Patent classifications
G06Q20/4014
System and method for authentication using payment protocol
Methods, systems, and devices are disclosed for using a payment processing network as an authorization engine to access secure physical areas, such as college dormitories, office buildings. A keycard with a cryptogram generator is presented by a user to an access device, and the access device or associated computer sends an access request message formatted like a payment authentication request message to an aggregator/acquirer and payment processing network. The payment processing network validates the cryptogram and returns an access response message, again formatted like a payment authorization response message, indicating that the keycard is authentic. The gate, door, turnstile, or other barrier is then temporarily unlocked to let the user through.
Testing and Other Data Communicated Using Trust Models In Decentralized and Distributed Systems
A method for communicating information relating to test results of a user includes obtaining test results of a user. An assertion is derived from the test results of the user. The test results are input to a pre-provisioned first algorithm. The assertion is encapsulated in a first data object by a PGE that controls an environment in which the first algorithm is executed. A first proof is generated which is configured to be usable to verify that the first algorithm used the test results to produce the assertion when provided to a PVE along with the first data object. The test results itself are excluded from the first proof and the first data object such that privacy of the test results is maintained. The first proof and the first data object are communicated to a receiving communication device from an enterprise communication device associated with the user and an enterprise.
AUTOMATED HARDENING OF SENSITIVE TRANSACTIONS
There is disclosed, by way of example, a computing apparatus having a hardware platform having a processor and a memory; and instructions encoded within the memory to: identify an online transaction involving a user; according to a plurality of contextual factors, determine a sensitivity level for the online transaction; and according to the sensitivity level, contextually increase security for the online transaction without altering at least one other online transaction.
Methods systems and computer program products for verifying consumer identity during transaction
Computerized methods, systems and computer program products for determining how an identity of a consumer can be verified during a transaction involving the consumer and a merchant. Embodiments access and analyze data of an account the consumer has with an online social network to derive a challenge question response options. The social-network based challenge question and response options are presented to the consumer, and the consumer's selection of certain response options is used to confirm that the consumer is the person named on a credit card or other payment instrument or that other identification or verification information should be requested by the merchant before completing the transaction.
DESTINATION ADDRESSING ASSOCIATED WITH A DISTRIBUTED LEDGER
The present disclosure relates to methods, devices and/or systems associated with a transaction for a distributed ledger, such as the Bitcoin blockchain. In some embodiments, the present disclosure relates to a method for performing payer entity validation, based on the request. In other embodiments the present disclosure relates to a method for implementing asynchronous processing of a request sent by a payer entity, when a payee entity is non-responsive.
Method for detecting misuse of identity in electronic transactions
The invention provides methods for determining whether a transaction has taken place in geographic proximity to a wireless device. Upon receiving a notification to authenticate the use of an identity at a transaction location, where the identity is associated with a wireless terminal, the method determines an approximate location of the wireless terminal based on cached position information, GPS location, cellular geo-location, and/or Wi-Fi geolocation, and determines whether one or more of these is in geographic proximity to the location of the transaction.
ELECTRONIC WALLET ALLOWING VIRTUAL CURRENCY EXPIRATION DATE
A computer-implemented system and method uses a processor of a device of an expiring virtual currency (EVC) wallet user. An EVC transaction is retrieved that is associated with a blockchain and addressed to an address associated with the EVC wallet. The EVC transaction comprises an expiration date for the EVCs, as part of virtual currency user rules (VCURs). If the expiration date of the EVCs has passed, the method automatically, and without user intervention, transfers the EVCs to a transferee designated in the VCURs.
Mobile device payments
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for conducting cardless payment transactions. One of the methods includes receiving from a first device of a first user a first message requesting a payment transaction with a second user. Using an identifier of the second user provided by the first device, sending a second message to a second device of the second user requesting approval of the transaction, wherein the second message includes an approval code. A third message is received from the second device. If the third message includes the provided approval code and is received within a threshold amount of time, the payment transaction is processed using account information received in the first message.
Device-associated token identity
Techniques are disclosed for generating a token identity that is assigned to a device identity module of a customer device. The token identity may be used to incorporate various types of customer identifier data to verify a customer identity during an electronic transaction. For instance, a customer may initially provide customer information on a customer device, which may be used to obtain a digital identification associated with the customer. The customer may subsequently provide an input including a customer identifier on the customer device, which may be verified against the customer information included in the digital identification.
Authorization of cardless payment transactions
A method of processing a transaction between a customer and a merchant includes receiving from a mobile device of the customer or from another device of the customer an indication of consent to perform a cardless payment transaction with the merchant, receiving from the mobile device an indication that the customer is within a predetermined distance of the merchant, after receiving both the indication of consent and the indication that the customer is within the predetermined distance, sending to a computer system of the merchant an indication of the presence of the customer and personal identifying information for the customer, receiving data indicating a transaction between the customer and the merchant, and submitting the transaction to a financial service for authorization.