G06Q20/4097

METHOD FOR SECURE TRANSMISSION OF CRYPTOGRAPHIC DATA
20200015081 · 2020-01-09 ·

The invention relates to a method for secure transmission of data between two computer devices, a first device comprising sending means of an analog signal and a second device comprising acquisition means of the analog signal, the method comprising steps, performed by the first device, of: generation of a first analog signal representative of a first cryptographic datum comprising an encryption key, sending of the first analog signal via the sending means included in the first device, to the acquisition means included in the second device, receipt of a second cryptographic datum from the second device, said second datum being at least partly encrypted by means of the encryption key, processing of said second cryptographic datum as a function of the first cryptographic datum, comprising decryption of said second datum.

PAYMENT PROCESSING METHOD AND APPARATUS USING AN INTERMEDIARY PLATFORM
20240037513 · 2024-02-01 ·

A payment processing method and apparatus for using an intermediary platform are described. In one embodiment, the method comprises electronically receiving approval from an intermediary platform associated with a payment processor user of a first authorization request for a first transaction; electronically receiving for approval, at the payment processing system, a second authorization request for a second transaction from a merchant using a payment instrument used by an agent of the service provider; and settling transactions associated with the service provider, including clearing a batch of records corresponding to the service provider on a predetermined time basis by comparing, with a tracking engine of the payment processing system, transaction tracking information associated with authorization requests to net out individual transactions.

TWO-FACTOR AUTHENTICATION THROUGH ULTRASONIC AUDIO TRANSMISSIONS

There is provided systems and methods for two-factor authentication through ultrasonic audio transmissions. A user may utilize a first device request to process a transaction electronically by providing an electronic payment using an online service provider. When utilizing the service provider, authentication for the user's payment instrument and/or the user's account with service provider may require two-factor authentication using a one-time password that is unknown to the user and generated for the specific authentication request. The password may be generated and sent to a second device registered for the user and/or their account. The second device may process an ultrasonic handshake request with the first device, and may respond to the first device with an ultrasonic communication including the password. The first device may then automatically enter the password to the two-factor authentication process.

SECURE DATA SHIELD FOR NETWORKS
20190384933 · 2019-12-19 ·

The present disclosure describes techniques that facilitate a Secure Data Processing (SDP) Network that is configured isolating sensitive data from exposure to a client workstation and a connected web server and application server. Specifically, a secure communications server of the SDP network is described that can interact with a secure input device or a secure plug-in component at the client workstation to receive a set of data associated with the sensitive data. The set of data may correspond to devalued data received via a secure input device or the set of data may be received as sensitive data via a hosted webpage invoked by the secure communications server. The secure communications server may establish a secure communications path with a tokenization server for receipt of a token that represents the sensitive data. The token may then be used by at least the application server to initiate the transaction.

SECURE CONTAINER MUTUAL AUTHENTICATION

Systems and methods for mutual authentication of a user and a container administrator computer system. A container administrator computer system receives a request from a mobile computing device for a user to access a secure container. The request includes a user identifier. The administrator system receives a first authentication factor corresponding to the user. The administrator system authenticates the user by verifying that the first authentication factor matches a first reference authentication factor associated with the user identifier. The administrator system sends a second authentication factor associated with the administrator system to a human-machine interface associated with the secure container or the mobile computing device. The administrator system receives a notification of authentication of the administrator system using the authentication factor. The administrator system transmits an unlock signal to unlock the secure container.

Self-service modular drop safes with technology shelf replacement capability

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

Validation and storage of transaction data for a blockchain
11941619 · 2024-03-26 · ·

A system includes a memory and a processor configured to execute computer instructions stored in the memory that when executed cause the system to perform operations. The operations include receiving transaction data associated with a transaction via a transaction component. The operations include incorporating at least a portion of the transaction data into a security process associated with challenge-response authentication of a data block for the transaction data. The data block includes cryptographic hash data for another data block in a blockchain associated with the data block. The operations include validating the data block associated with the blockchain based on the security process.

Offline data transfer between devices using gestures
11914880 · 2024-02-27 · ·

A system is provided including a first server storing a first data file for a first user, a second server storing a second data file for a second user, a first data card of the first user registered with the first server and locally storing a portion of the first data file, and a second data card of the second user registered with the second server and associated with the second data file. The first data card detects a pairing gesture between the first and second data cards, and in response, establishes a peer-to-peer connection between the data cards.

User Authentication Based on Account Transaction Information in Text Field

Methods, systems, and apparatuses are described herein for authenticating access to an account using questions which allow users to provide textual information about transactions conducted by an account. A machine learning model may be trained to predict the guessability of merchants. A request for access to an account may be received, and transaction data for that account may be received. An authentication question may be presented. For example, a user may be prompted to list places they have shopped recently. A user response comprising text data may be received. The text data may be processed to identify one or more merchants. If the one or more merchant(s) are represented in the transaction data, the machine learning model may be used to determine the guessability of the one or more merchants. An authentication score may be determined based on the guessability, and access to the account may be provided.

Computer-based system for provisioning new accounts using location-based authentication

A method comprises receiving, by a computing device from a customer device, a request to provision a financial account for the customer, associating, by the computing device, a mobile device with the requested financial account, and sending, by the computing device to the mobile device, authentication information for the requested financial account. The method further includes receiving the authentication information by the computing device from a financial terminal that received the authentication information from the mobile device, receiving, by the computing device, first location information of the mobile device, and provisioning, by the computing device and based on the first location information of the mobile device being within a predetermined distance of a location of the financial terminal, the requested financial account for the customer.