Patent classifications
G06Q20/4093
SYSTEMS AND METHODS FOR RESETTING AN AUTHENTICATION COUNTER
Systems and methods for counter resynchronization can include one or more servers each including a memory and one or more processors. The one or more servers can be in data communication with a transmitting device. The one or more processors can be configured to determine one or more reset events. The one or more processors can be configured to generate a resync value. The one or more processors can be configured to transmit, via one or more scripts, the resync value to the transmitting device according to one or more prioritization factors and in response to the one or more reset events. The one or more processors can be configured to replace the counter value with the resync value in accordance with the one or more prioritization factors.
SYSTEMS AND METHODS FOR PROVIDING ONLINE SECURITY
A method for providing online security may include: (1) receiving, by a validation computer program executed by a trusted entity backend for a trusted entity, a call from a web browser executed on a customer electronic device browsing a webpage for an online entity, the call comprising an online entity identifier for the online entity and a session identifier, wherein the webpage for the online entity may include a hidden <iframe> comprising code that causes the web browser to execute the call; (2) confirming, by the validation computer program, that a cookie for the trusted entity may be stored on the customer electronic device; and (3) returning, by the validation computer program, a first value indicating that the customer electronic device is known to the trusted entity or a second value indicating that the customer electronic device is not known to the trusted entity based on the confirmation.
Biometric transaction system
Disclosed is a system for enrolling a user for facilitation of transactions using biometric authentication. The enrolling system includes an application program that is configured to: receive a user attribute; create an anonymous client reference (ACR) associated with the user attribute; and receive a biometric template. The biometric template has been determined from an input of a biometric. The enrolling system is further configured to create an association between the biometric template and the ACR.
False fraudulent correction methods and apparatuses
A computer-implemented method and apparatus are provided to reduce false fraudulent declines of transactions. Payment processor (PP) systems may be provided with a request acceptor and a replacement transaction generator. The request acceptor receives a notification of a decline of a first transaction attempted by a cardholder with a merchant, for allegedly fraudulent, and a request to determine whether the first transaction was falsely identified as fraudulent, and if so, to remedy the first transaction. The replacement transaction generator generates, in response to a determination that the first transaction was falsely identified as fraudulent, and the merchant is a false fraudulent reduction partner merchant, a replacement second transaction to replace the declined first transaction. The replacement second transaction may include a bypass authorization code, and made available to the cardholder to use to transact with the merchant bypassing the declined first transaction.
Identifying high risk computing operations
This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
Voice Payment Method and Electronic Device
A voice payment method and an electronic device are provided. The method includes: A first electronic device receives voice information of a user, where the voice information is used to indicate a payment operation performed by the user; when a voiceprint feature of the voice information meets a preset condition, the first electronic device requests a second electronic device to authenticate the user; the second electronic device prompts the user to perform an authentication process, where the authentication process includes one or more of fingerprint authentication, facial recognition, password authentication, verification code authentication, and near field communication NFC authentication; when authentication performed by the second electronic device on the user succeeds, the second electronic device indicates to the first electronic device that authentication performed by the second electronic device on the user succeeds; and the first electronic device completes the payment operation with a payment platform.
Unsupervised machine learning system to automate functions on a graph structure
Machine learning models, semantic networks, adaptive systems, artificial neural networks, convolutional neural networks, and other forms of knowledge processing systems are disclosed. An ensemble machine learning system is coupled to a graph module storing a graph structure, wherein a collection of entities and the relationships between those entities forms nodes and connection arcs between the various nodes. A hotfile module and hotfile propagation engine coordinate with the graph module or may be subsumed within the graph module, and implement the various hot file functionality generated by the machine learning systems.
Entity identification based on a record pattern
The methods described herein are configured to obtain a first record pattern associated with the unidentified entity and select a second record pattern associated with an entity identifier of a known entity. Based on the first record pattern matching the second record pattern, the entity identifier of the known entity is associated to the unidentified entity to indicate that the unidentified entity and the known entity are the same. Determining the entity identifier of the unidentified entity enables the linking of separate identifier systems of data structures to facilitate communication and/or interaction between the data structures.
Data processing method based on NFC label, system and server thereof
The invention relates to a data processing method based on NFC tag. The method comprises: reading the NFC tag, the NFC tag comprising tag content and tag ID; generating an NFC tag payment request based on the tag content and tag ID; parsing the NFC tag payment request and obtaining an parsing reply to the NFC tag payment request; generating an order generation request based on the parsing reply, wherein the order generation request is for causing an order to be generated based on first account information, current transaction information and second account information; generating the order based on the order generation request; and payment step for performing payment based on the order. According to embodiments of the invention, the payment process can be simplified, also, there is no need to set the NFC-specific reading device in the embodiments of the invention, and the cost of merchants can be reduced.
IOT DEVICES
A method of operating an Internet of Things (IoT) device, the IoT device capable of communicating with a third-party system in order to perform an autonomous task subject to authorisation by an IoT authorisation device, the method comprising: sending operating parameters relating to the autonomous task to a user for approval; receiving user-approved operating parameters for the autonomous task; configuring the IoT device to perform the autonomous task within the user approved operating parameters; registering the user approved operating parameters with the IoT device management server to enable the IoT authorisation device to check that the IoT device is operating within the user-approved operating parameters when it performs an autonomous task with the third-party system.