G06Q20/4014

Multi-factor authentication providing a credential via a contactless card for secure messaging
11432146 · 2022-08-30 · ·

Exemplary embodiments may use a contactless card as a secondary form of authentication in a multi-factor authentication for a secure messaging service. The recipient party of a request to initiate a messaging service session (such as a server computing device) may be programmed to use the phone number of the originating device to look up records regarding an identity of a party and their associated phone number as a primary credential and then may require an authentication credential originating from the contactless card as a secondary credential for the initiating party. In some instances, the credential originating from the contactless card is a onetime password that is valid only for a period of time. The recipient party determines whether the onetime password is valid. If both credentials are valid, a secure messaging session may be initiated with the initiating party.

Methods and systems for leveraging transaction data to dynamically authenticate a user

A system and method for authenticating a candidate user accessing a host computing device as an authentic user is provided. The host computing device is in communication with an authenticating computing device. The method includes receiving, by the authenticating computing device, a request to authenticate the candidate user as an authentic user. The authentication request includes a user identifier. The method also includes retrieving, by the authenticating computing device, transaction data including payment transactions performed by the authentic user based on the user identifier. The method also includes generating, by the authenticating computing device, a challenge question and a correct answer based on the transaction data associated with the authentic user, and transmitting the challenge question for display on a candidate user computing device used by the candidate user.

Systems and methods for facilitating transactions using pattern recognition
09734499 · 2017-08-15 · ·

Systems and methods are provided for online transactions using pattern recognition. A user of a payment provider may create and register patterns drawn by the user on a pattern entry image. The user may register the patterns by associating transaction options with each drawn pattern. Each pattern may be used to execute a particular transaction such as a purchase transaction, a payment of a specific amount, a payment to a specific recipient, or a sales transaction. When the user wishes to execute a transaction such as an online payment to a particular recipient for a particular amount, the user can redraw the registered pattern associated with payments to that recipient for that amount. A pattern can be drawn at a particular location on the pattern entry image. Different transactions can be associated with patterns drawn at different locations.

Authentication and interaction tracking system and method

Aspects of the invention relate to a central authentication and interaction tracking system for authenticating an entity making a request related to a financial account. The system facilitates authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity. The system includes an application interface receiving interaction requests over a network, the interaction requests originating from multiple entities and including a plurality of authentication factors. The system further includes a computer processor and computer memory capable of building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes indicators of the authentication factors from each initiated transaction request. The system further facilitates deriving, from the entity print record, an entity print and storing the entity print in at least one computer memory, comparing received authentication factors for a requested interaction with the entity print, and making an authentication determination based on the comparison.

CROSS-BORDER RESOURCE TRANSFER AUTHENTICITY VERIFICATION METHOD, DEVICE AND ELECTRONIC EQUIPMENT
20220036350 · 2022-02-03 ·

This specification provides method for auditing authenticity of cross-border resource transfers, device, and electronic equipment. The method is implemented on a client device, and comprises: obtaining cross-border resource transfer information initiated by an initiator of a cross-border resource transfer; obtaining, in response to the cross-border resource transfer information, identification information corresponding to proof information that is stored in a blockchain and corresponds to the cross-border resource transfer information; generating a cross-border resource transfer request based on the cross-border resource transfer information and the identification information; and sending, to an auditor of cross-border resource transfers, the cross-border resource transfer request, causing the auditor to perform, based on the proof information that is stored in the blockchain and corresponds to the identification information, an authenticity verification on the cross-border resource transfer information.

NETWORK PROVISIONING AND TOKENIZATION USING A REMOTE TERMINAL

A method of tokenizing sensitive data from a terminal device includes receiving, a connection request comprising a hardware serial number associated with a terminal device and validating the hardware serial number associated with the terminal device. The method includes sending a command to a terminal device that causes the terminal device to display a prompt for sensitive data associated with a user interacting with the terminal device and receiving an encrypted data packet from the terminal device. The encrypted data packet includes the sensitive data. The method includes sending the encrypted data packet to a gateway system for tokenization, receiving a token that represents the sensitive data, and providing the token to the terminal device.

Blockchain based account funding and distribution

The present methods and systems relate to using and accessing data stored in a blockchain, and in particular, interacting with the blockchain and users via smart contracts to handle account funding and distribution methods. The methods and systems include receiving a transaction from a participant, and verifying the transaction, such as by accessing a smart contract stored on the blockchain and checking a set of parameters against a set of conditions stored in the smart contract. Depending on whether the set of parameters satisfy the conditions, the results may be communicated to participants about the success or failure of the transaction.

Methods and systems for delivering a document

A computer-implemented method for delivering a document to a user may include obtaining, via an automated teller machine (ATM), first identification data of the user, wherein the first identification data of the user includes a card number and a password associated with the card number; determining a notification status of the user based on the first identification data; obtaining, via the ATM, second identification data based on the notification status of the user; determining a delivery status of the user based on the first identification data and the second identification data; and delivering the document to the user based on the delivery status of the user via the ATM.

Edge-node touchless authentication architecture

This disclosure describes an edge-node computing system that provides streamlined access to secured products/services based on data captured by one or more sensors. The captured data may include unsolicited authenticators. Edge-nodes may process the captured data and perform a plurality of pre-authentication routines. A consensus protocol executed by the edge-nodes may establish a threshold pre-authentication of a customer based on the plurality of pre-authentication routines. Edge-nodes may configure an automated teller machine (“ATM”) to provide the customer access to the ATM based on the threshold pre-authentication. The edge-nodes may configure the ATM to allow the customer to use a contactless authentication method to access the ATM.

PAYMENT VERIFICATION METHOD AND SYSTEM

A payment verification method includes: generating, by a payment collection device, verification information for a to-be-processed target payment transaction, and providing the verification information to a payment device; generating, by the payment device, payment information, and providing the payment information to the payment collection device, the payment information including payment account information and the verification information obtained from the payment collection device; after obtaining the payment information, performing, by the payment collection device, matching verification by using the verification information included in the payment information and the verification information locally generated; and if the matching verification succeeds, completing a payment request by using the account information included in the payment information.