Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 6298. Отображено 200.
27-06-2006 дата публикации

СПОСОБ И УСТРОЙСТВО ДЛЯ ВЫПОЛНЕНИЯ ЭЛЕКТРОННЫХ КОММЕРЧЕСКИХ ОПЕРАЦИЙ С ИСПОЛЬЗОВАНИЕМ БЕСПРОВОДНОГОУСТРОЙСТВА СВЯЗИ

Номер: RU2279135C2

Изобретение относится к мобильной электронной коммерции. Технический результат - повышение удобства выполнения коммерческих операций в беспроводной сети электронной коммерции с обеспечением их безопасности. Сущность заключается в том, что способ выполнения беспроводной операции, включает в себя передачу заявки на операцию с беспроводного устройства связи на операционное устройство и передачу речевого кода аутентификации операции с беспроводного устройства связи на операционное устройство. После аутентификации речевого кода аутентификации беспроводное устройство связи получает код операции. После получения кода операции код операции отображается на видеотерминале беспроводного устройства связи и оптически сканируется с него для предоставления законной коммерческой операции. 3 н. и 31 з.п. ф-лы, 11 ил.

Подробнее
27-02-2006 дата публикации

СПОСОБ И УСТРОЙСТВО ДЛЯ ОБЛЕГЧЕНИЯ БЕСПРОВОДНЫХ ЭЛЕКТРОННЫХ КОММЕРЧЕСКИХ ОПЕРАЦИЙ

Номер: RU2271037C2

Изобретение относится к мобильной электронной коммерции. Технический результат - повышение удобства выполнения коммерческих операций в беспроводной сети электронной коммерции с обеспечением их безопасности. Сущность способа выполнения беспроводной операции заключается в том, что он включает в себя получение системой выполнения операций заявки на операцию от заказчика операции и идентификацию заказчика операции. После идентификации заказчика операции код операции передается из системы выполнения операций в беспроводное устройство связи заказчика. После получения кода операции код операции оптически сканируется с видеотерминала беспроводного устройства связи заказчика системой выполнения операций. 5 н. и 24 з.п. ф-лы, 10 ил.

Подробнее
29-09-2017 дата публикации

ЗАЩИТА ДАННЫХ С ПЕРЕВОДОМ

Номер: RU2631983C2

Изобретение относится к области шифрования данных. Технический результат - обеспечивают механизм для передачи и маршрутизации зашифрованного идентификатора/номера счета через сеть обработки без необходимости обновления существующей инфраструктуры маршрутизации для обработки зашифрованных значений, что улучшает безопасность идентификатора/номера счета, так как идентификатор/номер счета может оставаться зашифрованным, пока сообщение запроса авторизации проходит через узлы сети при обработке. Способ защиты данных, ассоциированных с транзакцией, содержащий этапы, на которых: принимают посредством устройства доступа личный идентификационный номер (PIN) и уязвимые данные, включающие в себя идентификатор счета; шифруют посредством устройства доступа PIN, при этом шифрование PIN использует первый вариант ключа шифрования, основанный на исходном ключе; шифруют посредством устройства доступа уязвимые данные, включающие в себя идентификатор счета, при этом зашифрованный идентификатор счета имеет тот ...

Подробнее
20-12-2003 дата публикации

ФАКТУРИРОВАНИЕ АБОНЕНТОВ В РЕАЛЬНОМ ВРЕМЕНИ ПО МЕСТОНАХОЖДЕНИЮ АБОНЕНТА В НЕСТРУКТУРИРОВАННОЙ СЕТИ СВЯЗИ

Номер: RU2219578C2
Принадлежит: БЛОК ПЭЙТЕНТС, ИНК. (US)

Изобретение относится к системам и способам фактурирования абонентов в реальном времени. Технический результат заключается в расширении функциональных возможностей за счет возможности контроля действий абонентов в сети связи без центрального управляющего/контролирующего устройства. Сведения о счете запоминают, по меньшей мере, для одного абонента по местоположению абонента. Определяют, на основе сведений о счете, наличие у абонента достаточного положительного сальдо для нужного обслуживания. Обслуживание абоненту разрешают или запрещают на основе этого определения. Дополнительные сведения о счете запоминают по местоположению поставщика услуг и используют для контроля сведений об обслуживании данного абонента и для корректирования обслуживания, предоставляемого данному абоненту. 6 с. и 14 з.п.ф-лы, 34 ил.

Подробнее
05-03-2020 дата публикации

МОСТ МЕЖДУ АУТЕНТИФИКАЦИЕЙ И АВТОРИЗАЦИЕЙ С ИСПОЛЬЗОВАНИЕМ РАСШИРЕННЫХ СООБЩЕНИЙ

Номер: RU2716042C1

Изобретение относится к системе и способу электронной связи и к устройству декодирования. Технический результат заключается в обеспечении аутентификации транзакции. Система содержит один или более процессоров третьей стороны, выполненных с возможностью создавать предварительное число аутентификации транзакции (Pre-ATN) путем объединения некоторого числа со специальным значением кодирования (SEV), причем SEV представляет собой однозначное целое число; шифровать Pre-ATN с использованием сохраняющего формат шифрования (FPE) для генерирования зашифрованного числа аутентификации транзакции (ATN); и отправлять зашифрованное ATN на сервер управления доступом (ACS), чтобы использовать зашифрованное ATN для генерирования проверочного кода аутентификации держателя карты (CAVV) или кода аутентификации владельца счета (AAV). 3 н. и 13 з.п. ф-лы, 4 ил.

Подробнее
11-10-2001 дата публикации

Secure communication of esp. electronic cash transactions over insecure network e.g. internet

Номер: DE0019655042C2
Принадлежит: CYBERCASH INC, CYBERCASH, INC.

The secure communication involves separated devices of two parties e.g. a customer (100) who wants to buy a product over the internet (50) from a merchant (300), at two corresp. locations and both in communication with a server (100). The method involves creating two sessions associated with each of two parties, each having corresp. use parameters for limiting the duration each session can be used and a corresp. data set which are identifiable by the server. Portions incorporating the data set and the use parameters of each session are linked in the communication system, on the basis of which each party is verified to determine whether their corresp. sessions can be used for secure communication. Part of each data set is transmitted between each corresp. device and the server after the corresp. sessions are created. The two sets of data include two corresp. keys respectively, through which the server verifies each party. The first and second use parameters are determined by each corresp ...

Подробнее
21-11-2002 дата публикации

Verfahren und Vorrichtung zur Autorisierung in Datenübertragungssystemen

Номер: DE0059805939D1
Автор: SCHMITZ KIM, SCHMITZ, KIM
Принадлежит: SCHMITZ KIM, SCHMITZ, KIM

Подробнее
21-12-2006 дата публикации

VERFAHREN UND SYSTEM ZUR VERWALTUNG VON DIGITALEN ABONNEMENTRECHTEN

Номер: DE0060212920T2

Подробнее
09-09-2015 дата публикации

System and method for secure transmission of data signals

Номер: GB0201513048D0
Автор:
Принадлежит:

Подробнее
21-08-2002 дата публикации

System for the anonymous purchase of products or services online

Номер: GB0002372344A
Принадлежит:

The invention is concerned with enabling anonymous purchases of products or services to be made-on-line. In order to initiate a purchasing session, the purchaser authenticates himself to a home provider computer 3 which then allots an anonymous client identifier (clientID) to the client for the purposes of that session. The purchaser 1 contacts a vendor computer 6, using the anonymous identifier (clientID) and an anonymising HTTP proxy, in order to place an order for products or services for which the vendor computer has the right to authorise delivery. The vendor computer 6 contacts the home provider computer 3 and presents the home provider computer with the clientID to request a public key of the anonymous client for the purposes of a transaction, this public key being selected for that transaction from a collection of public key/private key pairs previously allotted to the purchaser by the home provider computer 3. The vendor computer then issues a certificate (cert1, Figure 2), which ...

Подробнее
21-08-2002 дата публикации

Digital credential monitoring

Номер: GB0002372412A
Принадлежит:

A computer system comprising a first computer node coupled to a network, the first node being arranged to provide a service to a second computer node via a connection over the network; a controller for determining access to the service based upon a digital credential associated with the connection, the controller being arranged to vary access to the service over the connection in response to a change in status of the digital credential.

Подробнее
07-02-2001 дата публикации

Improvements in and relating to communication methods

Номер: GB0000031429D0
Автор:
Принадлежит:

Подробнее
01-05-2019 дата публикации

Systems and methods for providing block chain-based multifactor personal identity verification

Номер: GB0002567960A
Принадлежит:

Block chain-based multifactor personal identity verification is disclosed. A verification address (i.e. an address indicating a particular location on a blockchain) may be assigned to an individual having a previously verified identity, an identifier for the individual and biometric information of, or derived from, the individual may be stored in the blockchain at the assigned verification address. A request to verify an individual’s identity is received from a client-side device, the request containing a received identifier and received biometric data, the request indicating the verification address associated with the blockchain. The stored identifier and biometric information in the blockchain are retrieved from the specific address and upon successful matching of the supplied and retrieved identifier and supplied and retrieved biometric information a verification of the requesting individual is signed. The biometric information stored in the blockchain and received from the client may ...

Подробнее
10-10-2018 дата публикации

Systems and method for secure management of digital contracts

Номер: GB0201813835D0
Автор:
Принадлежит:

Подробнее
28-02-2014 дата публикации

Expansion device placement apparatus

Номер: AP0201407428D0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
23-11-2016 дата публикации

Mobile banking system with cryptographic expansion device

Номер: AP0000003906A
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
17-11-2016 дата публикации

Expansion device placement apparatus

Номер: AP0000003901A
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
31-12-2005 дата публикации

Interoperable systems and methods for peer-to-peerservice orchestration.

Номер: AP2005003476A0
Принадлежит:

Подробнее
28-02-2014 дата публикации

Expansion device placement apparatus

Номер: AP2014007428A0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
28-02-2014 дата публикации

cryptographic

Номер: AP2014007430A0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
28-02-2014 дата публикации

Mobile banking system with cryptographic expansiondevice

Номер: AP2014007429A0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
28-02-2014 дата публикации

Mobile banking system with cryptographic expansiondevice

Номер: AP0201407429A0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
28-02-2014 дата публикации

cryptographic

Номер: AP0201407430A0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
31-12-2005 дата публикации

Interoperable systems and methods for peer-to-peerservice orchestration.

