G06Q20/4097

Enhanced automated teller machine, system and method for securely enabling a financial transaction at the automated teller machine

An enhanced automated teller machine (ATM), system and method for securely authenticating and enabling a financial transaction at the ATM. The method includes receiving at a central computer system, planned transaction data representing a future financial transaction. The central computer system generates first and second verification information, sends electronic data including the first verification information to the ATM, and sends electronic data including the second verification information to a user device. The central computer system receives multiple sets of electronic data from a user device and multiple sets of electronic data from the ATM. Multiple comparisons of certain sets of the electronic data from the ATM to certain sets of the electronic data from the user device are conducted at the central computer system. If the comparisons result in positive verifications, the central computer system sends electronic data including instructions for the ATM to execute the planned financial transaction.

Fraud detection in portable payment readers
10878418 · 2020-12-29 · ·

A payment reader and a POS terminal may communicate over a wireless connection. The methods and systems include receiving, from POS terminal, a request for establishing a network connection with the payment card reader. The server determines whether the payment card reader is associated with the POS terminal or a payment application thereon. If the payment card reader is not associated with the POS terminal or the payment application thereon, the server determines the probability of the request being fraudulent.

Unique transaction identifier, which may also include a time expiration value, is assigned by a first network website to an electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to said first network website
20200402046 · 2020-12-24 ·

This invention discloses a system and methods for defeating a so-called man-in-the-middle (MITM) attack. An electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to a first network website, is generated by said first network website and that electronic instruction is assigned a unique onetime identification token. Said electronic instruction with said unique onetime identification token is transmitted by said first network website to said local/mobile computing device. Said unique onetime identification token is also maintained in a database of unique onetime identification tokens resident on said first network website. In addition, said unique onetime identification token is sent to a secondary network website, where it is also stored in a database of unique onetime identification tokens. Said unique onetime identification token may also contain a time expiration value which defines the validity period for said unique transaction identifier.

SYSTEMS AND METHODS FOR DIGITAL IDENTITY VERIFICATION

Systems and methods for digital identity verification are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for digital identify verification may include: (1) receiving, from a user electronic device or at a website, an image of an identity document for a user, the identity document comprising an image of the user; (2) processing the identity document with at least one business-specific rule; (3) extracting identity information from the identity document; (4) determining a match rate of the image of the user on the identity document to a captured image; (5) assigning a verification score to the user based on extracted identity information and the match rate; and (6) publishing the verification score to at least one system.

System, Method, and Apparatus for Securely Transmitting Data via a Third-Party Webpage

Provided is a computer-implemented method for securely receiving data via a third-party webpage, including: generating configuration data in response to a request from a first system, the configuration data including a public key of a first key pair; digitally signing the configuration data based on a private key of a second key pair; transmitting the configuration data to the first system, the configuration data including code configured to facilitate the first system to embed a plurality of frames in a webpage, wherein the plurality of frames loads content from a domain that is independent from a domain that hosts the webpage; and verifying the configuration data based on a public key of the second key pair. The computer-implemented method may also include receiving, from a master frame of the plurality of frames, encrypted data. Systems and computer program products are also provided.

SYSTEM AND METHOD FOR CUSTOMER INITIATED PAYMENT TRANSACTION USING CUSTOMER'S MOBILE DEVICE AND CARD
20200380495 · 2020-12-03 ·

A system for a customer-initiated payment transaction includes a mobile device of a customer and a payment card of the customer. The mobile device includes a mobile application or a digital wallet, on which a customer may register one or more of a plurality of payment methods. The mobile application or the digital wallet may be activated to establish a point-of-sale (OIS) system on the mobile device and include a process to authenticate the customer.

System and Method for Dynamic Knowledge-Based Authentication
20200382327 · 2020-12-03 ·

The present disclosure relates to knowledge based authentication whereby a user is authenticated through third-party linked accounts. The method includes receiving an authentication request from a merchant computer, assessing one or more data fields to generate an authentication challenge for the user, connecting to one or more third-party account service provider to extract user-related data, generating the authentication challenge based on the extracted user-related data from the third-party account service provider, posing the authentication challenge to the user on a user device, receiving a response to the authentication challenge, and returning the authentication response to the merchant.

System and method for generation of virtual account-linked card

Embodiments of systems and methods for generating virtual account-linked cards are described. A virtual account-linked card may be generated in response to a determination that a physical account-linked card has been forgotten at a card reader and ingested by the card reader. A virtual account-linked card may be restricted such that it can only be used to execute a transaction with authorized transaction partners identified in a database.

System and method for providing payment service
10846681 · 2020-11-24 · ·

The present invention relates to a system and method for providing a payment service of a two-channel authentication method utilizing a card reader infrastructure and a portable user terminal. The system for providing a payment service according to an aspect of the present invention includes an affiliate POS terminal configured to receive MIN card information and generate and transmit a transaction approval request signal, and a server configured to receive the transaction approval request signal, transmit a transaction authentication request signal to a portable user terminal, and transmit approval request information to a financial institution server when transaction authentication is completed from an input signal of the portable user terminal.

SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.