G06Q20/4014

Methods and systems for leveraging transactions to dynamically authenticate a user

A system and method for authenticating a candidate user accessing a host computing device as an authentic user is provided. The host computing device is in communication with an authenticating computing device. The method includes receiving, by the authenticating computing device, a request to authenticate the candidate user as an authentic user. The authentication request includes a user identifier. The method also includes retrieving, by the authenticating computing device, transaction data including payment transactions performed by the authentic user based on the user identifier. The method also includes generating, by the authenticating computing device, a challenge question and a correct answer based on the transaction data associated with the authentic user, and transmitting the challenge question for display on a candidate user computing device used by the candidate user.

Browser extension for limited-use secure token payment

Methods and systems for a browser extension system are disclosed. In some embodiments, a browser extension server includes a communication device configured to communicate with a first computing device executing a browser extension application and a web browser application and a second computing device executing an authentication application. The browser extension server further includes a memory storing instructions, and a processor configured to execute the instructions to perform operations. The operations may include receiving from the first computing device an indication of a financial service account associated with the first computing device, detecting a payment field in a web page provided by the computing device through the web browser application and, in response, generating a secure token mapped to the financial service account. The operations may further include sending the second computing device an authentication request, receiving an authentication response, and populating the payment field with the secure token.

SYSTEMS AND METHODS FOR AUTHENTICATING A REQUESTOR AT AN ATM
20170344990 · 2017-11-30 ·

An authentication computing device including at least one processor in communication with a memory is provided. The processor stores, within the memory, an authentication profile associated with an account holder. The authentication profile includes an account identifier associated with a payment account of the account holder and authentication information. The processor further receives an authentication request associated with the payment account and a payment card action request from a requestor for a payment card action to be performed through an automated teller machine (ATM). The processor also retrieves the stored authentication profile, generates an authentication challenge based on the authentication profile, transmits the authentication challenge to a client device and/or the ATM, receives an authentication response from the requestor, and determines an authentication result based, at least in part, on the authentication response. The authentication result indicates if the requestor is the authenticated account holder of the payment account.

SYSTEMS AND METHODS FOR AUTHENTICATION CODE ENTRY IN TOUCH-SENSITIVE SCREEN ENABLED DEVICES
20170344251 · 2017-11-30 ·

Systems and methods for authentication code entry in touch-sensitive screen enabled devices are disclosed. In one embodiment, a method for entering data to a data entry device comprising at least one computer processor and a touch-sensitive screen may include (1) the touch-sensitive screen displaying an input interface; (2) the touch-sensitive screen sensing a first input comprising at least one finger touch; (3) the touch-sensitive screen sensing a release of the first input; (4) the at least one computer processor determining a number of finger touches in the first input; and (5) the at least one computer processor using the number of finger touches in the first input to identify at least a first portion of a value in an authentication code.

Identity authentication, number saving and sending, and number binding method, apparatus and device
11677555 · 2023-06-13 · ·

Disclosed are an identity authentication, number saving and sending, and number binding method, apparatus and device. The identity authentication method comprises: receiving a user identity authentication request sent by a data authentication platform client, wherein the user identity authentication request comprises user authentication information and user identification information, and a data authentication platform server pre-stores the user authentication information and a registration number and a password, which correspond to the user identification information; acquiring, according to the user identification information, the user authentication information pre-stored in the data authentication platform server; matching the user authentication information in the acquired user identity authentication request with the acquired user authentication information pre-stored in the data authentication platform server; when the matching is successful, receiving a result, sent by the data authentication platform client, of confirming the acquisition of the registration number by a user.

PLATFORM FOR OFFER DETERMINATION AND PRESENTATION VIA INTERNET OF THINGS

Techniques described herein include a platform and process enabling an electronic appliance to locally store payment credentials, loyalty point information, receive price comparison information for an item, redeem rewards or loyalty points to determine a best offer for the item, and enable delivery of said item to a user with minimal user interaction. In some embodiments, an electronic appliance can receive a query for offers for an item, receive order information from a plurality of merchants about the item, and apply loyalty points to determine an offer for the item. Upon receiving confirmation the electronic appliance may transmit access credentials for ordering the item for delivery and updating the loyalty point information for the account utilized to purchase the item from the determined offer.

SYSTEMS AND METHODS FOR IDENTITY AUTHENTICATION USING SOFTWARE LICENSES
20170344729 · 2017-11-30 ·

An authentication computing device for authenticating user identity using software license information is provided herein. The authentication computing device is configured to store a list of merchants that provide software licenses, and receive an authentication request associated with a transaction initiated using a payment card at a user computing device for a subsequent software license. The authentication request includes transaction information. The authentication computing device is also configured to determine that a merchant associated with the transaction is included in the list of merchants. The authentication computing device is further configured to determine whether a card type of the payment card satisfies card criteria, and determine whether a location of the user computing device satisfies location criteria. The authentication computing device is also configured to, when card criteria and location criteria are satisfied, transmit an authentication response including an indicator that the user of the user computing device is authenticated.

SYSTEMS AND METHODS FOR PROVIDING A REDEEMABLE COMMERCE OBJECT
20170345038 · 2017-11-30 ·

A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. The system may enable a first user to select a redeemable commerce object to be placed within a web page. The system may create the web page that includes a representation of the redeemable commerce object. A second user may be enabled to view the web page and select the redeemable commerce object in order to redeem it. The system may facilitate the transfer of value from to the second user upon redeeming the redeemable commerce object.

FAILED RESOURCE USAGE MONITOR AND REMEDIATION SYSTEM
20170345001 · 2017-11-30 ·

A system monitors failed resource usage and remediates the failure by determining that the user attempted to use a resource to perform an action associated with a third party; determining that the attempt to use the resource to perform the action failed; determining that a user device of the user is located within a physical boundary; providing information related to the resource or the failed action to the third party; expediting a second attempt to perform the action including receiving authentication information comprising the provided information from the user, the authentication information configured to authenticate an identity of the user, and authenticating the identity of the user based on the received authentication information; and in response to authenticating the identity of the user, performing the action.

Block chain-based asset processing method, device, apparatus and storage medium

The present application discloses a block chain-based asset processing method, device, apparatus and storage medium, and relates to the technical field of block chain. The method includes: starting a voting on whether a target account is an account to be retrieved, in response to an asset retrieval transaction request of the target account for the account to be retrieved; performing an identity authentication on the target account, according to the votes of one or more target participants participating in one or more historical transactions initiated by the account to be retrieved; and processing the assets of the account to be retrieved, according to a result of the identity authentication of the target account.