G06Q20/4093

SYSTEMS AND METHODS FOR DEVICE AND USER AUTHORIZATION
20240419775 · 2024-12-19 ·

Systems and methods are described for authorizing users and/or devices. An example method may comprise receiving, from a user device, a request to access a function associated with a service account. The request may comprise an identifier of the user device. The example method may comprise determining, based on the identifier, a primary authority holder of the service account. The example method may comprise determining that a first record on a first distributed ledger associated with the primary authority holder indicates that the user device is associated with the primary authority holder. The example method may comprise determining that a second record on a second distributed ledger associated with the user device indicates that the user device is associated with the primary authority holder. The example method may comprise granting, based on the request, the first record, and the second record, the user device access to the function.

Communications server apparatus, method and communications system for managing authentication of a user

A communications server apparatus for managing authentication of a user based on one or more authentication events in a session is provided, to, in one or more data records, generate, for each authentication event, data indicative of a trust score corresponding to the authentication event; and generate, data indicative of a security score based on the trust scores corresponding to the one or more authentication events in the session, and, in response to receiving request data indicative of an authentication request associated with the user corresponding to a transaction in the session, the transaction having a value indicator, authenticate the user if the security score satisfies a condition for authentication corresponding to the transaction according to the value indicator, wherein security scores for satisfying the condition are variable according to value indicators of transactions.

Method for determining an association between a bankcard and a communications terminal, device, system and corresponding program

A method for determining an association between a bankcard identifier and at least one mobile communications terminal identifier. The method is implemented by an electronic device and includes: obtaining an identifier of a current bankcard, a bankcard used to make a purchase of an article or a service by using a payment terminal, the obtaining being implemented at the time of the execution of a payment transaction made by using the bankcard; at least one step of obtaining a piece of data representative of at least one communications terminal identifier; and computing a score of correspondence between bankcard identifier and the at least one piece of data representative of a communications terminal identifier.

Antifraud resilient transaction identifier datastructure apparatuses, methods and systems

The Antifraud Resilient Transaction Identifier Datastructure Apparatuses, Methods and Systems (ARTID) transforms PIN, unique user identifying device datastructure inputs via ARTID components into secure payment authorization outputs. The ARTID includes a virtual secure element datastructure transaction apparatus, comprising, a memory, a component collection in the memory, and a processor disposed in communication with the memory, and configured to issue a plurality of processing instructions from the component collection stored in the memory. ARTID includes instructions to: obtain request to generate a tamper resistant asset account from a requestor, and instantiate a new tamper resistant asset account, wherein the account is populated with the requestor identifier, unique requestor device identifier, a secure cryptographic element for the tamper resistant account. ARTID also includes instructions to provide a message to generate a new physical account card and an associated virtual account card associated with the tamper resistant asset account, and obtain a request to engage the virtual account card in a transaction, wherein the request includes the user access credential. ARTID also includes instructions to generate a card access event message from the request to engage the virtual account card, provide the card access event message to a payment network, and obtain a card access event authorization response.

AUTOMATIC DATA TRANSFER

A first request for a transfer of data is transmitted in response to the use of a user device; it is determined that the first request for the transfer of data has been declined; an event is detected that indicates that the transfer of data in response to the use of the user device can be accepted; and a second request for the transfer of data is transmitted in dependence on detecting that the event has occurred.

DYNAMIC OFFLINE CARD AUTHORIZATION
20170278324 · 2017-09-28 ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating rules to apply to fare transactions when a fare card reader cannot communicate with an authorization server, for generating historical data and a risk score for a fare card that are used by a fare card reader, with the rules, to determine whether to authorize access to a transit service when the fare card reader cannot communicate with the authorization server, and for selectively permitting or denying access to the transit service using the rules and the historical data or the score for a fare card.

BLOCKING FRAUDULENT TRANSACTIONS IN AN NFC DEVICE

The invention relates to an NFC device configured for receiving a request to perform a transaction. In response to receiving the request, sensor data from one or more sensors of the NFC device is fed into a first classifier. The sensor data comprises environment parameters of the NFC device. The first classifier determines if sensor data provided as input to the first classifier were sensed in a transaction-typical environment or in a transaction-atypical environment. In case the first classifier determines that the sensor data is indicative of a transaction-atypical environment, the first classifier blocks the transaction or requests a user to confirm the transaction and blocks the transaction until the confirmation is received.

HIERARCHICAL BLOCKCHAIN ARCHITECTURE FOR GLOBAL TRADE MANAGEMENT

Described is a reactive hierarchical blockchain architecture, system, and methodology for Global Trade Management (GTM). The system includes a comprehensive suite of GTM applications and leverages multi-national content to deliver efficient cross-border transactions anywhere in the world. The tiered computer-implemented system and method allow development of distributed GTM blockchain solutions capable of processing enormous amounts of global content at scale to meet huge transaction volume. The hierarchical blockchain architecture further assures scalability of the GTM solutions described herein by reducing the need for performing extensive calculations on multiple blockchain nodes. The GTM blockchain systems can be standalone or they can feed information into one or more main International Trade (ITC) blockchains. Smart contracts for specific GTM operations are segregated among appropriate childchains and verified by integrated GTM applications executed on permissioned nodes.

ACCOUNT LINKING INDEX STRUCTURE IN A NETWORK
20250053978 · 2025-02-13 ·

A computer-implemented method for constructing an index structure in a real-time payment network includes: receiving a first set of transaction information comprising data field entries relating to a user; creating a data record in the index structure for the user; inserting the data field entries in the first set of transaction information into the data record; receiving a second set of transaction information comprising data field entries; determining if the second set of transaction information is associated with the user, wherein at least one data field entry in the second set of transaction information is different to a corresponding data field entry in the first set of transaction information; and inserting the data field entries in the second set of transaction information into the data record if the second set of transaction information is determined to be associated with the user.

Methods and systems for multi-factor authentication based payment

Embodiments provide methods and systems for analyzing device behavior data in multi-factor authentication (MFA) process. The method includes receiving, by a server system, a request in association with a payment transaction between a cardholder and a merchant. The request includes a cardholder identifier and information of a successful verification of a user input entered by the cardholder to perform MFA of the payment transaction. The method includes identifying user profile data stored in a database based on the cardholder identifier. The user profile data includes information of a plurality of registered user devices associated with the cardholder. The method includes performing device behavioral analysis of one or more user devices. The method includes generating an MFA token associated with the payment transaction based on the device behavioral analysis. The method includes transmitting the MFA token for authorizing the payment transaction to a payment server associated with a payment network.