Patent classifications
H04L2463/102
Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate transactions related to a user account, without disclosing to the third-party system account credentials. The system enables the user to also securely de-authorize the third-party system. For example, records may be automatically generated that securely store account information, including one or more permissions related to the account and/or the third-party. A token associated with a record may be shared with the third-party system, but neither the record itself, nor the user account credentials, may be shared with the third-party. Accordingly, the third-party may request user account data and/or initiate transactions by providing the token, but does not itself know, e.g., the user account credentials. Further, the user may set various permissions related to the token, and may also revoke the token (e.g., de-authorize the third-party), thus providing increased security to the user's account.
Systems and methods for encryption and decryption service for electronic transaction monitoring and reporting
A method for electronic transaction monitoring and reporting includes: determining whether the received transaction request is encrypted, upon determining that the received transaction request is not encrypted, sending a failure alert to the merchant, determining a receiving acquirer processor for the transaction request, and transmitting the transaction request to the determined acquirer processor.
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.
Techniques to automatically update payment information in a compute environment
Various embodiments are generally directed to techniques for generating rules automatically navigate a website and perform updates of payment token information.
Systems and methods for cryptographic authentication of contactless cards
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.
CRYPTOCURRENCY SYSTEM HAVING INTEGRATED ELECTRONIC DELIVERY FEATURES
A method includes conveying a cryptocurrency transaction to a peer-to-peer network, wherein said cryptocurrency transaction having encoded therein an email address and to convey goods or services embodied in an electronic form to the email address in response to receipt of said cryptocurrency transaction on said peer-to-peer network. The conveying of goods or services includes transmitting over the Internet in conformance with an email protocol. The goods or services includes event admission tickets, music recordings, video, text, game content, live event broadcast, software, encryption keys or passwords.
PAYMENT SYSTEM USING CUSTOMER'S FINGERPRINTS
Shoppers install a software app on a mobile device and create a user profile. The shopper scans a fingerprint using a fingerprint sensor. Scanned fingerprint data is wirelessly transmitted to the shopper's mobile device for re-transmission over the Internet for storage in a secured server. The shopper can add payment methods (credit cards, debit cards, etc.) to the user's profile. Participating merchants registered with the payment system provide a fingerprint sensor at the point of sale. A shopper transacts purchases at a merchant's location by placing a finger on the fingerprint sensor. Scanned fingerprint data is transmitted to a merchant point of sale device and re-transmitted over the Internet to confirm the identity of the shopper, and to complete the transaction. A shopper makes purchases online using the installed software app. Participating merchants integrate APIs with existing e-commerce platforms, allowing merchants to charge and/or request access to user payment accounts.
Distributed Consent Protecting Data Across Systems And Services
Non-limiting examples of the present disclosure relate to generation and implementation of a new security protocol that is used to secure common data access transactions across distributed network examples. An exemplary proof of verification protocol is disclosed that implements consensus security mechanisms across a plurality of distributed nodes, which may be utilized to validate owners of data in common data access transactions. Extending principles of blockchain security to common data access transactions and Internet of Things (IoT) networking requires a solution that: improves speed in transactional processing; reduces computational complexity; and presents efficient, secure and repeatable validation for owners of data in distributed networking environments. An exemplary proof of verification protocol provides such technical advantages by validating both user-specific data for a subscriber of an application/service and session data for user activity (past and present) within the application/service.
System and method for integrating cyber fraud intelligence and payment risk decisions
The invention relates to a method and system that combines payment data and cyber fraud indicators to identify potential fraud in payment requests from a client. The system comprises: a memory that stores and maintains a list of known fraud characteristics and cyber fraud indicators; and a computer processor, coupled to the memory, programmed to: receive, via an electronic input, a payment instruction from the client; identify one or more cyber fraud indicators associated with the payment instruction; apply payment decisioning to merge the one or more cyber fraud indicators to the payment instruction; generate a risk score based on the payment decisioning to determine whether the payment instruction should be executed; and automatically apply the payment decisioning to the payment instruction.
TRANSMITTER FOR TRANSMITTING A SECURE ACCESS SIGNAL
A transmitter for transmitting a secure access signal to a system for providing secure access to a controlled item is disclosed. The access is dependent on information contained in the secure access signal. The transmitter comprises a biometric sensor for receiving a biometric signal and a processor for matching the biometric signal against members of a database of biometric signatures. The transmitter comprises enabling means for enabling an inductive circuit, based on the matching of the biometric signal, to transmit the secure access signal conveying the information to the system upon the inductive circuit being placed within range of a radio frequency field emitted by the system.