Patent classifications
G06Q20/40975
DEVICE MANAGEMENT BASED ON BLOCKCHAIN NETWORK
In a method, device information of a characteristic acquisition device associated with a target terminal is acquired in response to a triggering operation for establishing an association relationship between the characteristic acquisition device and a target client in the target terminal. The device information is transmitted to the blockchain network such that each of node devices in the blockchain network authenticates the characteristic acquisition device according to the device information. A respective reference authentication result generated by each of the node devices is acquired. The respective reference authentication result indicates whether the characteristic acquisition device passes authentication of the respective node device. The association relationship between the target client and the characteristic acquisition device is established in response to the characteristic acquisition device passing the authentication according to the reference authentication results.
PAYMENT INFORMATION PROCESSING METHOD, WEARABLE DEVICE, AND NON-VOLATILE COMPUTER-READABLE STORAGE MEDIUM
A payment information processing method, a wearable device, and a non-volatile computer-readable storage medium are provided. The payment information processing method includes the following. A payment identification code is obtained by a first system when a wearable device is in a network connection state. The payment identification code is transmitted to a second system and the payment identification code is stored through the second system. When the wearable device meets a condition and receives a payment request, the stored payment identification code is obtained from the second system. The payment identification code is displayed.
Client device authentication using contactless legacy magnetic stripe data
A technique for generating a diversified encryption key for a contactless legacy magnetic stripe card is disclosed. The diversified key can be generated using a master key, a key diversification value and an encryption algorithm. In one example embodiment, the key diversification value can be provided by the user as a fingerprint, numeric code or photo. The user can provide the key diversification value to the card or a cellphone. The card can generate the diversified key using the user provided key diversification value. The card or the cellphone can transmit the user provided diversification value to the server and the server can regenerate the diversified key using the user provided diversification value.
Systems and methods for providing multi-factor authentication for vehicle transactions
Methods and systems are employed for completing a transaction via an internet-connected vehicle by leveraging a multi-factor authentication to compare vehicle identification information and user identification information based on stored information. In addition, methods and systems are provided for completing a transaction via an internet-connected vehicle by automatic enforcement of business rules (e.g., parental control spending tools, or employee spending tracking tools).
TECHNIQUES AND SYSTEMS TO PERFORM AUTHENTICATION AND PAYMENT OPERATIONS WITH A CONTACTLESS CARD TO PROVIDE ITEMS AND SERVICES
Embodiments discussed herein are generally directed to systems, devices, methods, and techniques to perform authentication and payment operations with a contactless card to provide items and services.
Digital access code
A method is disclosed. One embodiment of the invention is directed to a method. The method comprises: prompting, by an access device, a user to enter an access code; receiving, by the access device, the access code from the user; transmitting, by the access device, the access code to a validation computer, which validates the access code; receiving, by the access device, an access identifier or access token from the validation computer in response to validating the access code; transmitting, by the access device, an authorization request message including the access identifier or the access token to an authorizing computer; and receiving, by the access device, an authorization response message from the authorizing computer.
Systems and methods for reader device registration, use, and management
A method and apparatus for reader device registration, activation, and use are described. The method may include receiving, by a commerce platform, a registration request generated by a reader device, wherein the registration request comprises at least identification data for the reader device. The method may also include transmitting, to the reader device, a registration code. The method may also include receiving, by the commerce platform from a merchant system, a second registration code purported to be the registration code transmitted to the reader device. The method may also include generating an encryption key associated with the reader device and transmitting the encryption key to the merchant system, wherein the encryption key is provided by merchant system to the reader device for use by the reader device when communicating with the commerce platform during merchant transactions.
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Example embodiments of systems and methods for data transmission between a contactless card and a client device in support of a FIDO authentication are provided. In an embodiment, upon receipt of a challenge issued by a server in connection with a pending transaction, the contactless card may authorize the client device to utilize a FIDO private key to respond to the challenge. If the response to the challenge is successful, the FIDO authentication may proceed and the transaction may be completed.
Accessing and utilizing multiple loyalty point accounts
Various embodiments are generally directed to utilizing an offline and/or online verification or authentication protocol to access, redeem, or otherwise utilize multiple loyalty points and loyalty accounts A method for utilizing various loyalty points includes: receiving, by an application executing on a processor, a request to redeem at least one loyalty point of a plurality of loyalty points of a loyalty points account, receiving, by the application, a cryptogram from a contactless card associated with an account, transmitting, by the application to a server, the cryptogram, determining, by the application based on a decryption result received from the server, that the server decrypted the cryptogram, and authorizing, by the application based on the determination that the server decrypted the cryptogram, the request to redeem the at least one loyalty point.
Methods and devices for the secure transmission of data between a terminal, and a card reader, and corresponding computer program product
A method of secure reception, in a card reader, of a piece of data entered into a terminal connected to the card reader. The method includes the following acts by the card reader: obtaining an encipherment reader key from the card reader; encrypting the encipherment reader key by using an authentic encipherment key shared between the card reader and an authentication server, delivering an encrypted reader key; sending the encrypted reader key to the authentication server for transmission of the reader key from the authentication server to the terminal; receiving an encrypted key sent by the authentication server, resulting from an encryption of a terminal key, obtained by the authentication server, by using the authentic key; and receiving encrypted data sent by the terminal, resulting from an encryption, by using at least the reader key and of the terminal key, of the at least one piece of data.