Patent classifications
G06Q20/4014
SYSTEMS AND METHODS FOR CHIP-BASED IDENTITY VERIFICATION AND TRANSACTION AUTHENTICATION
Example embodiments of systems, methods, and computer-accessible mediums for identity verification and transaction authentication are provided. An exemplary system can comprise an application, a user device, and a server. The application can prompt a removal of a card chip, prompt an insertion of the card chip into the user device, determine an orientation of the card chip after the insertion of the card chip into the user device, and transmit, to the card chip, a first message. The card chip can encrypt the first message via one or more authentication protocols to generate an encrypted first message, transmit, to the server, the encrypted first message. The server can decrypt the encrypted first message, verify the decrypted first message, and transmit a second message to the application, wherein the application is configured to display a verification notification in response to the second message.
INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE
One embodiment provides a method, including: receiving, at an electronic device, a handwriting input operation by a user; acquiring, using a processor, a first input feature information associated with the handwriting input operation; and generating, using a processor, an index based on the first input feature information. Other aspects are described and claimed.
Geo-location based authentication in a mobile point-of-sale terminal
The invention relates to authentication in mobile financial transactions, and more particularly, to systems, devices and methods of employing a location tracking function within a mobile device for the purpose of authenticating a user and a trusted transaction when this mobile device is configured to a mobile point-of-sale (POS) terminal. Authentication is primarily implemented by a secure element integrated within the mobile device based on comparison between captured geo-location data and some known information, such as a retailer address, this user's behavior pattern and shopping habit, that may be derived from the geo-location data. In the secure element, a secure memory stores a plurality of geo-location data from which a secure processor generates information concerning a behavior pattern or a shopping habit of the user. A V/A unit receives a real-time geo-location of the mobile device, and thereby, verifies the user or the trusted transaction according to the generated information.
DYNAMIC MULTIPLE-APPLICATION SYSTEMATIC FRAMEWORK FOR INTEGRATED CIRCUIT CARD AND INFORMATION PROCESSING METHODS BASED ON THE FRAMEWORK
A multiple-application systematic framework for an IC card comprising a card issuer device 10, a service provider device 20 and a user terminal device 30, in which the three devices are interconnected by a first communications means. The card issuer device 10 comprises a card-issuing module 100 and a service provider management module 101. The service provider device 20 comprises a service module 200. The user terminal device 30 comprises an IC card 300 supplied by a card issuer and a communications device 301 comprising an application control module 3010, the IC card 300 comprises an authentication and security management module 3000 and a multi-application data storage area 3001. The communications device 301 and the IC card 300 communicate through a second communications means. The service provider management module 101 enables the service module 200 to use storage space in the multi-application data storage area 3001 for providing a service to a user via a service token, and the service module 200 communicates with the application control modulo 3010 enable a user and/or at least one service provider to manipulate one or more service tokens in the IC card 300.
System and method for a multiple merchant stored value card
The loyalty system allows a consumer to accumulate general loyalty points from one or more merchants, and convert any desired subset of general points to loyalty dollars associated with a specific merchant. The system stores, for each consumer, the merchant loyalty dollars (or monetary equivalent) by merchant within a remotely-accessible host database or within a smart card database. Upon conducting a purchase at a particular merchant, the consumer may utilize a code key to facilitate access to the consumer's own loyalty dollars for the particular merchant. The loyalty dollars are then applied to the purchase transaction as a discount or rebate. The consumer may also re-load the merchant loyalty dollar accounts.
Consumer registration via mobile device
Exemplary embodiments provide systems and methods to receive a transmission that is associated with an identification number and includes a number associated with a land line, determine a physical address based on the number associated with the land line, confirm the physical address that was determined, and associate the physical address with a user account, the user account being identified by the identification number.
Mobile one-time card number generator for ATM usage
Embodiments are directed to a mobile bank card number generator for digital wallet. Embodiments receive a request from a user to perform an ATM transaction on an account owned by the user; in response to the request to perform an ATM transaction, generate a one-time bank card number associated with the account owned by the user; generate a readable indicia based at least in part on the one-time bank card number; and initiate communication of the readable indicia to an ATM, wherein the ATM receives a user authentication credential from the user, a bank system validates the user authentication credential and in response to validating the user authentication credential, approves the ATM transaction for the user's account.
MULTI-COMMERCE CHANNEL WALLET FOR AUTHENTICATED TRANSACTIONS
A phone-based electronic wallet providing authenticated transactions across multiple channels of commerce. The electronic wallet may be used for point-of-sale payments, remote mobile payments and/or web-based payments, and may use authentication tools such as offline PINs, SecureCode PINs and/or online PINs.
CRM SECURITY CORE
A security core supports a networked banking app for a client application device communicating with a server, such as e.g. a smartphone. It provides a secure environment for the banking app to conduct registration, enrollment, and transaction workflows with corresponding back-end servers on the network. It includes defenses against static analysis, attempts at reverse engineering, and real-time transaction fraud. A principal defense employed is obfuscation of the protocols, APIs, algorithms, and program code. It actively detects, thwarts, misdirects, and reports reverse engineering attempts and malware activity it senses. A routing obfuscator is configured to operate at the outer layer. Previous core designs are retained as camouflage. An internal TLS library is used rather than the OS TLS layer. Cookies are managed internally in the core rather than in the webkit-browser layer.
TRANSACTION MANAGEMENT METHOD BY RECOGNITION OF THE REGISTRATION NUMBER OF A VEHICLE
Transaction management method based on the recognition of the registration of a vehicle (2), this method comprising: a step of pre-storage, by a client (1), of personal identification, payment and identification data of at least one vehicle (2); a step of reading of the registration of a vehicle (2); a step of transmission of the registration of the vehicle (2) to a data platform (5); a step of identification of the vehicle (2) by the data platform (5); a step of authentication of the client (1) by the inputting of a personal identification number; a step of proposal of a transaction to the authenticated client (1); a step of pre-authorization of the transaction by the client (1); a step of transaction authorization by a transaction authorization server (6); a step of informing of the client (1) of the transaction authorization.