Номер: AP0200503476D0
Принадлежит:

Подробнее
28-02-2014 дата публикации

Mobile banking system with cryptographic expansiondevice

Номер: AP0201407429D0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
28-02-2014 дата публикации

cryptographic

Номер: AP0201407430D0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
28-02-2014 дата публикации

Expansion device placement apparatus

Номер: AP0201407428A0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
31-12-2005 дата публикации

Interoperable systems and methods for peer-to-peerservice orchestration.

Номер: AP0200503476A0
Принадлежит:

Подробнее
15-05-2009 дата публикации

MONITORING OF THE NETWORK ACTIVITY

Номер: AT0000429750T
Принадлежит:

Подробнее
15-08-2008 дата публикации

PROCEDURE AND SYSTEM FOR THE SECURED TRANSMISSION

Номер: AT0000404013T
Принадлежит:

Подробнее
15-11-2019 дата публикации

Swipe wi-fi: providing target related content for a mobile device

Номер: AT0000521188A2
Автор:
Принадлежит:

Computerimplementiertes System zum Bereitstellen von Inhalten für eine mobile Vorrichtung basierend auf dem Standort der mobilen Vorrichtung, ein computerimplementiertes grafisches Steuerungselement für eine mobile Vorrichtung und ein computerimplementiertes Zugangsverwaltungssystem zum Bereitstellen von Inhalten für eine mobile Vorrichtung basierend auf dem Standort der mobilen Vorrichtung.

Подробнее
15-05-2012 дата публикации

SYSTEM, PROCEDURE AND COMPUTER PROGRAMME PRODUCT FOR THE WARRANTY OF ELECTRONIC TRANSACTIONS

Номер: AT0000555584T
Принадлежит:

Подробнее
15-05-2009 дата публикации

MISSBRAUCHFREIES, ANONYMES ZAHLUNGSSYSTEM

Номер: AT0000010546U2
Принадлежит:

Подробнее
15-08-2004 дата публикации

PROCEDURE AND DEVICE FOR VERIFYING INTERNET WEB SITES

Номер: AT0000272285T
Принадлежит:

Подробнее
15-06-2004 дата публикации

SYSTEM AND PROCEDURE FOR THE AUTOMATIC ACCESS TO PERSONAL DATA

Номер: AT0000268484T
Принадлежит:

Подробнее
23-08-2018 дата публикации

Validation cryptogram for interaction

Номер: AU2017234653A1
Принадлежит: FPA Patent Attorneys Pty Ltd

A method for validating an interaction is disclosed. A first interaction cryptogram can be generated by a first device using information about a first party to the interaction and a second party to the interaction. A second interaction cryptogram can be generated by a second device also using information about the first party to the interaction and the second party to the interaction. Verifying each cryptogram can validate that the interaction details have not been changed, and that both the first party and second party legitimately authorized the interaction.

Подробнее
25-07-2019 дата публикации

Identity authentication

Номер: AU2017380450A1
Принадлежит: Madderns Pty Ltd

The present invention relates to a method of authenticating the identity of one or more users (101, 102) who are communicating with each other. The users (101, 102) share one or more secrets with each other, and use those secrets to verify their identities at a remote authentication system (103). A server (104) of the system (103) receives a secret from a first user (102) and hashes it with a salt (206), sending a reference code (207) back to the first user (102) in response. The server (104) then receives the secret from a second user (101), along with the reference code (207) and hashes the secret with the same salt (206) used to hash the first secret. The outputs (208, 209) of the hashes are then compared to determine whether the secrets matched, authenticating the identities of each user.

Подробнее
07-11-2001 дата публикации

Method and apparatus for dynamic authentication in a distributed network

Номер: AU0005735401A
Автор: KARIM RON, RON KARIM
Принадлежит:

Подробнее
23-08-2004 дата публикации

In-store (on premises) targeted marketing services for wireless customers

Номер: AU2003294382A8
Принадлежит:

Подробнее
15-01-2015 дата публикации

Natural enrolment process for speaker recognition

Номер: AU2012205747B2
Принадлежит:

The natural biometric enrolment system describes a methodology and associated apparatus for extracting spoken biometric voiceprint data from user/enrollee such a way that the natural course of live agent verification is used to mask what has typically been an automated interactive voice response task. The natural biometric enrolment system also provide the capability to synchronize agent location and agent identification such that tradition CTI systems integration is not required; this being achieved with a bidirectional and dual verification process wherein both agent and caller voiceprints are matched in a common database and software control is used to match the telephone caller with an enrolment and verification widget located at the agent desktop. Further, such an enrollment/verification widget can be used by the agent to make human judgment notations in that cause the system to a) have better scoring for enrolment and verification; b) record notations reflecting the live agent confidence ...

Подробнее
04-05-2006 дата публикации

Authentication apparatus

Номер: AU2005222560A1
Автор:
Принадлежит:

Подробнее
30-01-2002 дата публикации

Controlling and managing digital assets

Номер: AU2001275936A1
Принадлежит:

Подробнее
12-09-2002 дата публикации

Electronic transaction systems and methods therefor

Номер: AU2002247213A1
Принадлежит:

Подробнее
02-02-2017 дата публикации

CREDENTIAL MANAGEMENT SYSTEM

Номер: AU2016277638A1
Принадлежит: Phillips Ormonde Fitzpatrick

A server may communicate with a mobile device and/or a reader device via an Internet connection. The server may be configured to generate a credential and transmit the credential to the mobile device. The mobile device may use the credential in an access control system, a payment system, a transit system, a vending system, or the like.

Подробнее
17-05-2018 дата публикации

Unique code for token verification

Номер: AU2016363003A1
Принадлежит: FPA Patent Attorneys Pty Ltd

A method for tokenizing credentials is disclosed. In addition to a token, a verification value can be provided for each interaction. The verification value can be generated based at least in part on a dynamic data element. The dynamic data element may be kept secret, while the verification value can be distributed for use during an interaction. When the verification value is used, it can be validated by re-creating the verification value based at least on the stored dynamic data element.

Подробнее
09-12-1997 дата публикации

Cashless payment method

Номер: AU0002158597A
Автор: SENG ULRICH, ULRICH SENG
Принадлежит:

Подробнее
03-06-2002 дата публикации

Improvement in electronical transaction security

Номер: AU0004235901A
Принадлежит:

Подробнее
08-02-2001 дата публикации

Method and system for performing electronic money transactions

Номер: AU0000729844B2
Принадлежит:

Подробнее
03-10-2001 дата публикации

Methods and systems for providing a secure electronic mailbox

Номер: AU0004580801A
Принадлежит:

Подробнее
14-04-2005 дата публикации

METHOD AND SYSTEM FOR ESTABLISHING A COMMUNICATION USING PRIVACY ENHANCING TECHNIQUES

Номер: CA0002541824A1
Автор: ENGBERG, STEPHAN J.
Принадлежит:

A method of establishing a communication path from a first legal entity in a data communication network comprises the steps of providing at least one private reference point comprised in the data communication network and establishing a communication path from the first legal entity to the private reference point. The method further comprises verifying the authentication of the first legal entity relative to the private reference point from the first legal entity and still further a method of establishing communication from the private reference point to a second legal entity through the data communication network without disclosing the identity of the first legal entity without disclosing the identity of the first legal entity.

Подробнее
04-07-2002 дата публикации

BURIED DATA STREAM IN A WIRELESS HOME NETWORK

Номер: CA0002432690A1
Автор: LEE, STEVEN K.
Принадлежит:

A method and apparatus is presented for burying a hidden data stream (214) into a combined network data stream (210). In the preferred embodiment, the network data stream (210) is an MPEG-2 type video data stream, and the hidden data stream (214) is embedded so that it is neither readily detectable nor easily removable from the network data stream (210). A home gateway (100) having a wireless transceiver (170) communicates with appliances (180-188) in the home (20) via this network data stream (210). The hidden data stream (210) can be embedded with a main data stream (212) either by the content provider (220) or by the gateway (100) in the home (20). At he appliance (180-188), the hidden stream (214) can be removed and is presented to or used by the user in a way appropriate for the appliance (180-188). Instructions as to how the hidden stream (214) is to be presented on the appliance (180-188) can be embedded into the hidden stream (214) itself. The hidden data stream (214) can be further ...

Подробнее
26-08-1986 дата публикации

PROTECTION SYSTEM FOR INTELLIGENT CARDS

Номер: CA0001210470A1
Автор: WEINSTEIN STEPHEN B
Принадлежит:

Подробнее
05-03-1998 дата публикации

SYSTEMS AND METHODS FOR SECURE TRANSACTION MANAGEMENT AND ELECTRONIC RIGHTS PROTECTION

Номер: CA0002373508A1
Принадлежит:

The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic- facilitated transactions. Secure distributed and other operating system environments and architectures, employing, for example, secure semiconductor processing ...

Подробнее
19-12-2002 дата публикации

TRUST MODEL ROUTER

Номер: CA0002351046A1
Принадлежит:

A system and method for bridging between trust models allows parties to an e- commerce transaction to use different trust models, while still effecting the transaction with all of the necessary safeguards and comforts which would be available by effecting the transaction within a single trust model. A trust model router implements security technology that provides an interface between existing trust models and provides for the usage of disparate technologies in an e-commerce transaction. The trust model router comprises a set of secure check rules, which determine to which trust model the information should be routed and what type of certification technology should be used. Based on information obtained by an issuing certificate authority, the trust model router of the invention determines the type of trust model to be used in the transaction and follows rules-based procedures consistent with the trust model to properly record and complete the transaction. The trust model router is trusted ...

