H04L2463/102

Distributed consent protecting data across systems and services
11671256 · 2023-06-06 · ·

Non-limiting examples of the present disclosure relate to generation and implementation of a new security protocol that is used to secure common data access transactions across distributed network examples. An exemplary proof of verification protocol is disclosed that implements consensus security mechanisms across a plurality of distributed nodes, which may be utilized to validate owners of data in common data access transactions. Extending principles of blockchain security to common data access transactions and Internet of Things (IoT) networking requires a solution that: improves speed in transactional processing; reduces computational complexity; and presents efficient, secure and repeatable validation for owners of data in distributed networking environments. An exemplary proof of verification protocol provides such technical advantages by validating both user-specific data for a subscriber of an application/service and session data for user activity (past and present) within the application/service.

Transaction retrieval, transaction matching, alert generation, and processing of dispute alerts
11669894 · 2023-06-06 · ·

The subject matter disclosed herein provides methods for executing a script to retrieve chargeback records. The method may execute a script for retrieving one or more chargeback records for one or more merchants from one or more web portals of one or more financial institutions. The one or more chargeback records may represent a return of funds to one or more purchasers by the one or more financial institutions. The script may have commands. These commands may navigate a web browser to a web portal associated with at least one financial institution. These commands may also provide authentication information for the at least one merchant into the web portal, access the one or more chargeback records for the at least one merchant, and download the one or more chargeback records. Related apparatus, systems, techniques, and articles are also described.

SECURE GATEWAY SYSTEM AND METHOD
20170331821 · 2017-11-16 ·

A gateway system for authenticating a transaction event, the gateway system comprising a target server that receives a transaction event information signal from a point of inquiry (POI) device, the transaction event information signal including transaction event data associated with a user device, and a gateway server that sends an approval request signal for the transaction event data to the user device, wherein the target server sends a transaction authorization signal to the POI device when the gateway server receives a transaction approval signal from the user device.

SYSTEMS AND METHODS FOR ESTABLISHING IDENTITY FOR ORDER PICK UP
20220351263 · 2022-11-03 ·

Example embodiments of systems and methods for secure online order pick up and data transmission system between transmitting and receiving devices are provided. In an example embodiment, a user may be required to confirm his or her identity prior to using an application, utilizing enhanced or restricted features of an application or device, viewing sensitive information, or taking certain actions. A transmitting device, such as a contactless card, may be employed as means for confirming a user's identity and access these features.

SEARCH ENGINE FOR AUTHENTICATED NETWORK RESOURCES
20170318001 · 2017-11-02 ·

A method and corresponding computer system for authenticating a network resource are disclosed. The method comprises receiving an input at a computer system over a network, the input comprising a network resource identifier and information indicative of an authentication entity associated with the network resource; automatically identifying stored data using the information indicative of the authentication entity, the stored data comprising contact information associated with the authentication entity; automatically transmitting an electronic message to the authentication entity using the identified contact information, the electronic message providing the authentication entity with the network resource identifier and means for authenticating the network resource; and automatically storing the network resource identifier. A search engine for authenticated network resources and a method and corresponding computer system for authenticating an entity are also disclosed.

Using successive levels of authentication in online commerce
09807614 · 2017-10-31 · ·

A method comprising performing following acts on a network server: receiving a communication from a client terminal operated by a client; performing a first authentication of the client terminal or client; in response to the first authentication, delivering a first service to the client; after delivering the first service, sending an offer for a second service to the client terminal; receiving an acceptance message for the second service from the client terminal; performing a second authentication of the client terminal and/or the client; in response to receiving the acceptance message for the second service from the client terminal and to the second authentication being successful, delivering a second service to the client; wherein the first authentication and the second authentication use different authentication techniques. Other aspects include a programmed data processing apparatus for carrying out the method and a tangible program carrier instructing the apparatus to perform the acts.

SYSTEM AND METHOD FOR PROTECTING CONTENT IN A WIRELESS NETWORK
20170310677 · 2017-10-26 ·

A method of providing access to content within a user device is disclosed and may include determining a location of the content, determining whether the content is within an allowed region, and selectively prompting a user to purchase a license to access the content. In a particular aspect, the user may be prompted to purchase the license to the access the content when the content is not within an allowed region. If the license is purchased, the user may be allowed to access the content. The license may be an unlimited license, a limited license, or a transfer license.

SYSTEM AND METHOD FOR DETECTING MALICIOUS USE OF A REMOTE ADMINISTRATION TOOL
20220058660 · 2022-02-24 ·

Disclosed herein are systems and methods for detecting malicious use of a remote administration tool. In one aspect, an exemplary method comprises, gathering, from a flow of events, data that comprises any number of keyboard entry events, wherein each event is related at least to actions indicating a keyboard entry and a context in which the event occurred, comparing the gathered keyboard entry events with signatures from a database, and when a match is found with at least one signature, identifying an activity which is a characteristic that indicates that the remote administration tool is being controlled remotely.

PUBLIC LEDGER AUTHENTICATION SYSTEM

Systems and methods for public ledger authentication include receiving a first previous authentication public ledger address and a first current authentication public ledger address from a user. A verified static user key is identified in a public ledger using the first previous authentication public ledger address. A second current authentication public ledger address is then provided to the user for use in the current authentication attempt. Authentication attempt information is determined that includes a number of authentication attempts by the user, and used in a hash operation with the verified static user key to generate a first user authentication key. A second user authentication key is retrieved from the public ledger that was sent from the first current authentication public ledger address to the second current authentication public ledger address in a transaction, and the user is authenticated if the second user authentication key matches the first user authentication key.

SYSTEMS AND METHODS FOR BLOCKCHAIN VIRTUALIZATION AND SCALABILITY

A virtualized blockchain forest includes a plurality of individual blockchains. Each individual blockchain of the plurality includes a blockchain height, a genesis block, and at least one additional block. The virtualized blockchain forest further includes a plurality of participating processors that make up a consensus pool, and a blockchain forest height having a time-sequenced start-to-finish length of blocks among the collective plurality of individual blockchains. The virtualized blockchain forest is configured to aggregate different ones of the plurality of individual blockchains, and is further configured to terminate individual ones of plurality of individual blockchains.