Patent classifications
G06Q20/34
SYSTEMS AND METHODS FOR CONTINUOUS USER AUTHENTICATION
A computer device configured to passively authenticate a user includes a memory device including a user profile, and at least one processor coupled to the memory device. The at least one processor is programmed to execute a passive authentication system programmed to receive an indication that the user successfully performed an active authentication by interacting with the computing device, and set an authentication state of the user as authenticated in response to the successful active authentication. The passive authentication system is further programmed to receive a first plurality of interaction data indicative of one or more interactions between the user and the computer device, the one or more interactions performed after the indication of the successful active authentication; compare the one or more interactions to the user profile; and update the authentication state of the user based on the comparison.
SYSTEMS AND METHODS FOR CONTINUOUS USER AUTHENTICATION
A computer device configured to passively authenticate a user includes a memory device including a user profile, and at least one processor coupled to the memory device. The at least one processor is programmed to execute a passive authentication system programmed to receive an indication that the user successfully performed an active authentication by interacting with the computing device, and set an authentication state of the user as authenticated in response to the successful active authentication. The passive authentication system is further programmed to receive a first plurality of interaction data indicative of one or more interactions between the user and the computer device, the one or more interactions performed after the indication of the successful active authentication; compare the one or more interactions to the user profile; and update the authentication state of the user based on the comparison.
SYSTEMS AND METHODS FOR REAL-TIME VIRTUAL GIFT CARD PURCHASING
A computer-implemented method for allowing purchase of virtual gift cards includes receiving a communication indicating a gift card type and specifying a value amount. Responsive to the communication, a purchase of a virtual gift card of that type and storing that value amount is processed. This processing includes processing a payment for the specified value amount. Further, a gift card merchant application programming interface (API) capable of processing a purchase of a virtual gift card of the indicated gift card type is identified from amongst a set of such APIs. That API is used to initiate purchase of the virtual gift card. After the purchase is processed, an indication of the purchased virtual gift card is sent to a mobile computing device. The mobile computing device uses the indication to configure itself to allow transactions using the purchased virtual gift card to be initiated. Fraud detection may also be performed.
CONTINUOUS AUTHENTICATION FOR DIGITAL SERVICES BASED ON CONTACTLESS CARD POSITIONING
Various embodiments are generally directed to continuous authentication of a user to a digital service based on activity of a contactless card positioned proximate to a computing device on which the digital service operates. For example, a series of periodic status messages may be provided between a client device and the contactless card to verify whether the contactless card remains active, wherein authorization to access the digital service continues while the contactless card is active, and terminates when the contactless card is inactive.
MANAGED EMV KERNEL FOR FASTER PROCESSING
Method and system of performing transactions with a payment card in a managed integrated payment environment comprising an integrated circuit are disclosed comprising interacting with an integrated circuit on a received payment card to obtain card data by a payment terminal and determining whether full online transaction processing of the card data is required. If full online transaction processing of the card data is required, the card data is sent to a point-of-sale terminal, which sends the card data and a transaction total for the transaction to a merchant gateway, which obtains approval or denial of the transaction. The approval or denial is provided to the PIN pad by the merchant gateway via the point-of-service terminal. The PIN pad also receives transaction data and sends the transaction data and card data to a services processor to collect metadata, perform fraud and security checks, and/or encrypt the card data.
METHOD FOR IMPLEMENTING MIDDLEWARE BASED ON EMV AND TERMINAL DEVICE
The present application provides a method for implementing a middleware based on EMV, a terminal device, and a computer-readable storage medium. The method includes: establishing a middleware based on EMV L2, wherein the middleware provides a first interface for an upper-layer application of the terminal device to call; after the middleware receives a calling request for the first interface sent by the upper-layer application according to detected information of a IC card, calling an interface of an Entry library according to the calling request to obtain a return result of the Entry library, wherein the return result of the Entry library comprises an application identifier of the IC card; and determining an EMV L2 library matching the IC card based on the application identifier, and calling an interface of the EMV L2 library matching the IC card, to complete a contactless process with the IC card.
System and Computer-Implemented Method for Character Recognition in Payment Card
The present disclosure relates to a system and computer-implemented method for character recognition in a payment card. The method includes receiving an image of a payment card and one or more details associated with the payment card. Further, a derivative of the image is determined based on the one or more details and a horizontal sum of pixel values is determined for a plurality of rows in the image. Furthermore, one or more Regions of Interest (ROIs) are identified in the image by comparing the horizontal sum of pixel values with a predefined first threshold. Subsequently, one or more characters in the one or more ROIs are extracted using one or more peak values in a histogram of the one or more ROIs. Finally, each of the one or more characters extracted from the one or more ROIs is recognized using a trained Artificial Intelligence technique.
METHODS AND SYSTEMS FOR DETERMINING VERIFICATION INFORMATION RELATED TO VIRTUAL CARDS
Disclosed are systems and methods for utilizing virtual reality for virtual cards. For example, a method of determining verification information may include: obtaining an image of a merchant site of a merchant captured by at least one camera of a first computing device, wherein the merchant site is displayed on a display of a second computing device; identifying one or more characters in the captured image; determining that the identified one or more characters indicate a virtual credit card number associated with a user; determining a card verification value associated with the virtual credit card number and an expiration date associated with the virtual credit card number; and displaying information regarding the determined virtual credit card number on a display of the first computing device.
DETERMINING MERCHANT ENFORCED TRANSACTION RULES
Systems as described herein determine merchant enforced transaction rules. A determination server may receive transaction data associated with a plurality of merchants. The determination server may generate a histogram of payments associated with a merchant category and filter out transaction data having purchase amounts above or below a predetermined threshold. The determination server may determine a first average purchase amount associated with merchants in the merchant category and a second average purchase amount associated with each merchant in the merchant category. The determination server may determine user spending patterns and that a first merchant in the merchant category enforces one or more card-based transaction rules using machine learning models. After determining that a user device is proximately located to the first merchant, a notification indicating the one or more card-based transaction rules associated with the first merchant may be sent to the user device.
DETERMINING MERCHANT ENFORCED TRANSACTION RULES
Systems as described herein determine merchant enforced transaction rules. A determination server may receive transaction data associated with a plurality of merchants. The determination server may generate a histogram of payments associated with a merchant category and filter out transaction data having purchase amounts above or below a predetermined threshold. The determination server may determine a first average purchase amount associated with merchants in the merchant category and a second average purchase amount associated with each merchant in the merchant category. The determination server may determine user spending patterns and that a first merchant in the merchant category enforces one or more card-based transaction rules using machine learning models. After determining that a user device is proximately located to the first merchant, a notification indicating the one or more card-based transaction rules associated with the first merchant may be sent to the user device.