Подробнее
16-11-2002 дата публикации

SYSTEM FOR SECURE ELECTRONIC INFORMATION TRANSMISSION

Номер: CA0002386491A1
Принадлежит:

A method for secure electronic information exchange between a sender and a recipient. The method includes generating a message at a first entity, generating a message encryption key, encrypting the message using the message encryption key, wrapping the message encryption key using a key agreement algorithm, generating a Java archive file including the encrypted message, the wrapped message encryption key and cryptographic algorithm code including decryption algorithm and key agreement algorithm code, encoding the Java archive file, embedding the encoded Java archive file in an HTML file, and sending the HTML file as an e-mail attachment to said recipient.

Подробнее
25-09-2012 дата публикации

METHOD AND SYSTEM FOR SECURE COMMUNICATION

Номер: CA0002458662C
Принадлежит: STERLING COMMERCE, INC.

... ²²²A method and system for secure communication is presented. A virtual private ²proxy is generated based on an agreement between a first entity and a second ²entity. A first virtual private proxy is associated with the first entity and ²a second virtual private proxy is associated with the second entity. Data ²associated with the first entity is monitored at the virtual private proxy. ²Whether the data violates the agreement is determined and communication of the ²data from the first virtual private proxy to the second virtual private proxy ²is disallowed when the data violates the agreement.² ...

Подробнее
14-04-2009 дата публикации

METHOD AND APPARATUS FOR SECURELY TRANSMITTING AND AUTHENTICATING BIOMETRIC DATA OVER A NETWORK

Номер: CA0002358535C
Принадлежит: IRIDIAN TECHNOLOGIES, INC.

A method and apparatus for collecting and securely transmitting biometric data over a network contains a sensor, preferably a camera, for collecting biometric data and code generating hardware and software. The camera data is digitized and a unique code which is a function of the digitized camera data, a secret key and a transaction token is attached to the digital file. The code may identify the sensor which acquired the biometric information, a time at which the biometric information was acquired, or a time interval during which the data is considered to be valid, and a unique transaction code. The data and code are transmitted over a network to a server which authenticates that the data has not been altered by recomputing the code using its own knowledge of the secret key and transaction token needed to generate the code. If the data is authentic the server then computes a biometric template using the data. This biometric template is then compared to a previously defined biometric template ...

Подробнее
14-08-2008 дата публикации

METHODS AND SYSTEMS FOR DELIVERING SPONSORED OUT-OF-BAND PASSWORDS

Номер: CA0002677314A1
Принадлежит:

Methods and systems for delivering advertising content to selected users in combination with out-of-band passwords or access code information deliver ed over a selected communication medium.

Подробнее
21-12-2011 дата публикации

IMPROVED SYSTEM, DEVICE AND METHOD FOR SECURE AND CONVENIENT HANDLING OF KEY CREDENTIAL INFORMATION

Номер: CA0002708421A1
Принадлежит:

A method for secure provision of credential information comprising, providing a computer accessing a network through a network interface card and a credential storage unit operatively connected to the network interface card, the network interface card receiving a message from a remote server requesting credential information, in response to the network interface card receiving the message, the network interface card obtaining the credential information from the credentials storage unit, using the credential information obtained from the credentials storage unit to assemble and transmit a reply message to the remote server, wherein the credential information remains inaccessible to the computer during the method.

Подробнее
19-03-2009 дата публикации

WIRELESSLY ACCESSING BROADBAND SERVICES USING INTELLIGENT COVERS

Номер: CA0002699448A1
Автор: JAIN, DEEPAK, JAIN DEEPAK
Принадлежит:

The present disclosure is directed to a system and method for wirelessly accessing broadband services using intelligent covers. In some implementations, a cover for a consumer device includes side surfaces, a rear surface, a physical interface, a circuit, and a broadband service card. The side surfaces and a rear surface form an opening that receives at least a portion of a consumer device. A first portion of at least one of the surfaces includes a connector for connecting to a port of the consumer device. The circuit connects the physical interface to the connector. The broadband service card connected to the physical interface and accesses a service foreign through the wireless broadband network independent of the consumer device.

Подробнее
15-07-2004 дата публикации

METHOD FOR ENSURING PRIVACY IN ELECTRONIC TRANSACTIONS WITH SESSION KEY BLOCKS

Номер: CA0002511061A1
Принадлежит:

A system, method, business method, and computer program product for conducting electronic transactions with a potentially untrusted server while maintaining user anonymity and transaction privacy, yet allowing the server to verify the user is a valid subscriber entitled to participate in the transaction. Anonymous service requests are sent to the server. The server transmits responses that have been encrypted such that only valid subscribers can decrypt them. Broadcast encryption schemes that enable selective revocation of misbehaving subscribers will tip off requestors that the server is trying to identify them. Transaction and content quantity can be monitored for usage- based billing while maintaining anonymity. Each content item may be uniquely encrypted with a content key that is then encrypted by a session key and included in encrypted form with a response, to reduce the computational workload.

Подробнее
26-09-2002 дата публикации

SYSTEM AND METHOD FOR MAINTAINING USER SECURITY FEATURES

Номер: CA0002370597A1
Автор: DUTTA, RABINDRANATH
Принадлежит:

A security server is provided to maintain security profiles for many customers. Customers are authenticated to the security server using a secret identifier, such as a password, or a digital signature. The customer can add, delete, and modify security images included with the customer's profile. In addition, the customer grants merchants or other requestors the right to retrieve one or more of the customer's security features. The authorized requestors are included in an authorization list. The customer restricts when the requestors can request the selected security features. When a requestor requests security features corresponding to a user, the requestor's identity is verified, such as using a digital certificate or an identifier. A check is also made to determine whether the customer has granted the requestor access to the requested security features. The features are either returned to the requestor or an error is returned depending on the requestor's authorization.

Подробнее
31-01-2020 дата публикации

BIOMETRIC ONE TOUCH SYSTEM

Номер: CA0003050697A1
Принадлежит: DLA PIPER (CANADA) LLP

Embodiments disclosed herein generally related to a system and method of authenticating a user with a third party server. In one embodiment, a method is disclosed herein. A computing system receives, from a remote client device of the user, a token. The token includes personal identification information and a digitized file of a biometric captured by a biometric scanner. The computing system identifies via the personal identification information that the user has a user account. The computing system queries a database with the personal identification information and the digitized file to determine whether the biometric matches a stored biometric in the user account. Upon determining that the biometric matches the stored biometric, the computing system generates a message to be transmitted to the third party server that authenticates the user. The computing system transmits the message to the third party server.

Подробнее
15-12-2011 дата публикации

METHOD AND SYSTEM FOR SECURE ORDER MANAGEMENT SYSTEM DATA ENCRYPTION, DECRYPTION, AND SEGMENTATION

Номер: CA0003012004A1
Автор: RATICA ADAM, RATICA, ADAM
Принадлежит: MARKS & CLERK

Подробнее
28-06-2018 дата публикации

IDENTITY AUTHENTICATION

Номер: CA0003048128A1
Принадлежит: SMART & BIGGAR

The present invention relates to a method of authenticating the identity of one or more users (101, 102) who are communicating with each other. The users (101, 102) share one or more secrets with each other, and use those secrets to verify their identities at a remote authentication system (103). A server (104) of the system (103) receives a secret from a first user (102) and hashes it with a salt (206), sending a reference code (207) back to the first user (102) in response. The server (104) then receives the secret from a second user (101), along with the reference code (207) and hashes the secret with the same salt (206) used to hash the first secret. The outputs (208, 209) of the hashes are then compared to determine whether the secrets matched, authenticating the identities of each user.

Подробнее
26-10-2021 дата публикации

METHOD AND SYSTEM FOR ELECTRONIC DISTRIBUTION OF CONTROLLED TOKENS

Номер: CA3017127C

A method for distributing controlled tokens to a secondary mobile device includes: storing account profiles, each including an account identifier, set of token credentials, and an associated mobile device identifier; receiving a token distribution request from, a first mobile device including a first mobile device identifier, recipient mobile device identifier, specific account identifier, and account controls; identifying a specific account profile including the specific account identifier and first mobile device identifier; generating a single use identification value and reservation identifier; transmitting the single use identification value to the first mobile device; transmitting the reservation identifier to a second mobile device associated with the recipient mobile device identifier; receiving the reservation identifier and the single use identification value from the second mobile device; verifying the reservation identifier and single use identification value received from the ...

Подробнее
28-12-2017 дата публикации

NEURAL NETWORK SYSTEMS AND METHODS FOR GENERATING DISTRIBUTED REPRESENTATIONS OF ELECTRONIC TRANSACTION INFORMATION

Номер: CA0003028728A1
Принадлежит:

Computer-implemented methods and systems are provided for generating a distributed representation of electronic transaction data. Consistent with disclosed embodiments, generation may include receiving electronic transaction data including first and second entity identifiers. Generation may also include generating an output distributed representation by iteratively updating a distributed representation using the electronic transaction data. The distributed representation may include rows corresponding to first entity identifiers and rows corresponding to second entity identifiers. An iterative update may include generating a training sample and an embedding vector using the components and the distributed representation; determining, by a neural network, a predicted category from the embedding vector; and updating the distributed representation using the predicted category and the training sample. The embodiments may also include outputting the output distributed representation to determine ...

Подробнее
28-05-2020 дата публикации

IDENTITY GRAY LIST

Номер: CA0003062493A1
Принадлежит: DLA PIPER (CANADA) LLP

Account functionality may be modified in response to an event. A processor may determine that a status of at least one of a user, a device associated with the user, and data associated with the user is potentially insecure due to the event. The processor may identify an account of the user. The account may provide access to electronic financial transaction functionality. In response to the determining that the status of at least one of the user, the device associated with the user, and the data associated with the user is potentially insecure, the processor may modify a condition affecting the access to the electronic financial transaction functionality.

Подробнее
25-10-2011 дата публикации

ONLINE COMMERCIAL TRANSACTION SYSTEM AND METHOD OF OPERATION THEREOF

Номер: CA0002579948C
Автор: OREN, YOSI
Принадлежит: WATERLEAF LIMITED

A system (1) for conducting commercial transactions comprises an application server (2) that hosts a software application that can be accessed by users to conduct commercial transactions thereon, an application user database (7) of authorised users capable of accessing the application server (2), each authorised user in the application user database (7) being uniquely identifiable by means of corresponding login name and password, and a proxy server (10) communicable with the application server (2) and accessible by a plurality of registered users from respective mobile phones (9). The proxy server provides each one of the plurality of registered users with access to the application server (2) from that user's respective mobile phone (9). A proxy database (11) is associated with the proxy server (10), the proxy server (10) containing details of authorised user database (7) who are also registered to access the application (2) server through the proxy server from their respective mobile ...

