Patent classifications
H04L2463/102
Extensible electronic payment schema
In one arrangement, a non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by at least one processor of a computing system, cause the computing system to process an electronic transaction using a schema. The schema includes a first unique entity object identifier identifying a sender, a second unique entity object identifier identifying a receiver, and a first transaction object identifier identifying the transaction. The first transaction object identifier is located at a top level of a hierarchy of a plurality of transaction object identifiers. The schema further includes transaction information comprising the first unique entity object identifier, the second unique entity object identifier, and the unique transaction object identifier.
EMAIL BASED E-COMMERCE USING EMBEDDED FORMS
A method implemented in an e-commerce system to facilitate transactions between a customer and a vendor using embedded forms includes requesting by a vendor system to an e-commerce system to generate an embedded form for use in an SMTP email campaign. The method further includes transmitting emails with embedded forms including at least one token by the vendor system to a customer device. The method further includes rendering the embedded form in email to the customer device and receiving a response email, wherein the response email includes input details requested in the specified input fields and a token; authenticating the response email; decoding the token and processing a transaction based on the customer input details requested in the specified input fields of the embedded form.
TECHNIQUES TO AUTOMATICALLY UPDATE PAYMENT INFORMATION IN A COMPUTE ENVIRONMENT
Various embodiments are generally directed to techniques for generating rules automatically navigate a website and perform updates of payment token information.
SECURE POINT OF SALE (POS) OPERATIONS
Examples presented herein describe secure point of sale (POS) operations. One example is a method including receiving, at a mobile device, a communication associated with a custom tender payment for a secure transaction payment, where the mobile device includes a custom payment application configured for the secure transaction payment with a point of sale (POS) device. The method includes receiving account data associated with a user account selection for the custom tender payment for the secure transaction payment, transmitting an account signal including the account data, where when the account signal is transmitted to an integration server as part of the secure transaction payment, the account signal is not transmitted to the POS device, and receiving an authorization communication, where when the authorization communication is received by the mobile device from the integration server, the authorization communication is not communicated to the mobile device via the POS device.
MULTI-CHANNEL AUTHENTICATION USING DELEGATED CREDENTIALS
Disclosed herein are methods and systems for electronic authentication using delegated credentials to complete checkout and payment operations on a trusted device of a user. A computing system is structured to perform operations comprising receiving transaction information corresponding to an incomplete checkout operation, transmitting at least a subset of transaction information to a customer device, causing the customer device to generate and display a notification comprising a request for user authorization to complete the incomplete checkout operation, receiving customer input indicative of instructions to complete the incomplete checkout operation, and, responsive to receiving customer input, completing the incomplete checkout operation.
Multi-Function Data Key
A data key for secure financial and other types of data transactions with a key-shaped case, lightbox touch sensor carrying a removable wafer, processor, secure memory, general-purpose memory, battery, antenna, speaker, microphone, and a dual-purpose USB and chip pin pad. Bluetooth, NFC and/or RFID provides the ability to pair the data key through a wireless channel with another device, such as a smartphone, using a pairing button on the back of the data key. The data key provides chip-and-pin type security to online financial transactions. Dual-device (multi-factor) security requires both the data key and another communication device registered to an authorized user to be present to activate the data key for secure operations. Device pairing enables geo-proximity features, such as dual-device security with a paired device, key finder, phone finder, and panic button. The data key may provide secure, remotely programmable security for building and equipment access.
MULTI-TIER TOKENIZATION WITH LONG TERM TOKEN
Examples describe data security for communication systems. One example includes validating a user device using secure user data and generating a long term token for the user device, where the long term token is generated with a randomized unique token system. The method further includes receiving a transaction communication associated with a secure transaction, the transaction communication including the long term token, generating a transaction token that is different than the long term token for the transaction communication using the long term token from the transaction communication, and facilitating the secure transaction using the transaction token and the long term token.
Method And System For Token Gateway
A method is disclosed. The method includes receiving, by a token gateway, a first request message from a token requestor computer. The token gateway determines at least one token service computer from a plurality of token service computers, each token service computer in the plurality of token service computers operating independently of each other. The token gateway transmits at least one second request message to the at least one token service computer and receives, at least one first response message comprising at least one token and/or supplemental data associated with the at least one token from the at least one token service computer. The token gateway transmits a second response message to the token requestor computer, the second response message comprising the at least one token and/or the supplemental data.
Neural network systems and methods for generating distributed representations of electronic transaction information
Systems and methods are provided for authorizing an electronic transaction. In one implementation at least one processor is programmed to receive electronic transaction data and historical transaction data, the electronic transaction data including an entity identifier component and an amount component of an electronic transaction; determine, based on the entity identifier component and the amount component, a location of the electronic transaction in a space of a distributed representation space, the distributed representation space comprising a mapping of electronic transaction components in a high-order space; determine locations of the historical transaction data in the distributed representation space; determine a decision boundary in the distributed representation space based on the locations of the historical transaction data; and authorize the electronic transaction based on the location of the electronic transaction being within the decision boundary.
Heartbeats and consensus in verifiable outsourced ledgers
Heartbeat consensus forming for the state of a digital ledger built upon a blockchain to provide users with the ability to securely, accurately, and verifiably share state information between distrustful parties is provided herein. The digital ledger is hosted in a networked environment, accessible by multiple parties. Heartbeat transactions allow clients, who are not in direct communication with one another and may distrust one another, to verify the integrity of the digital ledger via consensus. The consensus is readily verifiable by each client on its own machine and allows the ledger to be recovered to an agreed-to state in the event of a fault initiated by a client or the host of the ledger, whether malicious or otherwise. The digital ledger is freely movable to different hosts in the event of a fault.