Patent classifications
H04L2463/102
Systems and methods for associating a user with a task executed in a computing system
It is desired to try to increase the security of a computing system running computer applications that may access data in a data storage system. In some embodiments, a token associates a user with a task that is being executed by a computing node. It may therefore be possible to determine which user executed which tasks. In some embodiments, the validity of a token is tied to the lifespan of a task associated with the token, rather than to a fixed amount of time. Therefore, if the task associated with the token is complete, the token may become invalid, rather than remaining valid for a duration of time that possibly exceeds the lifespan of the associated task. In some embodiments, a token is used to enforce data access control, e.g. to deny certain users access to certain data in the data storage system.
Validation Service For Account Verification
A method and system for authorizing a secure transaction using a portable device is disclosed. The method includes an authorization process performed in real-time that includes two phases: an authentication phase and a transaction processing phase. In the authentication phase, a resource provider system may receive a cryptogram from a portable device and verify the cryptogram. Upon the resource provider system obtaining an authentication response indicator, the transaction processing phase may include the resource provider system generating and transmitting an authorization request message to a processing computer. The resource provider system may then receive an authorization response message from the processing computer including an authorization response indicator, which completes the authorization process.
SYSTEMS AND METHODS FOR DISTRIBUTED VERIFICATION OF ONLINE IDENTITY
At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.
NAME VERIFICATION SERVICE
A method is provided for verifying a cardholder name associated with a payment device used in connection with a card-not-present transaction. The method includes the steps of maintaining a database including a plurality of records pertaining to historically processed transactions, receiving, at a name verification server, a cardholder name verification request including a submitted primary account number of a payment device and a submitted cardholder name, querying the database to identify one or more records that include an indication of a primary account number that matches the submitted primary account number included in the cardholder name verification request, comparing at least one cardholder name in the identified one or more records to the submitted cardholder name included in the cardholder name verification request, determining whether or not there is a sufficient match resulting from said comparing, generating a name verification response, and sending the name verification response to the merchant server.
SYSTEM FOR DYNAMIC NETWORK AUTHENTICATION PROTOCOLS
A system for implementing and managing network-based, variable authentication protocols receives information relating to a digital monetary transaction. Additionally, the system accesses an initial authentication protocol dataset. The system also generates a variable authentication protocol dataset. The system then communicates the variable authentication protocol dataset to the point-of-sale computer system. The system also receives, from the point-of-sale computer system, authentication tokens. Further, the system validates the authentication tokens in view of the variable authentication protocol dataset. Further still, in response to the validation of the authentication tokens, the system processes the digital monetary transaction.
SYSTEMS AND METHODS FOR FRAUD DETECTION AND PREVENTION
Systems and methods for fraud detection and prevention is disclosed. The system may receive a transaction request for a first customer including a transaction location, transaction time stamp, and merchant type code. The system may determine whether the transaction location is expected for the first customer. When the transaction location is unexpected, the system may identify a last-known video detection having a last-known time stamp and last-known location. The system may determine a travel time estimate between the last-known location and the transaction location and determine a buffer based on the merchant type code. The system may compare the travel time estimate to an allotted time that includes a difference between the transaction time stamp and last-known time stamp less the buffer. When the travel time estimate exceeds the allotted time, the system may execute one or more fraud prevention steps.
SYSTEMS AND METHODS FOR FRAUD DISPUTE OF PENDING TRANSACTIONS
A system for fraud dispute of pending transactions. The system comprising receiving data corresponding to a pending transaction between the user and a merchant; and analyzing the transaction data to determine whether the transaction data comprises at least one indicator of a fraudulent transaction. Wherein, pausing an initiation to provide funds for the pending transaction, providing the user at least one questionnaire relating to the received transaction data or a set of stored user data, receiving a response from the user for the questionnaire, comparing the received response to the received transaction data or the stored user data, determining whether to validate the user based on the comparison, rejecting the pending transaction when the user is not validated, and removing the indicator when the user is validated. Wherein, approving the pending transaction, and initiating a request to provide funds to the merchant. And storing the received transaction data and analysis.
Wearable device and portable system having higher security
A wearable device including a skin sensor and a processor is provided. The processor is configured to receive an authentication data for authenticating a user when a wearing state of the wearable device is adjacent to a skin surface of the user, share an authenticated state in response to a request from an electronic device when the authentication data matches a pre-stored data and the skin sensor determines that the wearable device does not leave the skin surface after the authentication data is received, and stop sharing the authenticated state when the skin sensor determines that the wearable device leaves the skin surface during the sharing.
COMPUTER TRANSACTION SECURITY WITH DELEGATED DECISIONS
A method for authenticating e-commerce transactions involves receiving, from a payment network computer, a first authentication request message to authenticate a transaction associated with a payment account, the first authentication request message being initiated by an issuer domain computer not implementing a 3-D Secure authorization protocol, determining that the issuer domain computer has configured, at the access control server computer, a decision function of a second portion of the 3-D Secure authorization protocol and in response thereto, transmitting, to the issuer domain computer, a decision request message and information associated with the transaction, the decision request message requesting the issuer domain computer to determine an action for authenticating the transaction based on the information associated with the transaction and one or more programmatic rules of the issuer domain computer, the transmitting occurring in lieu of the access control server computer executing the decision function at the access control server computer.
Decentralized blockchain for artificial intelligence-enabled skills exchanges over a network
An improved decentralized, blockchain-driven network for artificial intelligence (AI)-enabled skills exchange between Intelligent Personal Assistants (IPAs) in a network is disclosed that is configured to perform computational tasks or services (also referred to herein as “skills”) in an optimally-efficient fashion. In some embodiments, this may comprise a first IPA paying an agreed cost to a second IPA to perform a particular skill in a more optimally-efficient fashion. In some embodiments, a skills registry is published, comprising benchmark analyses and costs for the skills offered by the various nodes on the skills exchange network. In other embodiments, a transaction ledger is maintained that provides a record of all transactions performed across the network in a tamper-proof and auditable fashion, e.g., via the use of blockchain technology. Over time, the AI-enabled nodes in the system may learn to scale, replicate, and transact with each other in an optimized—and fully autonomous—fashion.