G06Q20/4093

CONFIGURABLE DATA CONTAINER FOR FRAUD DETECTION SYSTEM
20220076263 · 2022-03-10 ·

Systems, methods, and non-transitory computer readable media for generating a configurable data container that includes a first data field, exporting the configurable data container for use by a client-side device, receiving a modification to the configurable data container, automatically binding the second data field to a second data path for retrieval of a second data value to be used in a second fraud detection rule, generating an updated configurable data container, and exporting the updated configurable data container for use by the client-side device. The first data field corresponds to a first data path for retrieval of a first data value to be used in a first fraud detection rule. The configurable data container includes a server-side schema and a client-side schema. Each of the server-side schema and the client-side schema is configured to validate a first input data value corresponding to the first data field.

Digital passport with verified data provenance

Systems and methods for accurately and securely assembling, storing, and leveraging travel data are provided. A method may include detecting a travel event of a user. The method may include recording the travel event in a travel map that is stored in a database. The travel map may be a temporal- and spatial-based record of one or more travel events of the user. The travel map may be stored as a blockchain ledger. The method may include tokenizing sensitive information associated with the user in the database, and calculating a hazard vector. The method may include updating, based at least in part on the hazard vector, a status index associated with the user, and providing the user and a system administrator access to the travel map and the status index. Access may be provided via an online portal configured to be viewed via an application running on a mobile device.

DIGITAL PASSPORT WITH VERIFIED DATA PROVENANCE

Systems and methods for accurately and securely assembling, storing, and leveraging travel data are provided. A method may include detecting a travel event of a user. The method may include recording the travel event in a travel map that is stored in a database. The travel map may be a temporal- and spatial-based record of one or more travel events of the user. The travel map may be stored as a blockchain ledger. The method may include tokenizing sensitive information associated with the user in the database, and calculating a hazard vector. The method may include updating, based at least in part on the hazard vector, a status index associated with the user, and providing the user and a system administrator access to the travel map and the status index. Access may be provided via an online portal configured to be viewed via an application running on a mobile device.

SYSTEMS AND METHODS FOR USER AUTHENTICATION USING CARD-SWIPE SEQUENCE

Systems and methods for user authentication using an authentication sequence are disclosed. The disclosed systems and methods may include a computing device for authenticating a user. The computing device may include at least one processor and at least one computer-readable medium. The at least one computer-readable medium can containing instructions that, when executed by the at least one processor, cause the computing device to perform operations. The operations may include receiving an authentication sequence provided by one or more authentication objects and authenticating the user based on the authentication sequence. The authentication sequence can be a card-swipe sequence and authentication can be performed based on characteristics of the card-swipe sequence, such as the cards used, the order the cards are used in the sequence, the timing of card use, and the type of card swipe.

Smart card, method for outputting validation data, and method for responding to operation request
11151574 · 2021-10-19 · ·

A smart card, a method for outputting validation data, and a method for responding to an operation request are provided. The method for outputting validation data includes acquiring an operation request by a smart card; acquiring smart card operation information of the smart card by the smart card, after acquiring the operation request, wherein the smart card operation information comprises at least a smart card mode factor for indicating a working mode of the smart card, and the working mode of the smart card comprises a non-contact communication mode and/or a contact communication mode; acquiring a validation data generating strategy, and using the validation data generating strategy to process at least the smart card operation information to obtain validation data by the smart card; outputting the validation data by the smart card after obtaining the validation data.

Securing a transaction by means of a smart card and smart card
11151338 · 2021-10-19 · ·

Disclosed is a method of managing a smart card configured for securing a transaction with an external device via a card reader, the method including the following steps: incrementing at least one command counter of commands received by the smart card during a transaction; and depending on the current value of the at least one counter and a command profile, implementation of a smart card management command.

DUAL CONTROLS FOR PROCESSING ELECTRONIC TRANSACTIONS

Methods and systems are presented for enabling an online service provider to process transaction requests according to a dual control workflow using multiple transaction processing systems that are only configured to process transaction requests according to a single control workflow. A dual control module is implemented between an interface server and the transaction processing systems. The dual control module may intercept transaction requests from the interface server. The dual control module may withhold transaction requests from being sent to any one of the transaction processing systems until a set of criteria is satisfied according to the dual control workflow. The dual control module may obtain approvals and/or denials from designated approvers. Once the set of criteria is satisfied for a transaction request, the dual control module may forward the transaction request to one of the transaction processing systems for processing.

SYSTEMS AND METHODS FOR PROCESSING OFF-NETWORK TRANSACTION MESSAGES

A method for applying services hosted on a second interchange network to a transaction initiated over a first interchange network includes transmitting, by a first processor associated with the second interchange network to a requestor computing device, data element layouts usable to map service requests associated with payment transactions received over the first interchange network into the second message format, and for service responses generated by a services platform hosted on the second interchange network. The method also includes receiving a service request from the requestor computing device including request data associated with a transaction initiated on the first interchange network, generating, by the services platform, response data by applying at least one registered service to the service request, and transmitting a services response including the response data, wherein the previously transmitted second data element layout enables the requestor computing device to extract the response data from the services response.

SYSTEMS AND METHODS FOR DEVICE AND USER AUTHORIZATION
20210312034 · 2021-10-07 ·

Systems and methods are described for authorizing users and/or devices. An example method may comprise receiving, from a user device, a request to access a function associated with a service account. The request may comprise an identifier of the user device. The example method may comprise determining, based on the identifier, a primary authority holder of the service account. The example method may comprise determining that a first record on a first distributed ledger associated with the primary authority holder indicates that the user device is associated with the primary authority holder. The example method may comprise determining that a second record on a second distributed ledger associated with the user device indicates that the user device is associated with the primary authority holder. The example method may comprise granting, based on the request, the first record, and the second record, the user device access to the function.

Authentication of mobile device for secure transaction
11132694 · 2021-09-28 · ·

There are provided systems and methods for authenticating a mobile device for use in a secure transaction. A user having a master device authenticated for use in a secure transaction system, such as an electronic payment system, identifies a secondary device to be enabled for use in processing a secure transaction. The secondary device connects to a companion device and shares information associated with the secondary device and companion device with a transaction processing server, which returns authentication information associated with both devices. When the user initiates a secure transaction, the secondary device identifies whether the third device is in proximity. The secure transaction is processed only if the second and third devices are in communication and authenticated during the transaction. If the secondary device is lost or stolen, the device may be disabled until reauthenticated through the master device.