G06Q20/4018

SYSTEMS AND METHODS FOR IMAGE CAPTURE VECTOR FORMAT LASERING ENGINE
20180260818 · 2018-09-13 ·

A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector formatted visible information lasered onto its surface. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add a first plurality of visible information to a transaction card and capture an image of the first plurality of visible information. The systems and methods may also map the image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machine.

INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
20180262334 · 2018-09-13 ·

Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.

DEVICE ENROLLMENT SYSTEM AND METHOD
20180255460 · 2018-09-06 ·

Embodiments related to systems and methods comprising receiving payment data at an access device; receiving an identifier for a mobile device at the access device; and generating and sending an authorization request message to a payment processing network, wherein the payment processing network generates a verification token, which is then sent to the mobile device whereby the mobile device is thereafter used to conduct payment transactions.

DETERMINING LEGITIMATE CONDITIONS AT A COMPUTING DEVICE

A method of determining legitimate use of a computing device for an action to be approved by a remote system is described. The following steps are carried out at the computing device. A verification method (44) is established for authenticating a user at the computing device or for verifying the integrity of the computing device in association with carrying out the action on that computing device. Cryptographic material is received from a trusted system for use in performing the action. The action is then performed (42). This may or may not comprise successful performance of the verification step. However, performing the action comprises returning information to the remote system that includes whether there was successful authentication using the verification method and parameters relating to computing device state when the action was performed. Suitable computing apparatus is also described.

Secure communication of payment information to merchants using a verification token

Disclosed are apparatuses, systems, and methods pertaining to the secure communication of payment information from portable consumer devices, such as credit cards, to online merchants using verification tokens.

Organic light emitting diode (“OLED”) visual authentication circuit board
10043183 · 2018-08-07 · ·

A circuit board that includes OLED display technology is provided. An OLED display may present light patterns recognizable by a hearing or visually impaired users. The light pattern may be customized by the user. A specific workflow may be associated with a specific light pattern. A light pattern may visually guide a user through a workflow. For example, different menu options may be color coded. High consequence changes may flash with a certain light sequence or pattern. Trusted devices may present a specific light pattern or matrix at login time to confirm that the user is accessing a trusted device.

Randomized input device heating

A security code input may be obfuscated from a thermal imaging device by randomly heating a random set of inputs of an input device. The security code is inputted on an input device, which communicates with a security system to grant or deny access to a user based on an entry of the security code. The input device includes a plurality of hearing elements. The input device may receive an input from the user. A random set of heating elements including one or more heating elements, are generated from the plurality of heating elements. A temperature is determined for the one or more heating elements of the random set of heating elements. The temperature is then applied to the one or more heating elements of the random set of heating elements of the input device.

SYSTEM AND METHOD FOR DETERMINING USE OF NON-HUMAN USERS IN A DISTRIBUTED COMPUTER NETWORK ENVIRONMENT

Embodiments of systems and methods as disclosed herein may determine that an initiator of a communication on a distributed computer network is an automated script or the like. More particularly, in one embodiment, a web page including a hidden field may be generated in response to a request for the web page. This hidden field is a field included in the web page that is not visible to a human user when the web page is rendered by a browser and presented to the user. By comparing a received value for such a hidden field with an associated value for the hidden field as provided in the web page, the use of an automated script may be detected.

PAYMENT INSTRUMENT MANAGEMENT WITH KEY TOKENIZATION

In an embodiment, a one-time use, cryptographically strong binding key is received from a user device that is outside the control of the computing system. Payment instrument information related to a payment instrument is received from the user device. An identifier for the binding key and an identifier for the payment instrument information is generated and the identifiers are returned to the user device. A payload including at least the identifiers for the binding key and the payment instrument information and a user identifier are received from the user device. The identifiers for the binding key and the payment instrument information are used to access the payment instrument information and the binding key. An association between the user identifier and the payment instrument information is stored in a secure database.

Behavior based allocation of payment tokens
12118533 · 2024-10-15 · ·

The disclosure describes a campaign director (CD) system associated with a financial institution and an associated campaign manager (CM) unit executing on a mobile device used to facilitate behavior based allocation of payment tokens and activation of payment transactions based on the tokens. The CM unit of the mobile device may be programmed by the CD system at the financial institution to generate tokens according to a token generation model that is a function of financial behavior history associated with a credit card account. When a credit card is used to initiate a payment transaction with a merchant, the CM unit of the mobile device may generate a token for the payment transaction and send the token to the CD system at the financial institution. The CD system then determines whether to activate the payment transaction based on the token and merchant data associated with the payment transaction.