Patent classifications
G06Q20/4093
SYSTEM AND METHOD FOR DYNAMIC MULTIFACTOR AUTHENTICATION
A method of authenticating a user. The method comprises the step of sending an authentication request to a remote authentication device and generating a first piece of authentication information. A mobile device receives the first piece of authentication information from either an access terminal or the remote authentication device. The mobile device of the user generating a second piece of authentication information which is at least partially based on the received first piece of authentication information. The second piece of authentication information is sent to the remote authentication devices and the second piece of authentication information validated. If the second piece of authentication information is successfully validated an authentication signal is generated.
Virtual code-based control system, method, and program, control device, and control signal generating means
The present invention relates to virtual code-based control system, method and program, a control device and a control signal generating means. A control method on the basis of a control signal comprising a virtual code according to an embodiment of the present invention comprises: a control signal receiving step for a control module receiving, from a control signal generating means, a control signal generated by means of combining a plurality of specific codes in accordance with a particular rule; a step for the control module extracting the plurality of specific codes comprised in the virtual code; and a command searching step for the control module searching for a storage location comprising a particular command on the basis of the plurality of specific codes.
SYSTEMS AND METHODS FOR AUTHENTICATION OF ACCESS TOKENS
Systems and methods for authentication may include a first device including a memory, a communication interface, and one or more processors. The memory may include a counter value, transmission data, and at least one key. The one or more processors may be in communication with the memory and communication interface. The one or more processors may be configured to create a cryptogram using the at least one key and counter value, wherein the cryptogram includes the counter value and the transmission data; transmit the cryptogram via the communication interface; update the counter value after cryptogram transmission; receive an encrypted access token via the communication interface; decrypt the encrypted access token; store the decrypted access token in the memory; and transmit, after entry of the communication interface into a communication field, the access token via the communication interface for access to one or more resources, wherein the access token is encrypted.
SYSTEMS AND METHODS FOR SECURE REPROVISIONING
Systems and methods for authentication may include a first device having an association with a first account, including a memory containing one or more applets, a counter value, and transmission data, a communication interface, and one or more processors in communication with the memory and communication interface. The first device may create a cryptogram based on the counter value, wherein the cryptogram includes the counter value and the transmission data. The first device may transmit, after entry of the communication interface into a communication field, the cryptogram, and update, after transmission of the cryptogram, the counter value. The first device may receive, via the communication interface, one or more encrypted keys and one or more parameters. The first device may decrypt the one or more encrypted keys and, after decryption of the one or more encrypted keys, switch an association from the first account to a second account.
Systems and methods for cloud-based testing of POS devices
A computer-implemented method for cloud-based testing of a payment network may include receiving a test configuration for testing a payment processing network, configuring a simulated worker generator for generating a plurality of simulated workers according to the received test configuration, reading commands to be executed by each simulated worker among the plurality of simulated workers from a command bank according to the received test configuration, configuring the plurality of simulated workers according to the commands and the received test configuration, starting a swarm test of the payment processing network by the plurality of simulated workers, reading results of the swarm test from the plurality of simulated workers, and saving the results to storage.
SYSTEMS AND METHODS FOR ARTIFICIAL INTELLIGENCE CONTROLLED PRIORITIZATION OF TRANSACTIONS
Systems and methods for artificial intelligence transaction priority control are presented. Transaction priority control may be provided in the context of online user accounts maintained by financial institutions. Transaction priority control may be obtained through querying transaction information from a database, applying a predictive model to determine a likely future transaction, assigning a priority score to the future transaction, and approving or denying the future transaction based on the priority score.
SYSTEM AND METHOD FOR IDENTITY VERIFICATION
Representative embodiments set forth techniques for verifying an identity of a primary user of a primary account on a client device. A method may include receiving, for the primary account, a request for identity verification responsive to an action of a secondary account associated with the primary account and identifying a payment registration characteristic of a payment registration associated with the primary account. The method also includes retrieving identity information associated with the primary account based on the payment registration characteristic and, in response to a determination that the identity information corresponds to a verification indicator, verifying an identity of a user of the primary account. The method also includes, in response to verifying the identity of the user of the primary account, generating a payment verification token and associating the payment verification token with an authorization indication for the action of the secondary account.
SYSTEMS AND METHODS FOR USE IN MANAGING DIGITAL IDENTITIES
Systems and methods are provided for managing digital identities associated with users. One exemplary method includes receiving, at a computing device, an encrypted message from a communication device associated with a user where the message includes a changed attribute for the user. The method also includes generating a first hash of a first digital identity for the user with the changed attribute and generating a second hash of a second digital identity of the user stored in a ledger data structure. And, in response to the first hash not matching the second hash, the method then includes broadcasting a pending status of the first digital identity to a relying party for the second digital identity, and storing a certification of the changed attribute, received from the relying party in response to the pending status, based on verification of the changed attribute by the relying party.
LIVE CARD TRACKING
A method for use with a smart card is provided. The smart card may include a communication interface, a housing, a microprocessor embedded in the housing, a battery for powering the communication interface and the microprocessor, and a nano GPS chip, located within the housing and in electronic communication with the communication interface and the microprocessor. The thickness of the smart card is preferably no greater than 0.8 millimeters (“mm”) and has surface area not greater than 86 mm×54 mm. The method may include determining the location of the smart card in response to a request for a smart card transaction authorization and determining the location of a mobile device associated with a specified user of the smart card. Based on the location of the smart card and the location of the mobile device, the smart card may calculate a location delta between the smart card and the mobile device. If the location delta is greater than or equal to a threshold distance, the smart card may deny the request for smart card transaction authorization.
AUTHORIZATION CONTROL NETWORK AND METHOD OF VALIDATING AN AUTHORIZATION REQUEST
An authorization control network includes at least one computer server. The server(s) receives a cardholder credential and a profile modification request from a communications device, and determines an account attribute by querying a profile database with an account identifier. The server(s) rejects the modification request if the server determines from the account attribute that a limit profile associated with the account identifier is linked to a cardholder credential other than the received cardholder credential. The server(s) then receives from a POS device an authorization request that includes the account identifier and an authorization value. If the server(s) determines that the authorization value does not exceed a limit value saved in the limit profile and does not exceed a credit amount associated with the account identifier in a transactions database, the server(s) generates an authorization response confirming authorization of the authorization value, and transmits the authorization response to the POS device.