Подробнее
18-06-2013 дата публикации

MOBILE ACCOUNT AUTHENTICATION SERVICE

Номер: CA0002482558C
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

... ²²²A payment authentication service authenticates the identity of a payer during ²online transactions. The authentication service allows a card issuer to verify ²a cardholder's (110) identity using a variety of authentication methods, such ²as with the use of tokens. Authenticating the identity of a cardholder (110) ²during an online transaction involves querying an access control server to ²determine if a cardholder (110) is enrolled in the payment authentication ²service, requesting a password from the cardholder, verifying the password, ²and notifying a merchant whether the cardholder's (110) authenticity has been ²verified. Systems for imp lementing the authentication service in which a ²cardholder (110) uses a mobile device capable of transmitting messages via the ²Internet are described. Systems for implementing the authentication service in ²which a cardholder (110) uses a mobile device capable of transmitting messages ²through voice and messaging channels is also described.² ...

Подробнее
18-09-2014 дата публикации

SYSTEMS AND METHODS FOR ASSESSING SECURITY RISK

Номер: CA0002906944A1
Принадлежит: SMART & BIGGAR

Systems and methods for assessing security risk associated with an electronic transaction are provided. In some embodiments, a system comprises at least one processor programmed to: determine a network identifier associated with the electronic transaction; determine a connection type associated with the network identifier; and determine a level of risk associated with the electronic transaction based on the connection type associated with the network identifier.

Подробнее
22-09-2016 дата публикации

SMARTCARD PAYMENT SYSTEM AND METHOD

Номер: CA0002978327A1
Принадлежит:

The present disclosure relates generally to the field of providing a computer-implemented system and method that provides a secure universal electronic transaction card-based payment system. The system provides consumers the ability to conveniently, securely and safely use a single physical universal electronic transaction card, in a standard ISO-7810 credit card form factor that will be accepted at any standard POS device. A multiplicity of transaction account numbers, applets and or tokens are stored in a secure element from which the consumer can transact from any of their credit, debit, pre-paid, club access cards, gift cards, rewards and loyalty cards accounts, using either, Mag Stripe, EMV, or NFC at existing POS terminals, in such a way that only the legitimate owner of the electronic transaction card can activate, provision and unlock the electronic transaction card for use via biometric identification. After the use of the electronic transaction card all information is locked, ...

Подробнее
01-02-2007 дата публикации

METHOD AND SYSTEM FOR EXTENDING PAYMENT SYSTEM VIA TEXT MESSAGING

Номер: CA0002917442A1
Принадлежит:

A text message order processing system includes receiving text messages from consumers purchasing products from one or more merchants, parsing each text message to extract the identification of the product being purchased and the device from which the text message was sent, selecting based upon each received text message a payment Instrument to be used to pay for the purchase, establishing payment information related to the selected payment instrument and delivery information indicating where the purchased product is to be delivered, generating for each received message an order including the established payment information, delivery information and identification of the product being purchased, and submitting the generated order to an order management system of the merchant.

Подробнее
25-09-2014 дата публикации

INTENT TO SPEND ANALYTICS PLATFORM

Номер: CA0002942643A1
Принадлежит:

In various embodiments, a computer-implemented method for providing an intent to spend analytics platform is disclosed. The computer-implemented method comprises receiving, by a processor configured to execute a pre-commerce screening engine, one or more parameters of a payment instrument. The computer-implemented method further comprises generating, by the processor, one or more targeted offers based on the one or more parameters of the payment instrument.

Подробнее
17-05-2016 дата публикации

SELECTIVELY SWITCHING ANTENNAS OF TRANSACTION CARDS

Номер: CA0002698891C
Автор: JAIN, DEEPAK, JAIN DEEPAK
Принадлежит: DEVICEFIDELITY, INC., DEVICEFIDELITY INC

The present disclosure is directed to a system and method for selectively switching antennas of transaction cards. In some implementations, a method includes physically interfacing a card with a mobile host device including a Graphical User Interface (GUI). The card executes wireless financial transactions independent of the mobile host device. User credentials used to execute financial transactions with retail terminals are stored. Information is presented through the GUI of the mobile host device. An antenna of the card is selectively switched between an activate state and an inactive state in response to at least an event.

Подробнее
26-08-2010 дата публикации

SYSTEM AND METHODS FOR ONLINE AUTHENTICATION

Номер: CA0002753039A1
Принадлежит:

A method of authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a token manager via a first communications channel. The network client is configured to communicate with a token manager which is configured to communicate with a hardware token interfaced therewith. The network client is also configured to communicate with the relying party computer and the computer server. The computer server also receives a transaction pointer from the relying party computer via a second communications channel that is distinct from the first communications channel. Preferably, the transaction pointer is unpredictable by the computer server. The computer server transmits an authorization signal to the relying party computer in accordance with a correlation between the transaction code and the transaction pointer. The authorization signal facilitates authentication of the network client to the relying party computer ...

Подробнее
05-09-2017 дата публикации

SYSTEM AND METHODS FOR ONLINE AUTHENTICATION

Номер: CA0002753039C

A method of authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a token manager via a first communications channel. The network client is configured to communicate with a token manager which is configured to communicate with a hardware token interfaced therewith. The network client is also configured to communicate with the relying party computer and the computer server. The computer server also receives a transaction pointer from the relying party computer via a second communications channel that is distinct from the first communications channel. Preferably, the transaction pointer is unpredictable by the computer server. The computer server transmits an authorization signal to the relying party computer in accordance with a correlation between the transaction code and the transaction pointer. The authorization signal facilitates authentication of the network client to the relying party computer ...

Подробнее
26-01-2012 дата публикации

System and method for exchanging information among exchange applications

Номер: US20120023193A1
Принадлежит: FireStar Software Inc

A system and method for communicating transaction information includes a plurality of client application devices distributed among one or more local client application devices and one or more remote client application devices, and a plurality of gateways distributed among one or more local gateways and one or more remote gateways. The one or more local gateways are configured to communicate the transaction information with the one or more local client application devices, with which the one or more local gateways are associated, using one or more local data formats. The one or more remote gateways are configured to communicate the transaction information with the one or more remote client application devices, with which the one or more remote gateways are associated, using one or more remote data formats. The one or more local gateways are configured to transform the transaction information in the one or more local data formats into one or more common data formats that are shared with the one or more remote gateways. The one or more remote gateways are configured to transform the transaction information in the one or more common data formats into the one or more remote data formats. The transaction information from the one or more local client application devices is communicated to the one or more remote client application devices for completing a transaction.

Подробнее
24-05-2012 дата публикации

Servicing attributes on a mobile device

Номер: US20120129514A1

Enabling remote customer service and maintenance using a visual identifier is disclosed. In response to a user enrolling in a service capability associated with a mobile device, the process utilizes a visual identifier to associate the service capability with the customer account, the service and the mobile device. The system allocates a visual identifier for each service capability and enables customer service agents to identify the service capability and mobile device, verify the user and retrieve information for the service interaction.

Подробнее
24-05-2012 дата публикации

Transaction verification on rfid enabled payment and transaction instruments

Номер: US20120130905A1
Автор: Ersin Uzun, Gene Tsudik
Принадлежит: UNIVERSITY OF CALIFORNIA

A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted in case of a mismatch. DERT extracts and displays user-verifiable data. It then enters a countdown stage that lasts for a predetermined duration. A user observes the transaction information and, if the transaction amount and other details are deemed correct, presses an accept button provided on the DERT before the timer runs out. DERT signs the time-stamped transaction statement and sends it to the reader. This signed statement is then sent to the payment gateway and eventually to the financial institution that issued the payment DERT.

Подробнее
28-06-2012 дата публикации

Method and system for subscription digital rights management

Номер: US20120167229A1
Автор: Guillermo Lao
Принадлежит: Contentguard Holdings Inc

A system and method for managing use of items having usage rights associated therewith. The system includes an activation device adapted to issue a software package having a public and private key pair, the public key being associated with a user, a license device adapted to issue a license, a usage device adapted to receive the software package, receive the license and allow the user to access the item in accordance with the license, and a subscription managing device adapted to maintain a subscription list including the public key associated with the user. License's is issued by the license device upon verifying presence of the public key in the subscription list corresponding to requested content.

Подробнее
09-08-2012 дата публикации

Rich media file format and delivery methods

Номер: US20120203869A1
Принадлежит: MARGER JOHNSON AND MCCOLLOM PC

A rich media file is a self-contained file, including both the information to be viewed by a user and the viewer that displays the information to the user. The information can be formatted however the client likes: for example, the information can be split across several pages, and can include text and still and animated images. There can also be web links to pages on a network, and e-mail forms to simplify sending an e-mail message to the client. The rich media file can include viewing limitations, so that only the proper password can unlock the file, or that the rich media file will automatically expire after a specified condition occurs. The rich media file also assists the user in obtaining the latest version of the rich media file, by offering to retrieve a newer version for the user.

Подробнее
16-08-2012 дата публикации

Circuit device and a communication apparatus

Номер: US20120210394A1
Принадлежит: Sony Corp

An application program relating to a process of an integrated circuit is stored in a virtual integrated circuit storage area server apparatus. Following a mutual authentication between the IC and the virtual storage area server apparatus through a portable communication function unit, the server apparatus executes the application program. Additionally, through the IC, the portable communication function unit, a wireless communication line, and a network, communicate with an IC_R/W apparatus and perform a process relating to a service in collaboration with each other.

Подробнее
13-09-2012 дата публикации

Wirelessly accessing broadband services using intelligent covers

Номер: US20120231766A1
Автор: Deepak Jain, Tuan Quoc Dao
Принадлежит: Device Fidelity Inc

The present disclosure is directed to a system and method for wirelessly accessing broadband services using intelligent covers. In some implementations, a cover for a consumer device includes side surfaces, a rear surface, a physical interface, a circuit, and a broadband service card. The side surfaces and a rear surface form an opening that receives at least a portion of a consumer device. A first portion of at least one of the surfaces includes a connector for connecting to a port of the consumer device. The circuit connects the physical interface to the connector. The broadband service card connected to the physical interface and accesses a service foreign through the wireless broadband network independent of the consumer device.

