G06Q20/4097

Method of performing authentication for a transaction and a system thereof

There is provided a method of performing authentication for a transaction between first and second devices. The method includes: generating a first random number and encrypting it based on a first key of a first private-public key pair; sending the encrypted first random number to the server; receiving a transaction identifier for the transaction, the first random number and a second random number, wherein the transaction identifier, the first random number and the second random number are encrypted based on a first key of a second private-public key pair; decrypting the encrypted transaction identifier, the encrypted first random number and the encrypted second random number based on a second key of the second private-public key pair; and sending the transaction identifier, and the second random number to the second device for authenticating the first device for the transaction. There is also provided a corresponding device and system.

Efficient parallelized computation of global behavior profiles in real-time transaction scoring systems

Parallelized computation by a real-time transaction scoring system that incorporates global behavior profiling of transacting entities includes dividing a global profile computing component of a transaction scoring model of a real-time behavioral analytics transaction scoring system into a plurality of global profile component instances. The transaction scoring model uses a plurality of global profile variables, each of the plurality of global profile component instances using its own global profile partition that contains the estimate of global profile variables and being configured for update by a dedicated thread of execution of the real-time transaction scoring system, each dedicated thread being configured for receiving and scoring a portion of input transactions. The method further includes partitioning, based on one or more transaction routing shuffling algorithms, the input transactions for receipt across the plurality of global profile component instances, and updating each of the plurality of global profile partitions by the corresponding global profile component running in the dedicated thread according to the scoring algorithm.

System, method, and apparatus for securely transmitting data via a third-party webpage

Provided is a computer-implemented method for securely receiving data via a third-party webpage, including: generating configuration data in response to a request from a first system, the configuration data including a public key of a first key pair; digitally signing the configuration data based on a private key of a second key pair; transmitting the configuration data to the first system, the configuration data including code configured to facilitate the first system to embed a plurality of frames in a webpage, wherein the plurality of frames loads content from a domain that is independent from a domain that hosts the webpage; and verifying the configuration data based on a public key of the second key pair. The computer-implemented method may also include receiving, from a master frame of the plurality of frames, encrypted data. Systems and computer program products are also provided.

Computer-based system for secure curbside banking

Techniques discussed herein describe an example system for verifying the identity and location of a customer in a bank branch parking lot. A server determines whether to provision a service for a vehicle based on telemetry data received from a telemetry module on the vehicle in a fleet of vehicles. The telemetry data includes a first location and status information of the vehicle. The server identifies a vendor to provide the service and directs the vehicle to a second location of the vendor from the first location of the vehicle. The server provides authorization to the vehicle for an on-board transaction module to initiate a request for the service when the vehicle is at the second location of the vendor.

Systems and methods for providing multi-factor authentication for vehicle transactions

Methods and systems are employed for completing a transaction via an internet-connected vehicle by leveraging a multi-factor authentication to compare vehicle identification information and user identification information based on stored information. In addition, methods and systems are provided for completing a transaction via an internet-connected vehicle by automatic enforcement of business rules (e.g., parental control spending tools, or employee spending tracking tools).

DIGITAL IDENTITY AUTHENTICATION SYSTEM AND METHOD
20230066754 · 2023-03-02 ·

A method for authenticating a user performed by an identity server computer is disclosed. The method comprises receiving, by a server, a user device identifier from an access device. The server transmits a challenge to a mobile device operated by a user, and the mobile device signs the challenge. The server receives and verifies the signed challenge and then provides the signed challenge or a portion thereof to an access device, which processes the transaction with the signed challenge.

SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DYNAMIC PASSCODE COMMUNICATION
20230067023 · 2023-03-02 ·

Systems, methods, and computer program products for dynamic passcode communication use a merchant application installed on a user device that receives transaction data associated with a transaction at a merchant system. The transaction data may include an account identifier associated with an account at an issuer system. The merchant application determines, based on the account identifier, whether an issuer application associated with the issuer system is installed on the user device. In response to determining that the issuer application is installed on the user device, the merchant application transmits, to the issuer application, a request for a dynamic passcode. The merchant application receives, from the issuer application, the dynamic passcode and transmits, to the issuer system, an authorization request including the account identifier and the dynamic passcode. The merchant application receives, from the issuer system, an authorization response authorizing or denying the transaction.

Transfer via transaction app

Systems and methods may generally include sending an executable application, which when executed, automatically causes a monetary transfer. An example method may include performing, at a first user device, a handshake with a second user device, receiving, during the handshake, an operating capability of the second user device, and configuring, based on the operating capability of the second user device, an executable application, which when executed, automatically causes a monetary transfer to occur. The configured executable application may be sent to the second user device for execution.

DIRECT ELECTRONIC BILL PAYMENT WITH REAL-TIME FUNDS AVAILABILITY

A method including receiving, at a payment-messaging system from a biller financial institution, a request comprising a public consumer token of a consumer. The consumer provided the public consumer token to a biller system of a biller for a bill payment by the consumer to the biller. The biller system provided the public consumer token to the biller financial institution. The biller financial institution maintains a biller account of the biller. The acts also can include determining a risk metric representing a risk of using the public consumer token for the bill payment. The acts additionally can include sending the risk metric from the payment-messaging system to the biller financial institution. The biller financial institution sends the risk metric to the biller system to allow the biller to determine whether to assume liability for the bill payment. The acts further can include receiving, at the payment-messaging system from the biller financial institution, an authorization message for the bill payment. The authorization message was provided to the biller financial institution by the biller system. The acts additionally can include sending the authorization message for the bill payment to a consumer financial institution, to cause the consumer financial institution to send a real-time payment message through the payment-messaging system to the biller financial institution to make funds available in real-time in the biller account for the bill payment. Other embodiments are described.

OFFLINE INTERACTION MODE OF A DIGITAL ASSET-BASED INTERACTION SYSTEM

A method includes initiating, by a first computing entity, an interaction with a second computing entity. The interaction includes the first computing entity providing an amount of a digital asset and the second computing entity accepting assets in a desired asset format. When in an offline interaction mode, the method includes generating, by the first computing entity, an authorization code including a type of the digital asset and code authentication information and providing the authorization code to the second computing entity. The method further includes sending, by the second computing entity, at least a portion of the authorization code to a digital asset-based interaction computing entity. The method further includes verifying, by the digital asset-based interaction computing entity, the at least the portion of the authorization code, locking an amount of system digital asset to back the amount of the digital asset, and sending confirmation to the second computing entity.