Patent classifications
G06Q20/4018
Randomized input device heating
A security code input may be obfuscated from a thermal imaging device by randomly heating a random set of inputs of an input device. The security code is inputted on an input device, which communicates with a security system to grant or deny access to a user based on an entry of the security code. The input device includes a plurality of hearing elements. The input device may receive an input from the user. A random set of heating elements including one or more heating elements, are generated from the plurality of heating elements. A temperature is determined for the one or more heating elements of the random set of heating elements. The temperature is then applied to the one or more heating elements of the random set of heating elements of the input device.
System and method for determining use of non-human users in a distributed computer network environment
Embodiments of systems and methods as disclosed herein may determine that an initiator of a communication on a distributed computer network is an automated script or the like. More particularly, in one embodiment, a web page including a hidden field may be generated in response to a request for the web page. This hidden field is a field included in the web page that is not visible to a human user when the web page is rendered by a browser and presented to the user. By comparing a received value for such a hidden field with an associated value for the hidden field as provided in the web page, the use of an automated script may be detected.
Encrypting financial account numbers such that every decryption attempt results in valid account numbers
A decryption module is enabled on one or more authorized devices. A user's financial account information is encrypted using a card verification number, or some secret known to the user and replicated onto the authorized devices. The user requests processing of a financial transaction using the previously-encrypted financial account information. The authorized device retrieves the encrypted financial account information and prompts the user to enter the card verification number (or other secret known to the user that was used to encrypt the financial account information). The decryption module decrypts the financial account information using the card verification number entered by the user, and the decrypted financial account information resembles a valid credit card or debit card number and will pass a Luhn test. The decrypted financial account information is transmitted to process the financial transaction initiated by the user.
SYSTEMS AND METHODS FOR PARSING AND DECRYPTING PAYLOADS
The present systems and methods generally relate to parsing encrypted transaction information received from a point of interaction device via a third party entity. Using a unique logic process, the present systems and methods can parse both encrypted and decrypted transaction information, such that the transaction information may be processed for payment authorization. For example, in certain embodiments, the present systems and methods receive a payload (and potentially other information), parse the payload into discrete data components, transmit one or more of the discrete data components to a decryption service, receive decrypted transaction information from the decryption service, and parse the decrypted transaction information into useful components such that payment may be authorized.
Adding card to mobile wallet using NFC
A user enables a communication, such as through a tap, between an NFC-enabled payment or funding card and a mobile device. Card information, such as the card number, type, and expiration date, are read by the mobile device. The user is then authenticated through the user device, such as by entering a CVV code, a PIN for the card, a cardholder name, and/or a billing address for the card. If confirmed, the card is added to the user's mobile/cloud wallet.
SYSTEMS AND METHODS FOR IMAGE CAPTURE VECTOR FORMAT LASERING ENGINE
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector formatted visible information lasered onto its surface. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add a first plurality of visible information to a transaction card and capture an image of the first plurality of visible information. The systems and methods may also map the image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machine.
System and method for automatically filling webpage fields
A method for generating a personal identification number (PIN) debit child product for use in performing a debit payment transaction with a merchant entity. A payment processing platform receives a user selection of a financial institution made via a merchant payment page and directs the user to authenticate a user identity with the financial institution. The payment processing platform receives a user selection of a core account held with the financial institution, such that the core account provides financial backing for the child product. The child product is generated that includes a child card number and a virtual PIN associated with the core account. Advantageously, the method provides the ability to make PIN debit transaction on the Internet.
Method for a prepaid, debit and credit card security code generation system
This invention is a comprehensive Dynamic Security Code (DSC) System (DSC System) that can change the security code of a prepaid, debit, or credit card (Payment Card). In an effort to thwart Card-Not-Present (CNP) fraud, the DSC System provides dynamic security code values (DSC Values) that have a limited use. The DSC Values provided by this DSC System can be calculated by various methodologies and can be used within existing standard payment card infrastructures. The DSC System can also be used with other form factors and in other environments not related to payments such as balance inquiries. The DSC Values can be calculated by a DSC Generator Server or on the card itself.
Booking management system
A booking management system for secure authentication of payment information and delayed transaction processing is provided. Third-party services partner with booking management systems to aggregate and list offerings of the third-party services in a digestible display on a one-stop platform. A booking management system can manage the authentication of payment card information on behalf of any number of such third-party services. The booking management system may receive a delayed transaction request from one or more such third-party service. The booking management system may provide virtual payment information to the third-party services for delayed transactions. The third-party services may later initiate the delayed transactions using the virtual payment information, without being required to perform authentication processing on the payment card information maintained by the booking management system.
SYSTEMS AND METHODS FOR GENERATION AND USE OF BIOMETRIC-BASED ACCOUNT NUMBERS
Disclosed are methods and systems for generating and using biometric-based account numbers. A binary representation of biometric data of a first user may be received and reduced using an encoding process to generate a unique portion of an account number for the first user that is stored in a data store. The first user may be provided a certification mechanism that includes a chip storing the encoding process and a biometric scanning device. In response to an attempt by an unknown user to perform an interaction using the certification mechanism, a value generated by the certification mechanism may be received, and a match may be determined between the value and the unique portion of the account number stored in the data store, the match indicating the unknown user is the first user. Based on the match, the interaction may be authorized and the value is used to perform the interaction.