Подробнее
03-01-2013 дата публикации

Methods and systems for providing a secure electronic mailbox

Номер: US20130006731A1
Принадлежит: US Postal Service (USPS)

A secure electronic mailbox is provided to a customer having an electronic account. The electronic account links the secure electronic mailbox to a physical address of the customer. The customer can send and receive secure and non-secure messages via the secure electronic mailbox. The customer can also access electronic services such as electronic bill presentment and payment using the secure electronic mailbox.

Подробнее
03-01-2013 дата публикации

Near-field communication based payment methods

Номер: US20130006872A1
Принадлежит: Individual

A method of performing a payment transaction is provided. Transaction information is received from a payee, which has been provided to the payee by a payor using near-field communications and includes a payment amount and payee account information. A transaction authentication request is sent to the payor, and, after a transaction authentication is received from the payor, the payment amount is sent to the payee. After the payment has been completed, a payment confirmation is sent to the payor. A method for processing a payment transaction using a generated remittance key is also provided. The remittance key, which includes an encrypted alphanumeric key having a payment amount and payment provider account information for a payor, is generated and transmitted to a payee who, in turn, transmits the remittance key to a remittance agent. The remittance agent transmits the remittance key and a payment request to a payment provider who processes the request and transmits a payment to the payee.

Подробнее
31-01-2013 дата публикации

Url-based certificate in a pki

Номер: US20130031361A1
Принадлежит: Certicom Corp

A method of requesting and issuing a certificate from certification authority for use by an initiating correspondent with a registration authority is provided. The initiating correspondent makes a request for a certificate to the registration authority, and the registration authority sends the request to a certificate authority, which issues the certificate to the registration authority. The certificate is stored at a location in a directory and this location is associated with a pointer such as uniform resource locator (URL) that is derived from information contained in the certificate request. The initiating correspondent computes the location using the same information and forwards it to other corespondents. The other correspondents can then locate the certificate to authenticate the public key of the initiating correspondent.

Подробнее
23-01-2014 дата публикации

Wirelessly accessing broadband services using intelligent covers

Номер: US20140024342A1
Автор: Deepak Jain, Tuan Quoc Dao
Принадлежит: Device Fidelity Inc

The present disclosure is directed to a system and method for wirelessly accessing broadband services using intelligent covers. In some implementations, a cover for a consumer device includes side surfaces, a rear surface, a physical interface, a circuit, and a broadband service card. The side surfaces and a rear surface form an opening that receives at least a portion of a consumer device. A first portion of at least one of the surfaces includes a connector for connecting to a port of the consumer device. The circuit connects the physical interface to the connector. The broadband service card connected to the physical interface and accesses a service foreign through the wireless broadband network independent of the consumer device.

Подробнее
27-02-2014 дата публикации

Privacy broker

Номер: US20140059658A1
Автор: Martin Stecher
Принадлежит: McAfee LLC

A brokered authentication request is received corresponding to an interaction between a particular user and a particular online entity. An identity provider corresponding to the particular user is identified that stores user data identifying the particular user. Confirmation is received that the identity provider has authenticated the particular user to a user profile maintained by the identity provider and a unique persistent user identifier is generated for the particular user that is unique within a system to a pairing of the first user with the first entity. The user identifier is caused to be communicated to the first entity for authenticating the first user in interactions with the first entity.

Подробнее
06-03-2014 дата публикации

Method and apparatus for proactive notifications based on the location of a user

Номер: US20140067649A1
Принадлежит: 24/7 Customer Inc

The location of a user is obtained and, based on the location of the user and services available to, or requested by the user, a notification handler sends appropriate notifications to the user.

Подробнее
06-01-2022 дата публикации

Authentication to Authorization Bridge Using Enriched Messages

Номер: US20220005030A1
Принадлежит: CardinalCommerce Corp

A system of electronic communication is disclosed. The system may: create a Pre-Authentication Transaction Number (Pre-ATN) by combining a number with a Special Encode Value (SEV), wherein the SEV is a single digit integer value; encrypt the Pre-ATN using a Format Preserving Encryption (FPE) to generate an encrypted Authentication Transaction Number (ATN); and send the encrypted ATN to an access control server (ACS) to use the encrypted ATN to generate a cardholder Authentication Verification Value (CAVV) or an Accountholder Authentication Value (AAV).

Подробнее
04-01-2018 дата публикации

SYSTEMS AND METHODS FOR DETECTING AND MONITORING SUSPICIOUS SYSTEM ACTIVITY

Номер: US20180005315A1
Автор: Rines Jennifer Rae
Принадлежит:

Systems and methods are provided for receiving a plurality of categories of data, each category comprising at least one subcategory, receiving a weight associated with each subcategory, and storing the plurality of categories, associated subcategories and the weight associated with each subcategory. The systems and methods further provide for determining that an activity occurring in a system has triggered a risk analysis, compiling data related to a user associated with the activity, analyzing the data related to the user and determining one or more subcategories for the data, determining a risk rating for the user based on the weight of each of the one or more subcategories, comparing the risk rating to one or more predetermined threshold values to determine an alert value for the user, and storing the risk rating for the user, the alert value for the user, and the data related to the user. 1. A method comprising:receiving, by a server computer, a plurality of categories of data, wherein each category of the plurality of categories of data comprises at least one subcategory;receiving, by the server computer, a weight associated with each subcategory of each category of the plurality of categories of data;storing, by the server computer, the plurality of categories of data and associated subcategories and the weight associated with each subcategory of each category of the plurality of categories of data;determining, by the server computer, that an activity occurring in a system has triggered a risk analysis;determining, by the server computer, a user associated with the activity;compiling, by the server computer, data related to the user associated with the activity;analyzing, by the server computer, the data related to the user and determining one or more subcategories for the data;analyzing, by the server computer, the one or more subcategories for the data and determining a risk rating for the user based on the weight of each of the one or more subcategories; ...

Подробнее
03-01-2019 дата публикации

GENERATING CODE FOR A MULTIMEDIA ITEM

Номер: US20190007389A1
Автор: Bailey, JR. Samuel A.

A system, method, and computer-readable medium for challenge-response authentication are provided. A plurality of codes is received over a communication network based on input provided by way of a user interface displaying a plurality of images. An alphanumeric string is generated based on the received plurality of codes and based on a table that associates each one of the plurality of codes with a respective one of the plurality of images and with a respective one of a plurality of alphanumeric characters. A determination is made as to whether to grant authorization based on whether the generated alphanumeric string matches an alphanumeric user identifier stored in a memory device in association with a user. 1. A method comprising:receiving, by a processor, an input comprising rearranged locations of a plurality of multimedia items in a rearranged order;ordering, by the processor, a plurality of codes in a sequence based on the rearranged order of the plurality of multimedia items; anddetermining, by the processor, an authentication based on the sequence of the plurality of codes.2. The method of claim 1 , wherein a first arrangement of the plurality of multimedia items includes at least one of a multidimensional grid of the plurality of multimedia items claim 1 , a horizontal arrangement of the plurality of multimedia items claim 1 , or a spatial overlay of the plurality of multimedia items.3. The method of claim 1 , further comprising generating a second arrangement of the plurality of multimedia items based on an input received through a user interface claim 1 , wherein the ordering includes sequencing the plurality of codes based on the second arrangement of the plurality of multimedia items.4. The method of claim 3 , wherein:the second arrangement includes at least two multimedia items of the plurality of multimedia items arranged in an order, andthe plurality of codes are ordered in the sequence in which the corresponding multimedia item is arranged in the ...

Подробнее
03-01-2019 дата публикации

System and method for implementing hacker traffic barriers

Номер: US20190007398A1
Принадлежит: PayPal Inc

Aspects of the present disclosure involve a system and method for implementing hacker traffic barriers. The current disclosure presents a system and method that provides securely associates a primary trusted device with a user, authorizes web browser authentication, and provides both intrinsic and explicit checks for authorizing access to an account.

Подробнее
10-01-2019 дата публикации

Systems and Methods that Utilize Blockchain Digital Certificates for Data Transactions

Номер: US20190012665A1
Принадлежит: Kountable Inc

Systems and methods that use blockchain digital certificates are described herein. One embodiment includes generating a digital certificate including transaction data for a transaction, creating a blockchain blob of the transaction data, generating an electronic ownership token for the digital certificate, and transferring the electronic ownership token to an owner of the digital certificate.

Подробнее
10-01-2019 дата публикации

NEURAL NETWORK SYSTEMS AND METHODS FOR GENERATING DISTRIBUTED REPRESENTATIONS OF ELECTRONIC TRANSACTION INFORMATION

Номер: US20190012671A1
Принадлежит: Capital One Services, LLC

Computer-implemented methods and systems are provided for generating a distributed representation of electronic transaction data. Consistent with disclosed embodiments, generation may include receiving electronic transaction data including first and second entity identifiers. Generation may also include generating an output distributed representation by iteratively updating a distributed representation using the electronic transaction data. The distributed representation may include rows corresponding to first entity identifiers and rows corresponding to second entity identifiers. An iterative update may include generating a training sample and an embedding vector using the components and the distributed representation; determining, by a neural network, a predicted category from the embedding vector, and updating the distributed representation using the predicted category and the training sample. The embodiments may also include outputting the output distributed representation to determine authorization of electronic transactions. Disclosed embodiments may also receive an electronic transaction and determine whether to authorize the electronic transaction based on a distributed representation of electronic transaction data. 123.-. (canceled)24. An authorization system comprising:at least one processor; and receiving electronic transaction data and historical transaction data, the electronic transaction data including an entity identifier component and an amount component of an electronic transaction;', 'determine a location of the electronic transaction in a distributed representation space comprising first rows corresponding to entities and second rows corresponding to amount ranges based on the electronic transaction data;', 'determine a first distance from the location of the electronic transaction to a first point in the distributed representation dependent on the historical transaction data; and', 'authorizing the electronic transaction based on the distance ...

