Patent classifications
G06Q20/40145
Systems and methods for use in authenticating consumers in connection with payment account transactions
Disclosed are exemplary embodiments of systems and methods for use in authenticating consumers and/or computing devices to payment accounts. In an exemplary embodiment, a method generally includes generating, by a computing device, an authentication request for a consumer in response to a transaction by the consumer at a merchant. The transaction involves a payment account associated with the consumer, and the authentication request includes a direction to move a communication device associated with the consumer in a manner consistent with a reference movement. The method also includes receiving, by the computing device, an indication of movement of the communication device; comparing, by the computing device, the movement of the communication device to a reference movement; and then authenticating, by the computing device, the consumer to the payment account in connection with the transaction when the comparison indicates that the movement of the communication device matches the reference movement.
Blockchain-based method and apparatus for managing biological asset object
The present specification provides a blockchain-based method and apparatus for managing a biological asset object. The method is performed by a node device in a blockchain network, a smart contract for managing a biological asset object is deployed in the blockchain, and processing logic corresponding to contract code of the smart contract includes biological asset object creation logic, the method including: obtaining an asset object creation transaction generated by a client, where the asset object creation transaction includes identification information of a target organism; and invoking the smart contract, executing the biological asset object creation logic, and creating a target biological asset object corresponding to the target organism based on the identification information of the target organism.
Image processing system for verification of rendered data
An image processing system for verifying that embedded digital content satisfies a predetermined criterion associated with display of the content, the image processing system a content embedding engine that embeds content in a resource provided by a content provider and that configures the resource for rendering, a rendering engine that renders the content embedded in the resource; an application interface engine that interfaces with the rendering engine and that generates a visualization of the resource and of the embedded content rendered in the resource; and an image processing engine that processes one or more pixels of the generated visualization of the resource and of the embedded content and the resource to verify that the specified visual element satisfies the predetermined criterion; and transmits verification data comprising an indication of whether the predetermined criterion is satisfied.
Biometric, Behavioral-Metric, Knowledge-Metric, and Electronic-Metric Directed Authentication and Transaction Method and System
A system to authenticate an entity and/or select details relative to an action or a financial account using biometric, behavior-metric, electronic-metric and/or knowledge-metric inputs. These inputs may comprise gestures, facial expressions, body movements, voice prints, sound excerpts, etc. Features are extracted from the inputs and each feature converted to a risk score, which is then translated to a representative value, such as a letter or a number, i.e., a code or PIN that represents the input. For user authentication, the code is compared with a data base of legitimate/authenticated codes. In some embodiments a user selects specific information elements, such as an account or a payment amount using one or more of a biometric, a behavior-metric, an electronic-metric and/or a knowledge-metric input.
Token processing with selective de-tokenization for proximity based access device interactions
A method includes providing an initial communication, by an access device to a user device. The access device can receive the user identifier and the access token and receive a secret associated with the user. The access device can determine, using the user identifier and/or the access token, if the transaction is authorized by an authorizing entity computer associated with the access device or by an authorizing entity not associated with the access device. If the transaction is authorized by the authorizing entity computer associated with the access device, the access device can transmit an authorization request message comprising the user identifier, the secret, and the access token to the authorizing entity computer. The authorizing entity computer validates the secret, retrieves a real credential of the user using the user identifier, and authorizes the transaction.
Wearable Earpiece Multifactorial Biometric Analysis System and Method
A system, method and one or more wireless earpieces for authenticating a transaction utilizing one or more wireless earpieces. An indication that the transaction is pending is received by the one or more wireless earpieces. Biometric readings are performed for a user utilizing sensors of the one or more wireless earpieces. The biometric readings are analyzed to determine whether the user is authorized to perform the transaction. The transaction is authenticated in response to determining the biometric readings authorize the user to perform the transaction.
System, method, and article of manufacture to non-intrusively authenticate one or more secondary users of a mobile device and displaying a scanning code over a lock screen wallpaper of the mobile device
An article of manufacture is described as implemented in a mobile device having a lock screen wallpaper, where the mobile device maintains a profile storing authentication data associated with both a primary user of a mobile device and one or more secondary users that are authorized to use the mobile device. When the mobile device is at a business location, the secondary user(s) are non-intrusively authenticated as authorized user(s) of the mobile device. Upon successful authentication a scanning code is displayed over a lock screen wallpaper of the mobile device, where power is conserved in the mobile device by providing the scanning code to the secondary user(s) without unlocking the mobile device.
Using a nested random number-based security ecosystem for block chains for electronic cash tokens and other embodiments
Methods, systems, and apparatuses for block chain security schemes for electronic cash tokens are described herein.
METHOD, MEDIUM, AND SYSTEM FOR REDUCING FRAUD
Techniques for reducing fraud are disclosed. A transaction request is received from a user to perform a transaction using an account. In one approach, a source icon is displayed prior to executing the request. The source icon includes a graphical representation of an owner of the account. In another approach, at least one of a photograph and a voice of the user is recorded prior to executing the request. In a third approach, the user is informed that at least one of a photograph, a voice print, and location data will be taken prior to executing the transaction request.
SYSTEM AND METHOD FOR USING A BIOMETRIC PAYMENT DEVICE
Systems and methods are described related to using flexible circuity in a payment device. In one embodiment, a payment device comprises a computing device and a memory. The computing device is configured to store a biometric identifier associated with a transaction account. The computing device is configured to at least receive, by the antenna, an interrogation signal from a point of sale (POS) device in order to activate the payment device for a payment transaction. The computing device is configured to determine a scanned fingerprint identifier of a user based at least in part on the interrogation signal activating the payment device and authenticate the scanned fingerprint identifier by matching the scanned fingerprint identifier to the biometric identifier. The transaction account is transmitted to the POS device for processing the payment transaction based at least in part on the authentication of the scanned fingerprint identifier.