Patent classifications
G06Q20/4018
Secure remote transaction framework using dynamic secure checkout element
Embodiments of the invention are directed to systems and methods of providing secure remote transaction (SRT) transactions. In some embodiments, a resource provider is able to embed a checkout element into a webpage that it hosts. The checkout element enables interaction between a user that has accessed the webpage and an initiator application server located remotely in order to complete a transaction while preventing the resource provider from gaining access to sensitive information. In some embodiments, the user's information may be determined by an initiator server and populated into the checkout element.
Systems and methods for generation and use of biometric-based account numbers
Disclosed are methods and systems for generating and using biometric-based account numbers. A binary representation of biometric data of a first user may be received and reduced using an encoding process to generate a unique portion of an account number for the first user that is stored in a data store. The first user may be provided a certification mechanism that includes a chip storing the encoding process and a biometric scanning device. In response to an attempt by an unknown user to perform an interaction using the certification mechanism, a value generated by the certification mechanism may be received, and a match may be determined between the value and the unique portion of the account number stored in the data store, the match indicating the unknown user is the first user. Based on the match, the interaction may be authorized and the value is used to perform the interaction.
METHOD OF RETAINING TRANSACTION CONTEXT
Methods of transaction authentication are provided. In one such method, at least one first transaction has been conducted, the or each first transaction generating data including first data comprising authentication data and second data identifying the or each first transaction, wherein a given first transaction is between a merchant and a card holder. A cryptographically signed and/or encrypted token corresponding to the given first transaction and comprising a characteristic of the first transaction has been generated using at least said second data. The cryptographically signed and/or encrypted token has been transmitted to the merchant. The method comprises receiving, from the merchant, data corresponding to a second transaction and in the event that the data corresponding to the second transaction includes the cryptographically signed and/or encrypted token, responsively authenticating the cryptographically signed and/or encrypted token, whereby to determine an authenticated association between the second transaction and a given first transaction.
Online Transactional Behavior through Decoy Blockchain and Smartdust Sensing Paired with DCNN
The present disclosure provides a security method, a computing platform, and a system for enhanced online transaction security. The method includes receiving transactional information from a user, and distributing the transactional information over a sensor network of the computing platform. The method also includes generating a decoy transactional block that imitates the transactional information within a blockchain network of the computing platform. The method further includes displaying an association page for the user to enter a verification code and deleting the decoy transactional block from the blockchain network based on determining that the transactional information is authentic.
Authorization systems based on protected data
The disclosure describes techniques to protect personal information stored on an electronic card with which an owner of the electronic card may be authorized to perform a transaction. For example, a point-of-sale (POS) device may receive protected data generated by an electronic card where the protected data may be used by a personal information server to identify the owner of the electronic card. The POS devices sends the protected data and transaction information to an authorization server that sends the protected data to a personal information server. The owner's personal information can be obtained or derived from the protected data by the personal information server and the personal information is sent to the authorization server. The authorization server can determine whether a transaction is authorized or unauthorized based on the transaction information obtained from the POS device and the personal information obtained from the personal information server.
Systems and methods for dynamic data generation and cryptographic card authentication
Systems and methods for authentication may include an authentication system. The authentication system may include a processor and a memory. The memory may contain a unique identifier, a counter, a session key, and a PAN sequence number. The processor may be configured to receive an authentication request. The processor may be configured to generate, in response to the authentication request, a virtual card number and a dynamic security code based on mapping with a plurality of parameters of a cryptogram including at least one selected from the group of the unique identifier, the counter, the session key, and the PAN sequence number. The processor may be configured to transmit the virtual card number and the dynamic security code to complete the authentication request.
SYSTEMS AND METHODS FOR DYNAMIC DATA GENERATION AND CRYPTOGRAPHIC CARD AUTHENTICATION
Systems and methods for authentication may include an authentication system. The authentication system may include a processor and a memory. The memory may contain a unique identifier, a counter, a session key, and a PAN sequence number. The processor may be configured to receive an authentication request. The processor may be configured to generate, in response to the authentication request, a virtual card number and a dynamic security code based on mapping with a plurality of parameters of a cryptogram including at least one selected from the group of the unique identifier, the counter, the session key, and the PAN sequence number. The processor may be configured to transmit the virtual card number and the dynamic security code to complete the authentication request.
Systems and methods of managing password using contactless card
A method includes: receiving, by a server from a user device of a user, a message indicating a forgotten password of an online account of the user; verifying, by the server, at least one contactless card associated with the online account; transmitting, by the server to the user device, a first notification requesting the user to tap the at least one contactless card to the user device; receiving, by the server from the user device, a generated cryptogram, wherein the generated cryptogram is generated by the at least one contactless card; comparing, by the server, the generated cryptogram with a stored cryptogram associated with the at least one contactless card; and in response to a determination that the generated cryptogram matches the stored cryptogram, transmitting, by the server to the user device, a second notification indicating the user is authenticated to perform an action related to the forgotten password.
Integration of verification tokens with mobile communication devices
A method is disclosed. The method includes receiving, from a user device via near field communications, a cryptogram, the cryptogram associated with a primary account number. The method includes transmitting, by the computer, to a server computer over a communications network comprising the Internet or a cellular phone network, a request for dynamic account information associated with the primary account number, the request including the cryptogram, wherein the server computer receives the cryptogram and then obtains and sends the dynamic account information to the computer. The method includes receiving, from the server computer over the communications network comprising the Internet or the cellular phone network, the dynamic account information. The method includes conducting, with a merchant computer, a payment transaction using the dynamic account information.
Configuring Verification Information At Point-of-Sale Devices
Techniques and arrangements for dynamically modifying a cardholder verification method (CVM) implemented at a point-of-sale (POS) device. In some instances, the techniques instruct a POS device to determine an attribute associated with a received payment instrument and determine, based on this information and via the issuing entity, whether to implement a default or static CVM or whether to apply a modified or dynamic CVM such that the POS device requests different verification information than if the POS device did not modify the CVM. The modified or dynamic CVM may be implemented if a customer's device, present at the location of the payment transaction, has installed thereon an application of the entity that has issued the payment instrument.