Patent classifications
H04L2463/102
System and method for implementing hacker traffic barriers
Aspects of the present disclosure involve a system and method for implementing hacker traffic barriers. The current disclosure presents a system and method that provides securely associates a primary trusted device with a user, authorizes web browser authentication, and provides both intrinsic and explicit checks for authorizing access to an account.
Systems, Methods and Devices for Trusted Transactions
The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for instance a seller and buyer(s) of goods and/or services over a public computer network such as the internet. Trust is disclosed to be a multivalent commodity, in that the trust that is to be enhanced relates to information about the subject matter of the transactions (e.g., the suitability of the goods and services sold), the bona fides of the supplier of the goods and services, the appropriateness of a pricing structure for a particular transaction or series of transactions, a quantum of additional transactional value that may be imparted to the transactional relationship, security of information exchange, etc.
SYSTEMS AND METHODS FOR MOBILE APPLICATION, WEARABLE APPLICATION, TRANSACTIONAL MESSAGING, CALLING, DIGITAL MULTIMEDIA CAPTURE, PAYMENT TRANSACTIONS, AND ONE TOUCH PAYMENT, ONE TAP PAYMENT, AND ONE TOUCH SERVICE
A method for facilitating mobile device payments, multimedia capture, calling, and messaging may include providing a payment, multimedia capture, calling, and messaging interface on a display of a mobile and wearable device and sensing a haptic input of the user via the haptic control associated with one touch payment, one tap payment, and one touch service. In response to the haptic input, a cloud-based application associated with the mobile and wearable device may be activated. The haptic input may be analyzed to determine a duration of the haptic input. Based on the duration of the haptic input, an operation may be selected from the list of predetermined operations to be performed by the cloud-based application. The predetermined operations include at least a payment operation, a multimedia capture operation, a calling operation, and a messaging operation. The method may include operably connecting the mobile and wearable device to a cloud storage.
SYSTEM FOR ALLOWING EXTERNAL VALIDATION OF DATA IN A PROCESS DATA NETWORK
Systems, computer program products, and methods are described herein for a system for allowing external validation of data in a process data network. The present invention is configured to create a block chain of resource information based on at least aggregated information associated with past transfer of resources executed by an entity; receive an indication that the entity has executed a transfer of resources at a terminal; receive information associated with the transfer of resources based on at least receiving the indication that the entity has executed the transfer of resources; and update the block chain of transaction information with the transaction activity executed by the entity.
System and method for exchanging information among exchange applications
In a system and method for accessing messages in a data store in a gateway, a data frame request, which is a structured SQL query, is received at the gateway. The received data frame request is applied to the gateway data store, which stores messages. A data frame is generated that comprises messages from the data store that are responsive to the received data frame request, the data frame having a format that is readable by a character editor.
Context based recommendations using machine learning
Gift givers typically find the process of selecting a personalized gift for a gift recipient to be time consuming with a low likelihood that the selected gift will be positively received by the recipient. The present disclosure describes analyzing a gift recipient's transaction history using machine learning techniques. Based on the analysis, one or more gift recommendations are provided to the gift giver. The one or more gift recommendations may comprise links to purchase products associated with the one or more gift recommendations. Additionally or alternatively, the one or more gift recommendations may comprise information about where the product may be purchased. This may improve the overall accuracy of the gift giving process, while reducing the stress surrounding gift giving. Additionally, the commercial opportunities of businesses may be expanded by partnering with sites that host the analysis.
Authentication policy orchestration for a user device
A system and method for authentication policy orchestration may include a user device, a client device, and a server. The server may include a network interface configured to be communicatively coupled to a network. The server may further include a processor configured to obtain, from a client device via the network, a transaction request for a transaction, determine an authorization requirement for the transaction request based, at least in part, on a plurality of authorization policies, individual ones of the plurality of authorization policies being separately configurable by at least one of a relying party and an authorizing party, and complete the transaction based on the authorization requirement having been met.
BINDING CRYPTOGRAM WITH PROTOCOL CHARACTERISTICS
A method is disclosed. The method includes generating, by a communication device during an interaction with an access device, a cryptogram using transaction level data and interoperability level data; transmitting the transaction level data and interoperability level data to the access device; and transmitting the cryptogram the access device, wherein the access device or a remote server computer in communication with the access device validates the received cryptogram before allowing the transaction to proceed.
KEY-VALUE MAP COMMITMENTS SYSTEM AND METHOD
A method includes a validation computer receiving an authorization request message comprising a user state and a user proof from a user device. The user state comprises first and second user state elements. The user proof comprises first, second, and third user proof elements. The validation computer computes a first verification value by multiplying the first user proof element raised to the power of the second user state element, and the second user proof element raised to the power of the first user state element. The computer computes a second verification value by raising the second user proof element to the power of the second user state element. The computer compares the first verification value to a first accumulated state element of an accumulated state. The compares the second verification value to a second accumulated state element. The validation computer authorizes the authorization request message based on the comparison steps.
COMMUNICATION METHOD, TERMINAL DEVICE, ROAD SIDE UNIT, SERVER, SYSTEM, AND MEDIUM
The present disclosure provides example terminal devices, road side units, and servers. One example terminal device performs operations including sending certificate request information to a certificate authority server, where the certificate request information includes identity information of the terminal device. A communication key sent by the certificate authority server is received by the terminal device. Encrypted information that is sent by a road side unit is received by the terminal device, where the encrypted information is information encrypted by using the communication key. The encrypted broadcast information is decrypted by the terminal device by using the communication key.