Patent classifications
H04L2463/102
System and methods for point to point encryption and tokenization using a mobile device
Mechanisms for providing point to point encryption and tokenization enabling decryption, tokenization and storage of sensitive encrypted data on one system are discussed.
Intelligent connectivity switching mechanisms
This disclosure provides systems, methods and apparatuses for intelligent connectivity switching techniques. The techniques include, for example, determining that a wireless connection is encrypted, and in response to determining that the wireless connection is encrypted, employing one or more intelligent connectivity switching mechanisms to ensure a desirable level of user experience may be maintained and data stall conditions may be avoided or overcome. When a wireless station is in an area where two radio access technology (RAT) connections are present, the intelligent connectivity switching mechanisms can include responding to a user interface prompt, evaluating one or more signal-to-noise (SNR)-related metrics, or comparing an application, task or activity to a whitelist.
Systems, Methods, and Computer Program Products for Authenticating Devices
Disclosed are non-limiting methods for authenticating devices, including receiving a request for a device authentication identifier, transmitting a device authentication request message via a frame embedded in a webpage of a merchant website, the device authentication request message including challenge data associated with a challenge, receiving a device authentication response message via the frame embedded in the webpage of the merchant website based on the device authentication request message, the device authentication response message including challenge response data associated with a challenge response, transmitting the device authentication identifier message based on the device authentication response message, receiving a transaction request message for a transaction, including the device authentication identifier and transaction data associated with the transaction, determining the device score based on the device authentication identifier, and generating an authorization request message based on the transaction data and the device score. Systems and computer program products are also disclosed.
Method and system for localizing and identifying mobile device using short-range mesh network nodes
Various embodiments are directed to localizing and identifying a mobile computing device using a short-range mesh network. A user of the mobile computing device may be authenticated. When the mobile computing device connects to the mesh network, the location of the mobile computing device may be determined by determining which mesh network nodes the mobile computing device is connected to, triangulating the position of the mobile computing device based on signal direction via directional antennas arranged on the mesh network nodes, and/or measuring signal strength of the mobile computing device at the mesh network nodes.
DATA PAYMENT AND AUTHENTICATION VIA A SHARED DATA STRUCTURE
The disclosed embodiments relate generally to complex data stream control and entitlement. Specifically, the disclosed embodiments provide systems and methods for ensuring that only authenticated/verified participants receive data streams. A third party, e.g., a party other than the data provider or the data recipient, who is nevertheless associated with both the data provider and the data recipient, may be involved in controlling whether data streams from the data provider can reach the data recipient. Thus, a third party may logically sit between the data provider and the data recipient, and may decide whether the data recipient should receive data streams. The disclosed embodiments implement data generation, flow, control and permissioning between multiple entities via digital assets accessed and manipulated on a shared data structure.
System and method for multi-transaction policy orchestration with first and second level derived policies for authentication and authorization
A system and method for authentication policy orchestration may include a user device, a client device, and a server. The server may include a network interface configured to be communicatively coupled to a network. The server may further include a processor configured to obtain, from a client device via the network, a transaction request for a transaction, determine an authorization requirement for the transaction request based, at least in part, on a plurality of authorization policies, individual ones of the plurality of authorization policies being separately configurable by at least one of a relying party and an authorizing party, and complete the transaction based on the authorization requirement having been met.
Systems and methods for providing access to locations and services
Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security checks, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.
Connected device rights management administration
Various aspects and embodiments of dwelling automation administration are described. Among other aspects or features of the embodiments, a dwelling automation system in a computing device authenticates a user. A management interface in the dwelling automation system generates a user interface for administering a plurality of automation devices at different dwellings based on access and control rights of the user. The user interface can grant the user access to at least one automation device associated with a hub associated with at least one dwelling.
Systems and methods for authenticated blockchain data distribution
Systems and methods described herein include an application comprising instructions for execution on first and second devices including one or more processors and memory, the application being configured to purchase one or more certificates by a first process via one or more blockchain transactions. The application may redeem the one or more certificates received by a second process via one or more blockchain transactions. The second device may exchange one or more codes to designate the one or more certificates as used on the first device. The system may include one or more servers in communication with the application, and may generate a message containing updated redemption information of the one or more certificates when the updated redemption information has been stored in one or more databases, retrieve data from a plurality of data sources, and generate one or more smart contracts based on the retrieved data.
DATA PROTECTION WITH TRANSLATION
Systems and methods are disclosed in which data associated with a transaction are protected with encryption. At an access device, a PIN associated with a payment account may be encrypted with a first key derived from an initial key of the access device and sensitive data associated with the payment account may be encrypted with a second key derived from the initial key. At a secure module associated with a host server encrypted sensitive data of an authorization request message may be decrypted. The secure module associated with the host server can re-encrypt the sensitive data using a zone encryption key associated with a payment processing network. A translated authorization request message including the re-encrypted sensitive data can be transmitted by the merchant server to the payment processing network.