G06Q20/4018

DYNAMIC VERIFICATION METHOD AND SYSTEM FOR CARD TRANSACTIONS

Disclosed are methods and systems for payment card transactions, where a Card Verification Value (CVV) or Card Verification Code (CVC) is generated dynamically as part of a tokenized session.

Unique code for token verification

A method for tokenizing credentials is disclosed. In addition to a token, a verification value can be provided for each interaction. The verification value can be generated based at least in part on a dynamic data element. The dynamic data element may be kept secret, while the verification value can be distributed for use during an interaction. When the verification value is used, it can be validated by re-creating the verification value based at least on the stored dynamic data element.

Unique code for token verification

A method for tokenizing credentials is disclosed. In addition to a token, a verification value can be provided for each interaction. The verification value can be generated based at least in part on a dynamic data element. The dynamic data element may be kept secret, while the verification value can be distributed for use during an interaction. When the verification value is used, it can be validated by re-creating the verification value based at least on the stored dynamic data element.

Method for real-time redaction of sensitive information from audio stream
11875819 · 2024-01-16 · ·

A method for redacting sensitive information from an audio stream, such as a voice signal in a telephone call, in real time is provided. The method includes: receiving an audio stream; conveying the audio stream through a channel that includes a valve; detecting, from within the audio stream, a first event that indicates an onset of sensitive information; closing the valve so that the conveying of the audio stream through the channel is temporarily stopped; detecting, from within the audio stream, a second event that indicates an ending of the sensitive information; and reopening the valve so that the conveying of the audio stream through the channel is resumed. The sensitive information may include payment card industry (PCI) information, such as a card number and/or a card verification value (CVV).

ARCHITECTURES, SYSTEMS, AND METHODS FOR CARD BASED TRANSACTIONS
20240020702 · 2024-01-18 ·

A method and apparatus for processing a transaction between a merchant and a customer of the merchant are described. The method may include generating, at an ingress server, an initial transaction message by generating a deterministic identifier for a card used in the transaction from card data received for the transaction and encrypting the received card data. The method may also include providing the initial transaction message from the ingress server to a payment server. Furthermore, the method may include updating, by the payment server in response to an authorization of the transaction determined based at least in part on the deterministic identifier for the card, the initial transaction message with authorization data, and providing the updated initial transaction message from the payment server to an egress server. The method may also include communicating a final transaction message to an authorization system for processing the transaction between the merchant and the customer based on the card data.

SYSTEMS AND METHODS FOR DATA DESENSITIZATION
20200151725 · 2020-05-14 ·

Systems and methods we provided to identify payment data and desensitize the data by a secure card reader. Desensitization of the payment data may include replacing sensitive information such as discretionary data with zeroes or other predetermined values. Desensitization may also include replacing sensitive information with fraud detection data such as merchant identifying information. Desensitization of the payment data may leave certain payment data intact for customer tracking or other non-payment related purposes.

Mathematical Constant Pi Dynamic-Hybrid CVV Authentication Method for Credit Cards
20200151730 · 2020-05-14 ·

A computer-implemented method for authenticating credit cards via a mathematical operation of the mathematical constant Pi. Pi is stored in a user-operated computing device connected to a network, wherein an application software performs the said mathematical operation of Pi to select a segment of Pi. The selected Pi segment becomes the Dynamic Card Verification Value (DCVV) of a credit card. The method is dynamic, creating a new DCVV for the user's credit card each time the user operates his/her computer device to purchase products and services online with his/her credit card. To attain the same Pi segment, the issuer of the credit card utilizes in its computer server the same parameters and mathematical operation that the user utilizes on his/her computing device. Consequently, this process provides the user and issuer with a synchronized process to attain the same resulting DCVV to authenticate a credit card.

Systems and methods for detecting fraudulent use of a serial code for accessing an associated value stored on a network
10650382 · 2020-05-12 · ·

There is provided a method, comprising: receiving a serial code and an associated value, accessing a first database storing active serial codes each associated with an active value, wherein the first database is accessed for each received serial code when the serial code is active and when the serial code is inactive, and the first database is accessed for each received serial code when the associated value is active and when the associated value is inactive, when no match is found, accessing a second database storing invalid serial codes each associated with an invalid value, matching the received serial code to a certain invalid serial code, and providing the invalid value associated with the certain invalid serial code, wherein a client terminal is unable to distinguish between the provided invalid value and an active value otherwise returned for a positive match between the serial code and the active serial codes.

SYSTEM AND METHOD FOR DETECTING MALICIOUS PAYMENT TRANSACTION ACTIVITY USING AGGREGATE VIEWS OF PAYMENT TRANSACTION DATA IN A DISTRIBUTED NETWORK ENVIRONMENT

Embodiments of systems and methods for fraud prevention in an online distribution network are disclosed. In certain embodiments, service providers that provide forms in association with merchant's web sites for submission of transactions may implement pro-active threat detection based on an aggregate view of transactions in that distributed computer network.

System and Method for Obtaining a Temporary CVV using Tokenization Rails
20200143381 · 2020-05-07 · ·

Aspects of the present disclosure involve systems, methods, devices, and the like for performing electronic transactions. In one embodiment, a system and method are introduced which enable the use of a temporary notification for use in processing the electronic transaction. The temporary notification may arrive in the form a temporary CVV using tokenization rails and used for the verification and authorization of the electronic transaction.