G06Q20/4093

Folding contactless card payment authentication

A folding mechanism is used to authenticate purchases when making transactions using a contactless smart card. By folding the contactless card in a precise manner, the electrical resistance of the antenna circuit of the contactless card is changed by bypassing the card's built-in resistors. A user may set a folding orientation as the password of the contactless card. This folding orientation determines the electrical resistance of the card necessary to authenticate a purchase.

METHOD AND APPARATUS FOR PROCESSING FAILURE OF CIPHER CHANGE OF CIPHERTEXT IN DATABASE
20190042367 · 2019-02-07 ·

A method for processing cipher change failure comprises: storing a record's error information when a cipher change of ciphertext data in the record fails, the error information comprising an identifier of the record and a failure cause; determining a retry strategy based on the stored failure cause; and employing the retry strategy to reperform the cipher change of the ciphertext data in the record having the identifier.

ENHANCING WEBPAGE FUNCTIONALITY
20190034393 · 2019-01-31 · ·

A method for enhancing functionality of a payment webpage, the method including, in a browser application configured to display the payment webpage on a client device: obtaining payment webpage code corresponding to the payments payment webpage to be displayed; obtaining executable code; using the executable code to: identify payment elements corresponding to at least one existing payment option forming part of the payment webpage; determine at least one additional available payment option; generate additional payment elements corresponding to the at least one additional available payment option; using the payment webpage code and the additional payment elements to display the payment webpage, the payment webpage including the at least one additional available payment option to thereby enhance the functionality of the payment webpage; and, during user interaction with the payment webpage: determining user interaction with at least one of the additional payment elements in accordance with user input commands; and, using the executable code to cause a payment to be performed at least partially in accordance with the determined user interaction.

PROCESSING ELECTRONIC PAYMENTS ON A MOBILE COMPUTER DEVICE
20190026741 · 2019-01-24 ·

A device for processing electronic payments for the purchase of goods or services is provided. The device includes one or more computer processors in communication with non-transitory computer readable data storage and a display. The data storage includes instructions stored thereon that, when executed by the one or more processors, cause the device to execute a transaction process including receiving purchase data representing one or more goods or services to be purchased, receiving user input to effect a payment transaction, determining a total transaction amount from the purchase data, reading payment credentials from a purchaser's payment device, sending a payment request, receiving data representing a received one time password (OTP), sending the received OTP to the third party authorization server for authentication against a OTP sent by the third party authorization server to a mobile device, and receiving data representing successful authentication from the third party authorization server.

METHOD AND DEVICE FOR OUTPUTTING RISK INFORMATION AND CONSTRUCTING RISK INFORMATION

The present application discloses methods and devices for providing risk information. A risk factor corresponding to a risk control decision result of a service that matches service data for a corresponding risk factor is determined. The risk factors are associated with risk control rules and a risk control model identifying relationships between risk factors and risk control decision results. A risk information set corresponding to the risk factor is determined that includes levels of risk information having different refinement degrees and including information explaining a cause of the risk control decision result. The levels of risk information are determined from the levels of risk information based on a risk information requirement level of a service owner of the service. The levels of risk information have refinement degrees matching the risk information requirement level of the service owner. The levels of risk information are provided to the service owner.

Interface-Specific Account Identifiers

An access management system comprises one or more databases and one or more computers. The one or more databases may store access data, accessor data, restriction data, and/or biometric data. The one or more computers may comprise an account identifier management computer, an authorization server computer, and/or an account management server computer. The account identifier management computer may generate account identifiers for physical or virtual cards. The cards may have interface-specific account identifiers. The authorization server computer may be communicatively coupled to an account access system that is used to obtain account identifiers as input. The authorization server computer may apply one or more restrictions to an account identifier. The account identifier management server computer may enable monitoring account activity and/or generate ephemeral phone numbers that can be used to authenticate callers to call recipients.

DEFENSE AGAINST CREDIT CARD THEFT FROM POINT-OF-SALE TERMINALS
20180374071 · 2018-12-27 ·

A security system for point of sale (POS) terminals, including one or more POS processors for injecting decoy credit cards numbers into memories of corresponding one or more POS terminals, a secure database including entries of the decoy credit card numbers and, for each entry, a corresponding identifier of a specific POS terminal and a corresponding date & time, and a security manager receiving a notification of attempted use of a specific decoy credit card number, extracting the POS identifier and the date & time corresponding to the specific decoy credit card number from the database, identifying legitimate credit card numbers that were processed by the identified POS terminal during a time period including the date & time corresponding to the specific decoy credit card number, and alerting an authority that the legitimate credit card numbers may have been compromised.

Transparently reconstructing sniffed network traffic over a back-end data communications network to reconstruct payment card transactions for generating user notifications during transactions

Embodiments of the present invention provide systems and methods for generating policy-based transaction alerts. In accordance with the systems and methods, an alert generation engine transparently detects ongoing transactions without participating in the transaction path, and generates policy-based alerts.

FOLDING CONTACTLESS CARD PAYMENT AUTHENTICATION

A folding mechanism is used to authenticate purchases when making transactions using a contactless smart card. By folding the contactless card in a precise manner, the electrical resistance of the antenna circuit of the contactless card is changed by bypassing the card's built-in resistors. A user may set a folding orientation as the password of the contactless card. This folding orientation determines the electrical resistance of the card necessary to authenticate a purchase.

Biometric Device Utilizing Finger Sequence for Authentication
20180365689 · 2018-12-20 ·

A system and method for enhancing biometric security utilizing a fingerprint sequence authentication process. The method comprising, during an enrollment period for an electronic transaction system, obtaining a set of fingerprint templates associated with a registering user; storing the fingerprint templates on a memory of the electronic transaction system; determining an verification sequence unique to the registering user, wherein the verification sequence comprises a pattern of entering fingerprint images; and associating the verification sequence with the stored set of fingerprint templates to be used for a subsequent authentication of the registering user.