G06Q20/4097

Tag-handle-based authentication of RFID readers

An RFID tag may execute instructions from an authenticated RFID reader. A tag determines a handle and a first parameter, both of which may be random numbers, and sends the handle to a reader. Upon receiving a challenge from the reader, the tag determines and sends a cryptographic response to the challenge based on an algorithm, a tag key, the first parameter, and the challenge. Upon receiving a message with a second parameter and a tag instruction, the tag executes the tag instruction upon verifying that the second parameter derives from the first parameter and the tag handle.

Information processing apparatus and non-transitory computer readable medium of performing setting for multi-step authentication

An information processing apparatus includes a memory storing, in an associated form, a unit of authentication and multi-step authentication corresponding to the unit and one or more processors configured to, when a type of the authentication of an authentication step in the multi-step authentication is to be set, display a unit of the type serving as a setting target on a display in a manner such that the unit of the type serving as the setting target is selectable.

SYSTEMS AND METHODS FOR SECURE AUTHENTICATION OF TRANSACTIONS INITIATED AT A CLIENT DEVICE
20170286966 · 2017-10-05 ·

A method for authenticating a cardholder for a candidate purchase using an authentication computing device in communication with a memory is provided. The method includes receiving an authentication profile associated with the cardholder during an enrollment process for an authentication service, storing the authentication profile within the memory, and receiving an authentication request for the candidate purchase over a first communication link. The candidate purchase is initiated at a client device. The method further includes retrieving the stored authentication profile from the memory, generating a challenge message based on the stored authentication profile, transmitting the challenge message to a user device over a second communication link, receiving a challenge response including authentication information collected from the user device, comparing the collected authentication information to the stored authentication profile, and authenticating the cardholder for the candidate purchase based on the comparison.

VEHICLE, AUTHENTICATION SYSTEM, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND AUTHENTICATION METHOD

A vehicle includes a communication interface, a sensor configured to detect biological information for a user of the vehicle, and a controller configured to perform electronic payments. The controller receives authentication information from a first terminal apparatus using the communication interface and acquires the biological information from the sensor when a first authentication using the received authentication information succeeds. The controller acquires authorization information indicating authorization to perform an electronic payment for the user, who is associated with the authentication information, when a second authentication using the acquired biological information succeeds.

SYSTEM, METHOD AND APPARATUS FOR UPDATING A STORED VALUE CARD
20170243197 · 2017-08-24 · ·

A system for updating a stored value card comprising a transaction device for receiving a request to update the stored value card; a transaction manager arranged in data communication with the transaction device; the transaction manager operable to process the request to update the stored value card; a clearing house arranged to receive processed request from the transaction manager and create a pending transaction status; and a stored value updater network operable to receive the stored value card and thereafter retrieve an identifier of the stored value card; the stored value updater network further operable to retrieve the pending transaction status from the clearing house; wherein upon successful verification of the pending transaction status and the stored value card, the stored value updater network updates the stored value card.

SECURE MODAL BASED DIGITAL INSTALLMENTS

Examples described herein include systems, methods, instructions, and other implementations for data security with integrated installment payment systems. In one example, account security system receives a checkout communication that includes data describing a validated checkout system of a merchant system. A client token is transmitted in response to an authentication that the checkout communication is from the validated checkout system, and an account communication including the client token and secure client information is received from a client device. An installment payment communication associated with the secure transaction is received from a system other than a merchant system involved in the transaction. The secure transaction is then facilitated following receipt of the installment payment communication.

Fake sensor input for passcode entry security
09773240 · 2017-09-26 · ·

A method of preventing passcode logging is disclosed. The method may include: presenting a passcode entry interface on an electronic device; receiving a sensor input sequence from a sensor of the electronic device, wherein the sensor input sequence is indicative of a user's interaction with the passcode entry interface; and introducing a fake sensor entry into the sensor input sequence on the electronic device, wherein the fake sensor entry is introduced in accordance to a pattern to later distinguish the fake sensor entry from an actual sensor entry in the sensor input sequence.

Information interaction methods and devices
09819652 · 2017-11-14 · ·

An information interaction method and device are provided. In the method, the device establishes a connection with a wearable device. The device sends information to be interacted corresponding to a logged-in ID to the wearable device via the connection. The device receives a first encrypted result returned by the wearable device. The device generates a first verifying factor corresponding to the first encrypted result with a predetermined algorithm. The device sends the information to be interacted and the first verifying factor in an associated manner to a server. The device receives a message indicating that an interaction is finished, where the message is sent if the server determines that a second verifying factor generated with the predetermined algorithm and corresponding to a second encrypted result matches the first verifying factor. The second encrypted result is obtained by encrypting the information by the server with the pre-stored encryption key.

SYSTEM AND METHOD FOR PROVIDING PAYMENT SERVICE
20170323287 · 2017-11-09 · ·

The present invention relates to a system and method for providing a payment service of a two-channel authentication method utilizing a card reader infrastructure and a portable user terminal. The system for providing a payment service according to an aspect of the present invention includes an affiliate POS terminal configured to receive MIN card information and generate and transmit a transaction approval request signal, and a server configured to receive the transaction approval request signal, transmit a transaction authentication request signal to a portable user terminal, and transmit approval request information to a financial institution server when transaction authentication is completed from an input signal of the portable user terminal.

Systems and methods for detecting security risks in network pages
11252174 · 2022-02-15 · ·

Embodiments include methods and systems for detecting security risks in network pages, comprising providing at least one secure transaction page to a secure transaction provider, the secure transaction page enabling the secure transaction provider to request secure transactions, determining a request rate for the secure transaction page associated with the secure transaction provider, determining a predetermined threshold for a change in request rate for the secure transaction page by the secure transaction provider, determining that the predetermined threshold, for the change in request rate for the secure transaction page by the secure transaction provider, has been exceeded, and providing a notification to the secure transaction provider based on the determination that the predetermined threshold, for the change in request rate for the secure transaction page by the secure transaction provider, has been exceeded.