H04L2463/102

Visual image authentication
11693944 · 2023-07-04 · ·

Methods and systems described herein authenticate a user and help secure transaction. A display screen presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a user selects a sequence of visual images as a means of authenticating the user and logging into a financial account or other corporate account. In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize, and select. In an embodiment, a user presses his or her finger or fingers on a display screen to select images as a method for authenticating and protecting communication from malware. In an embodiment, non-determinism in hardware helps unpredictably vary the image selected, the image location, generate noise in the image, or change the shape or texture of the image. In some embodiments, visual image authentication helps Alice and Bob detect if Eve has launched a man-in-the-middle attack on their key exchange.

Provisioning of secure application

Methods and devices for provisioning a secure application on an electronic device with first issuer data for a first issuer are described. In an embodiment, the provisioning system receives and stores first issuer records. The example provisioning system receives a provisioning request to provision the secure application with the first issuer data. The provisioning request includes identifying information. The example provisioning system evaluates the provisioning request based on at least one of the first issuer evaluation criteria, the first issuer records and the identifying information in the provisioning request. When the provisioning request satisfies the first issuer evaluation criteria, the example provisioning system generates a signal using the communication module to provide the first issuer data to the electronic device to provision the secure application on the electronic device.

SYSTEMS AND METHODS FOR PRIVATE NODE-LEVEL DATA COMPUTING AND RECONCILIATION

Aspects and embodiments are directed to method and system for node based reconciliation. Various aspects also provide for real-time securities exchange while supporting cash based transactions. Additional aspects incorporate improved user interfaces for enabling single selection investment decisions for all of a clients' wealth.

Method for arbitrating encrypted electronic transactions among intermediary and authoring users only when an interaction occurs between authoring and candidate users who was exposed by the intermediary user to data published by authoring user

System and computer-implemented method of permitting or arbitrating encrypted electronic transactions to occur among an intermediary and an author in an electronic data system only when an interaction occurs between the author and a candidate who was exposed by the intermediary to data published by the author. The author publishes criteria about a candidate, and the candidate posts information about the candidate, which is ingested and married to personally identifiable information about the candidate. A score is calculated indicating a correlation between the candidate and the published criteria, and an intermediary exposes the candidate to the criteria, which is tracked. When the candidate completes an interaction with the author, an encrypted transaction is permitted to occur between the author and the candidate through a proxy, without the author knowing the identity of the intermediary who facilitated the introduction.

Digital safety and account discovery

Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscriptions and financial accounts. The identified subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.

Systems and methods for analyzing vulnerabilities of networked systems

Methods and systems for assessing and evaluating vulnerabilities of a networked system are presented. A list of known vulnerabilities that have been disclosed in the public may be obtained. The networked system may be scanned from an external perspective to obtain network information of the networked system. A subset of the known vulnerabilities may be determined to be relevant to the networked system based on correlations between the vulnerabilities and the network information. The networked system may also be analyzed from an internal perspective to determine impacts of the relevant known vulnerabilities to the networked system. The impact of a vulnerability may be determined based on the type of data and/or the type of services that may be accessible in an attack that exploits the vulnerability. The vulnerabilities may then be ranked and addressed based on the impacts.

Data aggregation and process automation systems and methods
11594312 · 2023-02-28 · ·

A data aggregation and process automation (DAPA) system is disclosed. The DAPA system includes an authentication module, a monitoring module, an intelligent automation module, and a transformation module. The authentication module is configured to initiate authenticated communication with a plurality of servers, and includes an authentication storage having a plurality of authentication credentials and routing information. The monitoring module is configured to monitor a first server for a first change event and monitor a second server for a second change event. The first change event results in the receipt of a first data object and the second change event results in the receipt of a second data object. The intelligent automation module is configured to identify the second server, request a service, and submit an update data object to the first server. The transformation module is configured to transform data objects from one format into another.

Method and Apparatus for Verification

A device may verify the authorization of the payee by a payee identification server. A device may create a record in a database on the payee identification server, the record including, either directly or indirectly, payee identification information, payee address, payee phone number, payee tax information, one or more methods of payment accepted by the payee comprising a type of payment, institution information, and account information. A device may verify said record with one or more verification sources. A device may record the results of the verification in the record. A device may create a d-token to point to the record. A device may send the d-token to the payee. A device may receive, by the payee identification server, the d-token from a third party. A device may retrieve the one or more of the methods of the payment accepted by the payee.

Digital Key With Monetary Value
20220366408 · 2022-11-17 ·

The disclosure is directed to use of digital keys in providing access to secured locations, goods and resources as well as other assets. The access may be fee based with the disclosure further directed to including fee payment authorization into the access process. Electronic locks may be employed within modules to faciltiate the access. The digital keys may be accompanied with commands for the electronic locks and/or modules accomodating them to execute in the course of providing the access. The digital keys may be shared, limited to single or multiple use and may be lock agnostic. The commands may be sent from a smart mobile device and be digitally signed for subsequent attestation by the lock for authenticity verification. The digital keys may be generated and otherwise handled under one of a series of escalating security encryption methods typically used and reserved for financial transactions.

Email based e-commerce using embedded forms

A method implemented in an e-commerce system to facilitate transactions between a customer and a vendor using embedded forms includes requesting by a vendor system to an e-commerce system to generate an embedded form for use in an SMTP email campaign. The method further includes transmitting emails with embedded forms including at least one token by the vendor system to a customer device. The method further includes rendering the embedded form in email to the customer device and receiving a response email, wherein the response email includes input details requested in the specified input fields and a token; authenticating the response email; decoding the token and processing a transaction based on the customer input details requested in the specified input fields of the embedded form.