Подробнее
09-01-2020 дата публикации

Terminal device and method of operating same

Номер: US20200013040A1
Автор: Ki Chon KANG
Принадлежит: SK Planet Co Ltd

Disclosed are a terminal device and a method of operating the same capable of, when a user enters a safe area (for example, the user's home or car), automatically executing a login to a site pre-configured in the entered area, thereby improving the use of an app service in the terminal device.

Подробнее
09-01-2020 дата публикации

IDENTITY AUTHENTICATION

Номер: US20200014543A1
Принадлежит:

The present invention relates to a method of authenticating the identity of one or more users () who are communicating with each other. The users () share one or more secrets with each other, and use those secrets to verify their identities at a remote authentication system (). A server () of the system () receives a secret from a first user () and hashes it with a salt (), sending a reference code () back to the first user () in response. The server () then receives the secret from a second user (), along with the reference code () and hashes the secret with the same salt () used to hash the first secret. The outputs () of the hashes are then compared to determine whether the secrets matched, authenticating the identities of each user. 2. A method of authentication as claimed in claim 1 , further comprising claim 1 , before the first hashing step: sharing a plurality of items of information between the first user and the second user claim 1 , wherein the first item of information is one of the plurality of shared items of information.3. A method of authentication as claimed in claim 2 , wherein the first item of information is a part of one of the plurality of the shared items of information.4. A method of authentication as claimed in claim 2 , further comprising claim 2 , before the first hashing step: selecting claim 2 , by one or both of the first and second users claim 2 , the first item of the plurality of items to be provided by the first and second users.5. A method of authentication as claimed in claim 1 , wherein the reference code is a shortened form of the first hashed output.6. A method of authentication as claimed in in claim 1 , wherein the first item is sent to the hashing module via an application or a website.7. A method of authentication as claimed in claim 1 , wherein the server is remote from the first and second users.8. A method of authentication as claimed in claim 1 , wherein one or more of the hashing module claim 1 , the hashing comparison ...

Подробнее
09-01-2020 дата публикации

User device enabling access to payment information in response to user input

Номер: US20200014670A1
Принадлежит: Monticello Enterprises LLC

Disclosed herein are systems, methods, and computer-readable storage devices for securely storing, at an electronic device, payment information associated with a payment account, detecting, at the electronic device, a payment operation associated with an application program. In response to the detected payment operation, the method includes determining that an input corresponding to an authorization of a payment transaction has not been locally received at the electronic device within a time period, presenting, in response to the determination, a stimulus indicating that the input corresponding to an authorization of a payment transaction has not been locally received, detecting subsequent to the stimulus presentation an authorization input, the authorization input corresponding to an authorization of a payment transaction, enabling, in response to detecting the authorization input, the payment information to be retrieved and releasing the payment information to the application program.

Подробнее
15-01-2015 дата публикации

Methods and systems for electronic device status exchange

Номер: US20150017945A1
Автор: Michael ECKLER
Принадлежит: Rogers Communications Inc

Methods, devices and servers for exchanging information about the status of mobile communications are described. In one aspect, a method is implemented on a device status exchange server, which includes: storing a plurality of profiles associated with a plurality of mobile communication devices that are serviced by a wireless service provider having a wireless service provider server which tracks information about the mobile communication devices, the plurality of profiles storing at least some of the information tracked by the wireless service provider server; receiving, from third party servers, subscription requests for notification of an update in information associated with one of the mobile communication devices; registering the received subscription requests; detecting an update to the information stored in one of the profiles based on information received from a server; and in response to detecting the update: updating the profile associated with the mobile communication device associated with the updated information; and notifying the third party servers of the update in accordance with registered subscription requests.

Подробнее
19-01-2017 дата публикации

METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED PROCESSOR MODE SWITCHES

Номер: US20170017809A1
Автор: Conti Gregory R.
Принадлежит:

A system comprising a processor adapted to activate multiple security levels for the system and a monitoring device coupled to the processor and employing security rules pertaining to the multiple security levels. The monitoring device restricts usage of the system if the processor activates the security levels in a sequence contrary to the security rules. 2040-. (canceled)41. A computing system operable in multiple security modes , comprising:a register bit that indicates whether said computing system is in one of a secure or a non-secure mode depending upon a state of said bit;a memory management unit capable of being switched between an enabled state and a disabled state;a monitoring device coupled to said register bit and to said memory management unit, said monitoring device operable to report a security violation within said system if said state of said register bit changes from a state indicating a non-secure mode to a state indicating a secure mode when said memory management unit is in said disabled state.42. The computing system of claim 41 , wherein said system further comprises a power reset control manager coupled to said monitoring device claim 41 , wherein said security violation is reported by said monitoring device to said power reset control manager.43. The computing system of claim 41 , wherein said system has an ARM® Trustzone® architecture.44. The computing system of claim 41 , wherein all of said components are on a single semiconductor die.45. A computing system operable in multiple security modes claim 41 , comprising:a secure configuration register comprising an NS bit, said computing system in one of a secure or non-secure mode depending upon a state of said NS bit;a memory management unit comprising an output that indicates whether said memory management unit is in an enabled state or a disabled state;a monitoring device coupled to said secure configuration register and to said memory management unit to receive the state of said NS bit and ...

Подробнее
17-01-2019 дата публикации

SYNTHETIC GENOMIC VARIANT-BASED SECURE TRANSACTION DEVICES, SYSTEMS AND METHODS

Номер: US20190020651A1
Принадлежит:

Various devices, systems, structures and methods are disclosed related to securely authorizing a transaction by synchronizing digital genomic data with associated synthetic genomic variants. An embodiment of the present invention utilizes digital genomic data associated with an entity, such as a person, who may utilize a genome-based security device to complete a transaction. In one embodiment, a person may use a genome-based security device to communicate with an external device over a wireless or other communication interface, synchronize digital genomic data and an associated synthetic variant received from the external device with digital genomic data and associated synthetic variant stored on the genome-based security device. 1. A genome-based security device comprising:a memory storing digital genomic data associated with at least one entity, wherein the digital genomic data comprises at least one synthetic variant and actual genomic data unique to the at least one entity wherein the synthetic variant is different from the actual genomic data and at least a portion of the synthetic variant includes one or more base pairs that do not match a corresponding portion of the actual genomic data; synchronizes the digital genomic data comprising the at least one synthetic variant and the actual genomic data with external digital genomic data comprising at least one external synthetic variant and external actual genomic data unique to the at least one entity and received from an external device wherein at least a portion of the external synthetic variant includes one or more base pairs that do not match a corresponding portion of the external actual genomic data; and', 'authorizes a transaction upon synchronization of the at least one synthetic variant with respect to the external synthetic variant; and, 'a processing unit configurable to execute instructions which upon executiona communication interface coupled with the processing unit configured to communicatively ...

Подробнее
24-01-2019 дата публикации

METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED PROCESSOR MODE SWITCHES

Номер: US20190026500A1
Автор: Conti Gregory R.
Принадлежит:

Disclosed embodiments relate to a system having a processor adapted to activate multiple security levels for the system and a monitoring device coupled to the processor and employing security rules pertaining to the multiple security levels. The monitoring device restricts usage of the system if the processor activates the security levels in a sequence contrary to the security rules. 1. A computing system operable in a plurality of security modes , the computing system comprising:a register having one or more register bits to indicate whether the computing system is operating in one of a secure mode or a non-secure mode depending on a state of the one or more register bits;an instruction bus;a memory to store secure instructions and non-secure instructions, the memory being coupled to the instruction bus; anda monitoring device coupled to the register, wherein the monitoring device is configured to block execution of a non-secure instruction when the one or more register bits indicate that the computing system is operating in the secure mode.2. The computing system of claim 1 , wherein the computing system includes a security architecture to provide the plurality of security modes.3. The computing system of claim 2 , wherein the security architecture is ARM® TrustZone®.4. The computing system of claim 1 , wherein:the memory is partitioned into a secure domain and a non-secure domain;the secure instructions are stored in the secure domain; andthe non-secure instructions are stored in the non-secure domain.5. The computing system of claim 1 , comprising a memory management unit (MMU) coupled to the memory.6. The computing system of claim 1 , wherein the monitoring device comprises a hardware state machine7. The computing system of claim 1 , wherein the monitoring device is configured to block the execution of a non-secure instruction by preventing non-secure instructions from being fetched from the memory when the at least one register bit indicates that the computing ...

Подробнее
25-01-2018 дата публикации

Digital Safety and Account Discovery

Номер: US20180026996A1
Принадлежит: Allstate Insurance Co

Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscription and financial accounts. The discovered subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.

Подробнее
24-01-2019 дата публикации

Application sales management server system

Номер: US20190028457A1
Принадлежит: FANUC Corp

An application sales management server system capable of designating an application purchaser while making use of a conventional business practice related to B2B is provided. A sales management server system that manages sales of applications operated by an edge server communicably connected to one or more edge devices is communicably connected to a terminal via a communication unit. A control unit includes: a browsing information providing unit that provides application product information in response to a browse request from the terminal; and a mall processing unit that correlates a predetermined user with an application group including one or more pre-selected applications. The browsing information providing unit provides application product information of the application group in response to the browse request only when the user is correlated with the application group including the one or more pre-selected applications.

Подробнее
28-01-2021 дата публикации

THREAT MITIGATION SYSTEM AND METHOD

Номер: US20210029143A1
Принадлежит:

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event; rendering an inspection window that defines object information concerning a selected object within the threat mitigation user interface; and enabling a third-party to effectuate a specific targeted action that is based, at least in part, upon the object information defined within the inspection window. 1. A computer-implemented method , executed on a computing device , comprising:rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event;rendering an inspection window that defines object information concerning a selected object within the threat mitigation user interface; andenabling a third-party to effectuate a specific targeted action that is based, at least in part, upon the object information defined within the inspection window.2. The computer-implemented method of wherein the inspection window is a popup inspection window.3. The computer-implemented method of wherein the inspection window is a slide out inspection window.4. The computer-implemented method of wherein enabling a third-party to effectuate a specific targeted action that is based claim 1 , at least in part claim 1 , upon the object information defined within the inspection window includes:rendering an action list that defines one or more targeted actions that are based, at least in part, upon the object information defined within the inspection window.5. The computer-implemented method of wherein enabling a third-party to effectuate a specific targeted action that is based claim 4 , at least in part claim 4 , upon the object information defined within the inspection window includes:enabling the third-party to select the specific targeted ...

