Patent classifications
G06Q20/4014
METHOD FOR CREATING, REGISTERING, REVOKING AUTHENTICATION INFORMATION AND SERVER USING THE SAME
A method for creating and registering the authentication information is provided. The method includes steps of: (a) an intermediate server determining whether the specific user's public key is registered if (i) the specific user's public key and (ii) a hash value of the specific user's information or its processed value are acquired from the biometric authentication server which received a request for registration of authentication information; and (b) the intermediate server, if the specific user's public key is determined to be unregistered and at least one certain anchoring condition is satisfied, registering with a database a representative hash value or its processed value in a certain data structure, wherein the representative hash value is created by using (1) a specific hash value and (2) at least one hash value of at least one neighboring node which corresponds to a node of the specific hash value.
Serial number and payment data based payment card processing
A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID.
ID authentication
A method for ID authentication, in which equipment involved in a transaction requests a password from a physically separate but limited-range communicating device, which automatically supplies a password in response to such request and communicates it to the equipment, the password is assessed as valid or invalid and the transaction approved or not accordingly.
Avatar as security measure for mobile device use with electronic gaming machine
A gaming system compatible with patron-controlled portable electronic devices, such as smart phones or tablet computers, is described. The gaming system is configured to establish a secure communication session between an electronic gaming machine and a portable electronic device. The system can confirm that a communication session is secure by displaying pre-selected content unique to the portable electronic device. The content can be continuously displayed on the EGM during the active communication session to indicate that the session is secure.
Confidential asset transaction system
A system is provided for controlling privacy in an exchange of an asset. The system receives an offer query of an offeror that includes an offeror reveal condition, an asset identifier of the asset, and offeror terms of exchange. The system accesses an offeree reveal condition and offeree terms of exchange for the asset. The system determines whether the offeror reveal condition and the offeree reveal condition are satisfied and determines whether the offeror terms of exchange and the offeree terms of exchange are satisfied. When the offeror reveal condition, the offeree reveal condition, the offeror terms of exchange, and the offeree terms of exchange are satisfied, the system reveals the offeror to the offeree and the offeree to the offeror.
CAMERA CONTROL DEVICE AND METHOD TO PROCESS CAPTURED IMAGE USING AT LEAST ONE CAMERA
According to an embodiment of the present invention, a method for processing an image photographed by using at least one camera comprises the following steps of: receiving a first image photographed to have a first image quality through at least one camera; detecting a human object from the first image; generating an event signal when it is detected that a product object is picked up by the human object after the human object is detected in the first image; and acquiring a second image including the human object by controlling the at least one camera to photograph to have a second image quality higher than the first image quality in response to the event signal.
Device fingerprinting at a merchant location
In some examples, methods and systems may process one or more payment transactions between a merchant and a buyer by registering a communication device as an authorization instrument to the payment transaction. To this end, the method includes detecting at least one transaction activity associated with a payment system, establishing a communication channel between the POS terminal an RF communication device in proximity to the POS terminal. Then obtaining at least one device characteristic of the communication device, wherein the device characteristic is related to the operational or physical features of the communication device; generating a digital fingerprint based in part on the obtained device characteristic and the information related to received payment object; determining whether the digital fingerprint substantially compares to an existing fingerprint in a database and if the existing fingerprint is substantially similar to the digital fingerprint, authorizing the payment transaction through presence of the communication device.
Systems and methods for verifying digital payments
Embodiments of the disclosure provide systems and methods for verifying digital payments for a payment platform. The system includes a communication interface configured to receive service data associated with a transaction from a terminal device associated with a user of the payment platform. The system further includes at least one processor configured to automatically determine whether an authentication is waived for the transaction based on the received service data and a blacklist generated using a machine learning model. The blacklist includes a list of suspicious users and transaction behaviors. The at least one processor further configured to approve the transaction without requesting user authentication information from the terminal device when the authentication is waived. The at least one processor also configured to request the user authentication information from the terminal device and validate the user authentication information when the authentication is not waived.
Point-of-Sale Consumer Resolution System
A system for identifying a consumer at a retailer point of sale (POS) incorporates a virtual wallet database that contains consumer records. A consortium processor utilizes a database or databases with information known to the electronic tender provider but not available to the virtual wallet database. If the identifying data from the retailer POS hardware does not match any data from the virtual wallet database, an enhanced trade area append processor is employed to find a matching consumer within the retailer POS trade area. If a match is found, the applicable address is attached to the consumer data captured at the POS. A record is then sent to the consortium processor, which compares this data to its own records and returns a match or no-match result. The virtual wallet database is updated based on the match results.
METHOD AND APPARATUS FOR MANAGING AND VERIFYING CERTIFICATE
A method of managing and verifying a certificate of a terminal is provided. The method includes obtaining certificate information that is usable when downloading and installing a specific bundle corresponding to at least one of a secondary platform bundle family identifier or a secondary platform bundle family custodian identifier, transmitting, to a secondary platform bundle manager, the certificate information corresponding to the at least one of the secondary platform bundle family identifier or the secondary platform bundle family custodian identifier of the specific bundle, and receiving, from the secondary platform bundle manager, at least one of a certificate of the secondary platform bundle manager, certificate information to be used by a smart secure platform (SSP), the secondary platform bundle family identifier, or the secondary platform bundle family custodian identifier.