowledge-metric input.