Подробнее
28-01-2021 дата публикации

Threat mitigation system and method

Номер: US20210029159A1
Принадлежит: Reliaquest Holdings LLC

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event; and enabling a third-party to gather artifacts concerning an object within the threat mitigation user interface.

Подробнее
29-01-2015 дата публикации

Method and system for subscription digital rights management

Номер: US20150033359A1
Автор: Guillermo Lao, Ta Thanh
Принадлежит: Contentguard Holdings Inc

A system and method for managing use of items having usage rights associated therewith. The system includes an activation device adapted to issue a software package having a public and private key pair, the public key being associated with a user, a license device adapted to issue a license, a usage device adapted to receive the software package, receive the license and allow the user to access the item in accordance with the license, and a subscription managing device adapted to maintain a subscription list including the public key associated with the user. License's is issued by the license device upon verifying presence of the public key in the subscription list corresponding to requested content.

Подробнее
04-02-2016 дата публикации

Visual image authentication

Номер: US20160034682A1
Автор: Michael Stephen Fiske
Принадлежит: Michael Stephen Fiske

Methods and systems described herein perform a secure transaction. A display presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a universal identifier is represented by images recognizable by a person, but difficult for malware to recognize. In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize. In an embodiment, a person presses ones finger(s) on the screen to select images as a method for authenticating and protecting communication from malware. In at least one embodiment, quantum randomness helps unpredictably vary the image location, generate noise in the image, or change the shape or texture of the image. In some embodiments, visual image authentication helps Alice and Bob detect if Eve has launched a man-in-the-middle attack on their key exchange.

Подробнее
02-02-2017 дата публикации

Mitigating blockchain attack

Номер: US20170034197A1
Принадлежит: British Telecommunications plc

A computer implemented method for detecting malicious events occurring with respect to a blockchain data structure comprising: defining a transaction creation profile according to which transactions can be generated and submitted to the blockchain; submitting a transaction to the blockchain, the transaction causing the generation of a profiler data structure in the blockchain including executable code to generate profile transactions to be submitted to the blockchain according to the transaction creation profile; monitoring the blockchain to identify profile transactions; and comparing identified profile transactions with the transaction creation profile to detect a deviation from the transaction creation profile, such detection corresponding to a malicious event occurring with respect to the blockchain.

Подробнее
01-02-2018 дата публикации

System, device, and method of generating and managing behavioral biometric cookies

Номер: US20180034850A1
Автор: Avi Turgeman
Принадлежит: BioCatch Ltd

Devices, systems, and methods of generating and managing behavioral biometric cookies. The system monitors user-interactions of a user, that are performed via an input unit of an end-user device; and extracts a set of user-specific characteristics, which are used as a behavioral profile or behavioral signature. The set of user-specific characteristics are further used as a behavioral biometric cookie data-item, allowing the system to distinguish between two human users that utilize the same electronic device; and allowing the system to distinguish between a human user and an automated script. The system further allows creation and utilization of behavioral sub-cookies that distinguish among multiple users of the same device. The system also allows creation of a cross-device behavioral cookie, to track browsing or usage history of a single user across multiple electronic devices.

Подробнее
31-01-2019 дата публикации

E-COMMERCE MESSAGING USING SMS

Номер: US20190034970A1
Принадлежит:

A method for generating an SMS business message for processing by a software application includes: a data collection interface accepting outgoing instructions and outgoing data from said software application; a message encoding engine encoding said outgoing instructions and outgoing data from said software application; using an encoding template to generate the SMS business message as a categorized SMS message formatted for processing by a data processing system; and a dispatcher runtime processor processing said SMS business message for transmission over a network to a recipient. 1. A method for generating a Short Message Service (SMS) business message for processing by a software application in a SMS commerce infrastructure system , the method comprising:a server receiving, from a computer in communication with the server, a new SMS business message to be sent to a mobile recipient, wherein the business message is prepared via a graphic user interface (GUI) of the computer, and wherein the new business message is automatically prepared from the data entered at the GUI based on pre-defined data parameters for a selected existing type of SMS business message format;retrieving, by a data collection interface (DCI) of the server, the data entered at the GUI of the computer to prepare the new SMS business message;generating, by the server, a SMS message instance (SMS MI) which is categorized based on the selected existing type of SMS business message format;transmitting, by the server, the SMS MI to a wireless gateway for delivery of the SMS MI to a mobile recipient; andreceiving from the mobile recipient an incoming SMS message in response to the SMS MI that includes an inbound template identification (ID) extracted from the incoming SMS message by a runtime processor of the server.2. The method of claim 1 , further comprising:autonomously validating, by the server, the data retrieved by the server DCI by comparing the data entered at the GUI which has been retrieved ...

Подробнее
17-02-2022 дата публикации

DETECTION AND MITIGATION OF CRYPTOJACKING

Номер: US20220053006A1
Автор: OHara Sean
Принадлежит: ARBOR NETWORKS, INC.

A method of monitoring network traffic for cryptojacking activity is provided. A request is received from a protected host. It is determined whether the request is a cryptocurrency request based on whether the request uses a protocol specified for requests belonging to the cryptocurrency communication. In response to a determination that that the request is a cryptocurrency request for the cryptocurrency, a second request is submitted to a destination indicated by the request, wherein the second request is formatted as a cryptocurrency request for the cryptocurrency. A determination is made whether a reply to the second request from the destination is a cryptocurrency response for the cryptocurrency based on whether the response uses a protocol specified for a response that belongs to communication associated with the cryptocurrency. An intervention action is caused in response to a determination that that the reply to the second request from the destination is a cryptocurrency response for the cryptocurrency. 1. A computer-implemented method of monitoring network traffic for cryptojacking activity , the method comprising:receiving a first request from a protected host of a protected network;determining whether the first request is a cryptocurrency request for a cryptocurrency of at least one cryptocurrency based on whether the request uses a protocol specified for requests that belong to communication associated with the cryptocurrency;in response to a determination that that the first request is a cryptocurrency request for the cryptocurrency, submitting a second request to a destination indicated by the first request, wherein the second request is formatted as a cryptocurrency request for the cryptocurrency;determining whether a reply to the second request from the destination is a cryptocurrency response for the cryptocurrency based on whether the response uses a protocol specified for responses that belong to communication associated with the cryptocurrency; ...

Подробнее
09-02-2017 дата публикации

METHOD AND SYSTEM FOR WEBSITE VERIFICATION

Номер: US20170039612A1
Принадлежит:

A computer-implemented method is proposed for website verification. The method comprises: storing registration records for legitimate websites in a verification register; receiving, from a website to be verified, a user-initiated verification request; responsive to the user-initiated verification request, checking that the website to be verified is in the verification register; generating and transmitting a dynamic code for display on the website if the website to be verified is in the verification register; and responsive to a user entering the dynamic code into a verification module, retrieving details of the website from the verification register and transmitting the details of the website to the user for checking against the website to be verified. 1. A computer-implemented method for website verification wherein a server is configured to carry out method steps comprising:(i) storing registration records for legitimate websites in a verification register;(ii) receiving, from a website to be verified, a user-initiated verification request;(iii) responsive to the user-initiated verification request, checking that the website to be verified is in the verification register;(iv) generating and transmitting a dynamic code for display on the website if the website to be verified is in the verification register; and(vi) responsive to a user entering the dynamic code into a verification module, retrieving details of the website from the verification register and transmitting the details of the website to the user for checking against the website to be verified.2. The method according to claim 1 , wherein the website is a merchant website and the user-initiated verification request is operable by the user prior to the user entering payment card details to perform an online transaction.3. The method according to claim 1 , wherein claim 1 , after registration claim 1 , the website is issued with a unique registration code.4. The method according to claim 1 , wherein the ...

Подробнее
08-02-2018 дата публикации

AUTHENTICATION TECHNIQUES INCLUDING SPEECH AND/OR LIP MOVEMENT ANALYSIS

Номер: US20180039990A1
Автор: Lindemann Rolf
Принадлежит:

A system, apparatus, method, and machine readable medium are described for performing eye tracking during authentication. For example, one embodiment of a method comprises: receiving a request to authenticate a user; presenting one or more screen layouts to the user; capturing a sequence of images which include the user's eyes as the one or more screen layouts are displayed; and (a) performing eye movement detection across the sequence of images to identify a correlation between motion of the user's eyes as the one or more screen layouts are presented and an expected motion of the user's eyes as the one or more screen layouts are presented and/or (b) measuring the eye's pupil size to identify a correlation between the effective light intensity of the screen and its effect on the user's eye pupil size; capturing audio of the user's voice; and performing voice recognition techniques to determine a correlation between the captured audio of the user's voice and one or more voice prints. 1. A method comprising:receiving a request to authenticate a user;presenting one or more screen layouts to the user;capturing a sequence of images which include the user's eyes as the one or more screen layouts are displayed; and (a) performing eye movement detection across the sequence of images to identify a correlation between motion of the user's eyes as the one or more screen layouts are presented and an expected motion of the user's eyes as the one or more screen layouts are presented and/or (b) measuring the eye's pupil size to identify a correlation between the effective light intensity of the screen and its effect on the user's eye pupil size;capturing audio of the user's voice; andperforming voice recognition techniques to determine a correlation between the captured audio of the user's voice and one or more voice prints.2. The method as in further comprising:performing facial recognition to identify a correlation between one or more images of the user's face and facial ...

