Patent classifications
G06Q20/4097
DELAYED USER AUTHENTICATION
Techniques are disclosed relating to a delayed presentation of authentication challenge for users, such as in the context of a chat session. In various embodiments, a server system receives an indication of a request for service initiated by a user in a chat session within an application executed by a client device. The request for service involves an authentication of the user that is dependent on the authentication being successfully completed within a particular time period after the authentication is initiated. The server system delays the initiation of authentication for the request for service until a readiness condition is satisfied. The readiness condition includes the server system being available to process the request for service, as well as subsequently detecting engagement with the user relating to the request for service. In response to the readiness condition being satisfied, the server system initiates the authentication of the user.
System, method, and computer program for dynamically identifying a merchant associated with an authorization request for a payment card
The disclosure is directed to a system, method, and computer program for dynamically identify a merchant associated with an authorization request for a payment card, wherein a merchant identifier in the authorization request is unrecognized. A plurality of unique signatures is created for each of a plurality of registered merchants, wherein the signatures for each registered merchant are based on values of merchant attributes associated with the registered merchant. In response to the system receiving an authorization request for a payment card that includes an unrecognized merchant identifier used to process authorization requests, a plurality of unique signatures is generated for the unrecognized merchant based on a combination of merchant attributes in the authorization request. A payment processing system then determines if the signatures match one of the signatures previously created for the registered merchants. If so, the authorization request is identified as originating from the matching registered merchant.
SYSTEM AND METHOD FOR CUSTOMERS INITIATED PAYMENT TRANSACTION USING CUSTOMER'S MOBILE DEVICE AND CARD
A system for a customer initiated payment transaction includes a mobile device of a customer, a card of the customer having card information, and a merchant having merchant information and payment information. The mobile device is operative to process a card payment transaction by the steps of, the mobile device: receiving the merchant information and the payment information; being activated, for processing the card payment transaction, by the card; creating a payment authorization, request using the card information, the merchant information, and the payment information, and sending the payment authorization request to an acquirer; and receiving a result of the payment authorization request from the acquirer.
FRAUD DETECTION IN PORTABLE PAYMENT READERS
A payment reader and a POS terminal may communicate over a wireless connection. The methods and systems include receiving, from POS terminal, a request for establishing a network connection with the payment card reader. The server determines whether the payment card reader is associated with the POS terminal or a payment application thereon. If the payment card reader is not associated with the POS terminal or the payment application thereon, the server determines the probability of the request being fraudulent.
SYSTEMS AND METHODS FOR IDENTITY VERIFICATION
Systems and methods are disclosed for identity authentication using credit card information supplied by a subject with independently determined address information. According to an example implementation, a method is provided that can include receiving, from a client, personally identifying information (PII) related to a subject, where the PII includes at least a subject-supplied name and subject-supplied credit card information. The method can include querying one or more public or private databases with the PII, and receiving, in response to the querying, independent occupancy address information related to the subject. The method can include requesting credit card verification from an authorizing entity, where the requesting includes sending the subject-supplied credit card information and the independent occupancy address information to the authorizing entity. The method can include generating a pass/fail indication responsive to verification information received from the authorizing entity, and sending the pass/fail indication to the client.
APPARATUS AND METHOD TO PREVENT EXECUTION OF AN UNAUTHORIZED TRANSACTION VIA A DISTRIBUTED DATABASE
An apparatus determines whether public key information on a public key used by a transaction made between nodes coupled to each other via a network is stored in a distributed database, and determines whether challenge response authentication using the public key is successful between the nodes between which the transaction is made. When the public key information is stored in the distributed database and the challenge response authentication is successful, the apparatus stores information on the transaction using the public key in the distributed database.
PREDICTIVE CONTEXTUAL TRANSACTION SCORING
In one embodiment, a predictive contextual transaction scoring system receives transaction review data associated with person-to-person transactions from a marketplace, the transaction review data including feedback information relating to the person-to-person transaction. The system identifies contextual characteristics of the person-to-person transactions by analyzing the feedback information related to the person-to-person transactions. The system pairs a first party requesting a service to a second party providing the requested service by matching a contextual characteristic of the first party to a contextual characteristic of the second party. The system also predicts a transaction score for a new person-to-person transaction involving the first party and the second party, and provides the predicted transaction score to the marketplace to facilitate pairing of the first party requesting the service.
Virtual smart cards with audit capability
Virtual smart card system includes a virtual smart card server (VSS) which controls access to content respectively associated with a plurality of virtual smart cards. A remote client computer system includes a system level agent which establishes the client computer machine to the VSS as a trusted computer system. A user level agent at the client computer system responds to a request for a virtual smart card operation by causing the client computer system to obtain user authentication information, negotiate with the system level agent to obtain a cookie, and initiate a request to the VSS for the virtual smart card operation. The VSS will perform the virtual smart card operation provided that a security policy is satisfied and will communicate the results to the user level agent.
METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONS
A system and method for conducting electronic commerce are disclosed. In various embodiments, the electronic transaction is a purchase transaction. A user is provided with an intelligent token, such as a smartcard containing a digital certificate. The intelligent token suitably authenticates with a server on a network that conducts all or portions of the transaction on behalf of the user. In various embodiments a wallet server interacts with a security server to provide enhanced reliability and confidence in the transaction. In various embodiments, the wallet server includes a toolbar. In various embodiments, the digital wallet pre-fills forms. Forms may be pre-filled using an auto-remember component.
Methods and systems for payments assurance
Payments assurance methods and systems are described. In some embodiments, a Proxy Service Manager Server computer receives a consumer authentication request from a merchant device, and transmits that request to an Authentication Service Manager Server computer. The Proxy Service Manager Server computer then receives a non-repudiable accountholder authentication value (AAV) token, generates a payment authorization request that includes the AAV token, and transmits the payment authorization request to an Acquirer financial institution (FI) Server computer. The Proxy Service Manager Server computer is then operable to receive a payment authorization message, and to transmit the payment authorization message to the merchant device to enable a merchant to complete a purchase transaction with a consumer.