Patent classifications
G06Q20/4097
Step-Up Trusted Security Authentication Based on Wireless Detection and Identification of Local Device(s) with Unique Hardware Addresses
Information security processes, systems, and machines for authenticating users, wirelessly detecting a user's local devices, calculating a trust score based on the local devices, and setting a transaction limit are disclosed. An ATM or POS machine can read a card, authenticate a user, and wirelessly read MAC or other unique hardware addresses for one or more of the user's local devices. Trust scores can be calculated based on the number of local devices that are detected in relation to the number of the user's devices that are registered, the historical presence of the user's devices during prior transactions, historical usage of the ATM or POS machine, geolocating, biometric authentication(s), etc. Dynamic transaction limits, types, and rights may be set for transactions corresponding to the trust score values. Transactions may be conducted wholly or partially in a contactless fashion.
User Authentication Based on Account Transaction Information in Text Field
Methods, systems, and apparatuses are described herein for authenticating access to an account using questions which allow users to provide textual information about transactions conducted by an account. A machine learning model may be trained to predict the guessability of merchants. A request for access to an account may be received, and transaction data for that account may be received. An authentication question may be presented. For example, a user may be prompted to list places they have shopped recently. A user response comprising text data may be received. The text data may be processed to identify one or more merchants. If the one or more merchant(s) are represented in the transaction data, the machine learning model may be used to determine the guessability of the one or more merchants. An authentication score may be determined based on the guessability, and access to the account may be provided.
Systems and methods for using information from wearable devices
Systems and methods for the of use information from application programming interfaces on wearable devices in third party applications are provided. A system comprising a user device, data storage, an application programming interface and an application is provided. In this system, there is a user device that includes a health monitor. The health monitor includes sensors and associated software that enable it to obtain health information about the wearer of the user device. In this system, there is data storage on the user device that stores the health information as user health data. In this system, there is an application programming interface on the user device that enables the health monitor to share the user health data with other applications executing on the user device.
Sensitive data shield for networks
The present disclosure describes techniques that facilitate a Secure Data Processing (SDP) Network that is configured isolating sensitive data from exposure to a client workstation and a connected web server and application server. Specifically, a secure communications server of the SDP network is described that can interact with a secure input device or a secure plug-in component at the client workstation to receive a set of data associated with the sensitive data. The set of data may correspond to devalued data received via a secure input device or the set of data may be received as sensitive data via a hosted webpage invoked by the secure communications server. The secure communications server may establish a secure communications path with a tokenization server for receipt of a token that represents the sensitive data. The token may then be used by at least the application server to initiate the transaction.
Systems and methods for automated fraud detection and analytics using aggregated payment vehicles and devices
Systems and methods are disclosed for automated fraud detection and analytics using aggregated payment vehicles and devices, at the individual and/or household level. One method includes receiving an authorization request for a payment transaction originating at a merchant, using a first payment vehicle; receiving device information of a first device used in the payment transaction; retrieving transaction data and identifying information associated with the authorization request before the authorization request is routed to a financial institution; searching and determining payment vehicles and devices associated with the individual using the retrieved identifying information; aggregating transaction data associated with the payment vehicles and devices from the transaction database; retrieving reported fraudulent activities pertaining to the payment vehicles and devices; and generating a profile data for the individual according to the identifying information associated with the authorization request, personally identifiable information (PII), the aggregated transaction data, and reported fraudulent activities.
OFFLINE DATA TRANSFER BETWEEN DEVICES USING GESTURES
A system is provided including a first server storing a first data file for a first user, a second server storing a second data file for a second user, a first data card of the first user registered with the first server and locally storing a portion of the first data file, and a second data card of the second user registered with the second server and associated with the second data file. The first data card detects a pairing gesture between the first and second data cards, and in response, establishes a peer-to-peer connection between the data cards.
SECURE MANAGEMENT OF ACCOUNTS ON DISPLAY DEVICES USING A CONTACTLESS CARD
Systems, methods, apparatuses, and computer-readable media for secure management of accounts on display devices using a contactless card. An application executing on a display device may receive a request specifying a service provider. The display device may receive a cryptogram generated a contactless card, and transmit the cryptogram to an authentication server. The authentication server may decrypt the cryptogram and generate a virtual account number associated with the contactless card. The authentication server may transmit the virtual account number to the service provider, which may create an account based at least in part on the virtual account number and the decryption of the cryptogram by the authentication server. The display may receive an authentication token generated by the service provider for the account, and access the account created by the service provider based at least in part on the authentication token.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SECURE PAYMENT DEVICE DATA STORAGE AND ACCESS
Provided are a system, method, and computer program product for secure payment device data storage and access. The method includes storing payment device data associated with a payment device of a user and generating a unique uniform resource locator (URL) associated with the payment device. The method also includes transmitting the unique URL to an application provider system through a first communication channel and receiving a data access request from the client device via the unique URL through a second communication channel separate from the first communication channel. The method further includes, in response to receiving the data access request, verifying an identity of the user by executing a step-up authentication protocol. The method further includes, in response to verifying the identity of the user, transmitting a data access response including the payment device data to the client device through the second communication channel.
INFORMATION PROCESSING APPARATUS, METHOD AND SYSTEM
An information processing system for associating a first party and a second party can include a second information processing apparatus that receives a message from a first information processing apparatus comprising information identifying the second party; generates a code associated with the second party; transmits a message comprising the code to the first information processing apparatus; receives a message comprising the code and information identifying the first party from a third information processing apparatus that receives an authentication credential from the first party; associates the first and second parties; transmits a message comprising information indicating the association of the first and second parties to the third information processing apparatus; receives a message comprising information indicating the approval of the association by the first party from the third information processing apparatus; and transmits a message comprising information indicating the approval of the association to the first information processing apparatus.
CUSTOMIZABLE DIGITAL ASSET-BASED INTERACTION PREFERENCES
A method includes storing, by a digital asset-based interaction computing entity of a digital asset-based interaction system, a set of second computing entity interaction preferences pertaining to digital asset-based interactions involving a second computing entity. The method further includes obtaining first and second computing entity real-time information from one or more of a first computing entity of the digital asset-based interaction system and the second computing entity. The digital asset-based interaction involves the first computing entity providing an amount of digital assets and the second computing entity accepting desired assets in a desired asset format. The method further includes facilitating the digital asset-based interaction in accordance with the first and second computing entity real-time information, the set of second computing entity interaction preferences, a real-time digital asset-based interaction process, and a nonreal-time digital asset-based interaction process.