Patent classifications
H04L2463/102
NETWORK PROVISIONING AND TOKENIZATION USING A REMOTE TERMINAL
A method of tokenizing sensitive data from a terminal device includes receiving, a connection request comprising a hardware serial number associated with a terminal device and validating the hardware serial number associated with the terminal device. The method includes sending a command to a terminal device that causes the terminal device to display a prompt for sensitive data associated with a user interacting with the terminal device and receiving an encrypted data packet from the terminal device. The encrypted data packet includes the sensitive data. The method includes sending the encrypted data packet to a gateway system for tokenization, receiving a token that represents the sensitive data, and providing the token to the terminal device.
METHOD FOR SECURE TRANSACTIONS AMONG E-COMMERCE VENDORS
The present invention proposes a method for secure transactions among multiple e-commerce vendors, so that each e-commerce vendor does not need to disclose their member information to other e-commerce vendors in the process of trading each other's products, and each e-commerce vendor can still lead the right to determine the price of the products per se, avoiding the price war. At the same time, the method of the present invention also provides a monitoring mechanism for the transaction process to improve the degree of mutual trust between e-commerce vendors, and after the completion of the product transaction, the e-commerce vendors can interactively provide after-sales customer services. The method for secure transactions of the present invention guarantees the security of member data, cash flow, logistics, product, and the like.
Method for enabling a communication link between a mobile terminal and a receiving terminal
According to a first aspect, there is provided a method for enabling a communication link over which transaction data is transmitted between a mobile terminal and a receiving terminal, the method comprising: storing in a memory at the mobile terminal, the receiving terminal and a server administering the communication link, a generated unique identifier, the unique identifier used to facilitate the enablement of the communication link; creating a storage slot at the server administering the communication link, the storage slot being assigned the unique identifier and the storage slot used to store the transaction data; and enabling the communication link in response to the creation of the storage slot, wherein the communication link is utilised by both the mobile terminal and the receiving terminal by referencing the unique identifier to the server.
COMPUTER-IMPLEMENTED METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATING A TRANSACTION
A computer-implemented method, system, and computer program product is provided for authenticating a transaction. The method includes: receiving, on a mobile device associated with a user, a request from an authentication system, the request associated with a transaction requested by the user; obtaining, with the mobile device from a portable payment device, account data via radio frequency communication; obtaining, with the mobile device, mobile device location data including at least one of the following: GPS location data, telephone carrier location data, wireless network location data, or any combination thereof; encrypting, with the mobile device, at least a portion of the account data and the mobile device location data, resulting in at least one encrypted data packet; and transmitting, with the mobile device to the authentication system, the at least one encrypted data packet.
BLOCKCHAINING SYSTEMS AND METHODS FOR FRICTIONLESS MEDIA
An ecosystem for distributing digital content over an electronic communications network includes a content creator computer system having a processor and a memory configured to store raw digital content. The system further includes computer systems for content service and for a retailer, both in operable communication with the processor. The content service computer system is configured to receive the raw digital content and transmit packaged digital content. The retailer computer system is configured to receive the packaged digital content and display its availability to an electronic device of a user. The ecosystem further includes a blockchain in operable communication with the processor, and the content service and retailer computer systems. The blockchain is configured to verify a transfer of the packaged digital content from the content service system to the user, a payment from the user to the retailer, and an update with information regarding the verified transfer and payment.
Systems and methods for facilitating network transactions based on user authentication
Systems and methods are provided for facilitating network transactions based on user authentication. One exemplary method includes, for a network transaction, receiving, at a card device, an authentication command from an issuer of a payment account associated with the card device. A user of the card device is instructed, at an indicator of the card device, to provide a biometric for use in authenticating the user. Biometric data from the user is captured at biometric sensor of the card device, when the user provides the biometric, and the captured biometric data is compared with reference biometric data stored in a memory of the card device. The card device then returns a command reply to the issuer, where the command reply includes an authentication result based on the comparison, thereby permitting the issuer to employ the authentication result of the user in connection with the network transaction.
Secure time functionality for a wireless device
The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module (TPM) for performing trusted computing operations; and a secure time component (STC) for providing a secure measurement of a current time. The STC and the TPM are integrated to provide accurate trusted time information to internal and external to the WTRU. The STC may be located on an expanded a subscriber identity module (SIM), on the WTRU platform, or two STCs may be used, one in each location. Similarly, the TPM may be located on an expanded SIM, on the WTRU platform, or two TPMs may be used, one in each location. Preferably, the STC will include a real time clock (RTC); a tamper detection and power failure unit; and a time report and sync controller.
Datacentroid
A modular, expandable, and flexible computer system device is provided. The computer system device comprising a multiple number of individual modules interconnected physically via ‘back plane’ means with each module independently processing and executing specified computer functions utilizing internal or shared resources. Electrical power distribution and data communications are positioned between modules with the electrical power distribution and data communications internal to the base unit module.
Transaction scheme for offline payment
An authentication factor is received, including an authentication key, an account information of a user, and a dynamic time factor. A bound authentication information is generated by using the authentication factor and a device information of a client device that requested the secure offline payment. The bound authentication information is transmitted to a service server system perform an offline payment authorization based on the bound authentication information. In response to a successful offline payment authorization, a graphical identifier is generated for completing the secure offline payment associated with the authentication factor, where the graphical identifier includes the bound authentication information and a dynamic password generated based on the dynamic time factor.
Authenticating method and apparatus using electronic device
An authentication method and apparatus for an electronic device. A first electronic device transmits a mutual authentication request for the first electronic device and a second electronic device communication-connected with the first electronic device to an authentication server. The first electronic device receives mutual authentication information for each of the first electronic device and the second electronic device from the authentication server, and stores the mutual authentication information in the first electronic device and the second electronic device. The first electronic device determines whether reliability of an authentication state between the first electronic device and the second electronic device is maintained. The first electronic device acquires an authentication result for a service using the second electronic device from the authentication server by using the mutual authentication information for each of the first electronic device and the second electronic device, when the reliability is maintained.