Подробнее
08-02-2018 дата публикации

CENTRAL TRUSTED ELECTRONIC COMMERCE PLATFORM THAT LEVERAGES SOCIAL MEDIA SERVICES

Номер: US20180040030A1
Принадлежит:

Systems, methods, and computer-readable media for integrating e-commerce capabilities with social media services using a central trusted service are disclosed. A client application executable on a client device interacts with a central trusted e-commerce/social media service executing on one or more servers. The central trusted service receives social networking credentials associated with a user from the client application and identifies a particular user profile associated with the user based at least in part on the received social networking credentials. The central trusted service determines a trusted group of user profiles linked to the particular user profile and analyzes various types of data associated with the trusted group of user profiles to identify products to recommend to the particular user profile. In addition, the central trusted service provides a direct, centralized conduit to online retailers to allow the user to purchase a product via a trusted and secure mechanism. 1. A computer-implemented method for enabling electronic commerce using social media services , the method comprising:receiving, by a central trusted server from a client application executing on a client device, social networking credentials associated with a particular user profile;determining a group of one or more trusted user profiles associated with the particular user profile;determining a product or service to recommend to the particular user profile based at least in part on an analysis of online activity associated with the group of one or more trusted user profiles;generating a notification message indicative of the product or service; andtransmitting the notification message to the particular user profile via the client application.2. The computer-implemented method of claim 1 , wherein the notification message comprises a link to a web page hosted by an online merchant via which the product is purchasable.3. The computer-implemented method of claim 1 , further comprising ...

Подробнее
11-02-2016 дата публикации

Method for verifying security data, system, and a computer-readable storage device

Номер: US20160044033A1
Автор: Ke-Hsi Hsiang
Принадлежит: Idgate Corp

The disclosure herein is related to a method for verifying security data, a system, and a computer-readable storage device. The system includes an application server for providing service, and receiving a service request made by a terminal. The system also includes an authentication server for providing identification authentication for receiving a request made by the application server for verifying the terminal. The authentication server sends a signal to the terminal for initiating an authentication process, and processing authentication with the terminal. The authentication server delivers transaction data for the terminal to complete the service access when the connection between the server and terminal is verified. The terminal is permitted to access the service when the terminal passes the authentication and submits a request form according to the data to the application server.

Подробнее
07-02-2019 дата публикации

FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS

Номер: US20190044936A1
Автор: Sarkissian Shaunt M.
Принадлежит:

In various embodiments, a computer-implemented method for generating and verifying officially verifiable electronic representations may be disclosed. The method may comprise receiving, by a credential database, a request for a credential action. The credential database may be configured to store one or more credentials comprising a status indicator. The method may further comprise determining, by the credential database, a response to the credential action based on the one or more user credentials stored in the credential database and transmitting, by the credential database, the response to a client device. 1. A computer-implemented method comprising: ["a virtual representation of the credential that has been verified by an issuing agency to be an official representation of a credential of a user for proving the user's identity or qualifications, based on information associated with the credential of the user;", store the information associated with the credential of the user; and', 'transmit the generated OVER file to the OVER file client device;, 'the OVER file generated by an OVER engine configured to], 'accessing, by an officially verifiable electronic representation (OVER) file verifying device, an OVER file stored on an OVER file client device, the OVER file comprisingtransmitting, by the OVER file verifying device, to the OVER engine, a verifying request to verify that the OVER file accessed from the client device authenticates the user;receiving, by the OVER file verifying device, an authentication message comprising an indication of whether the scan associated with the OVER file on the device of the user corresponds to the information associated with the credential of the user that is stored in the OVER engine; andoutputting a status indicator expressing whether the OVER file authenticates the user.2. The computer-implemented method of claim 1 , wherein the OVER file is a first OVER file claim 1 , the OVER file storage client device of the user is a first ...

Подробнее
16-02-2017 дата публикации

Transmitter for Transmitting a Secure Access Signal

Номер: US20170046713A1
Принадлежит: MICROLATCH PTY LTD

A transmitter () for transmitting a secure access signal to a system () for providing secure access to a controlled item () is disclosed. The access is dependent on information contained in the secure access signal. The transmitter () comprises a biometric sensor () for receiving a biometric signal and a processor () for matching the biometric signal against members of a database () of biometric signatures. The transmitter () comprises enabling means (e.g., ) for enabling an inductive circuit, based on the matching of the biometric signal, to transmit the secure access signal conveying the information to the system () upon the inductive circuit being placed within range of a radio frequency field emitted by the system (). 152-. (canceled)53. A transmitter for transmitting a secure signal to a system for performing a secure transaction , the transmitter comprising:a biometric sensor for receiving a biometric signal to match against members of a database of biometric signatures;a plurality of proximity modules; anda controller for selecting one of said plurality of proximity modules when the received biometric signal matches a member of the database of biometric signatures, wherein the selected proximity module is enabled for a predetermined period while said other proximity modules remain disabled, and the enabled proximity module transmits the secure signal conveying information to the system upon said plurality of proximity modules being placed within range of a radio frequency field emitted by the system, the transaction being performed based on the information.54. The transmitter according to claim 53 , further comprising a memory containing the database of biometric signatures.55. The transmitter according to claim 53 , wherein the database of biometric signature is located in the system for performing the secure transaction.56. The transmitter according to claim 53 , wherein the transmitter is configured for populating the database of biometric signatures.57. ...

Подробнее
16-02-2017 дата публикации

SELECTABLE ENCRYPTION METHODS

Номер: US20170048277A1
Автор: Bailey, JR. Samuel A.

A secure mobile financial transaction is provided by receiving, over a communication network, a list of protection mechanisms available for implementation by an external terminal. Security-related data is received from one or more sensors and an attack signature is computed based on the security-related data. An appropriate security policy is selected from multiple security policies stored in a database based on the list of protection mechanisms and the attack signature. A secure communication session is established between the external terminal and an internal network component according to the selected security policy. A data message associated with a mobile financial transaction is communicated over the communication network during the communication session. 1. A computer-implemented method comprising:selecting, by a computer-based system and from a plurality of security policies stored in a database, a security policy that results in a risk level within a predetermined risk threshold,wherein the security policy comprises a first encryption method;determining, by the computer-based system, that the first encryption method has been exploited; andselecting, by the computer-based system, a second encryption method.2. The method of claim 1 , further comprising computing claim 1 , by the computer-based system and based on a predetermined valuation formula claim 1 , a value associated with a data message to be communicated claim 1 , wherein the value is used to determine the risk level.3. The method of claim 2 , wherein the computing the value associated with the data message includes computing the value based on a value of a financial transaction associated with the data message.4. The method of claim 1 , further comprising computing claim 1 , by the computer-based system and based on an attack signature and a first protection mechanism claim 1 , a probability that security of a data message will be compromised claim 1 , wherein the probability is used to determine ...

Подробнее
19-02-2015 дата публикации

Computerized authorization system and method

Номер: US20150052590A1
Автор: Gary Martin Shannon
Принадлежит: Arctran Holdings Ltd

A computerized authorization system configured to authorize electronically-made requests to an electronic entity. The computerized authorization system comprises a store configured to store an indication of at least one predetermined electronic authorization device configured to authorize each electronically-made request. The computerized authorization system is further configured such that: in response to receiving an electronically-made request to the electronic entity, an indication of the request is output to the at least one predetermined electronic authorization device configured to authorize the request as indicated in the store; and in response to receiving an indication of authorization from the at least one predetermined electronic authorization device, an indication of authorization of the request is output to the electronic entity.

Подробнее
08-05-2014 дата публикации

Executing transactions using mobile-device covers

Номер: US20140129356A1
Автор: Deepak Jain, Tuan Quoc Dao
Принадлежит: Device Fidelity Inc

The present disclosure is directed to a system and method for updating mobile devices with additional elements. In some implementations, a cover for a mobile device includes side surfaces, a rear surface, a physical interface, and a circuit. The side surfaces and the rear surface are configured to be adjacent at least a portion one or more side surfaces of the mobile phone. The side surfaces and the rear surface form an opening that receives at least a portion of the mobile device. A first portion of at least one of the surfaces includes a connector for connecting to a port of the mobile phone. The physical interface includes in at least one of the surfaces that receives a memory device external to the mobile device. The circuit connects the physical interface to the connector.

Подробнее
03-03-2022 дата публикации

CONFIRMING AUTHENTICITY OF A USER TO A THIRD-PARTY SYSTEM

Номер: US20220070169A1
Принадлежит:

A telecommunications network server system provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system. Responsive to receiving from the user device one of the unique electronic transaction codes, the telecommunications network server system provides, to the respective third-party system, authentication of the user.

Подробнее
03-03-2022 дата публикации

COLLECTION OF DIAGNOSTIC INFORMATION IN A DEVICE

Номер: US20220070181A1
Принадлежит:

A method is provided for collecting diagnostic information in a device having a rich execution environment (REE) and a secure element (SE). The method includes detecting initialization of the device. If it is determined that the initialization of the device was a result of a potential security related event, a communication component of the REE responsible for communicating with the secure element is activated if not already activated. The secure element sends a request to the communication component for diagnostic information related to the security event. The diagnostic information is received in the SE from the communication component and stored in an attack log for storing security events. An attack log is generated in the secure element including the potential security event and the related diagnostic information. The attack log and the related diagnostic information is communicated to a secure server via a secure channel.

Подробнее
22-02-2018 дата публикации

Method and System to Enable Mobile Contactless Ticketing/Payments Via a Mobile Phone Application

Номер: US20180053179A1
Принадлежит:

A method for mobile contactless ticketing/payment using an application available in a mobile phone; and a system, server, and mobile phone suitable for carrying out such a method. 126-. (canceled)27. A method to enable mobile contactless ticketing/payments via a mobile phone application , the method comprising the following steps:(a) a user pays to a service provider for ticketing/payment services;(b) associated to the payment and to a corresponding granted right to use related ticketing/payment services, a ticketing/payments server module prepares one or more ticketing/payment credentials for use by the user and sends one or more ticketing/payment credentials to the user's mobile phone;(c) the user's mobile phone receives the one or more credentials and stores them for use at a transportation contactless ticketing system, in case of ticketing credentials, or for use on mobile contactless payments, in case of payment credentials;said method being characterized in that each credential prepared is univocally associated to the registered user's mobile phone and partly enables the mobile phone for contactless ticketing access, in case of ticketing credentials, or for mobile contactless payments, in case of payment credentials; where mobile phone enablement for each contactless ticketing access or mobile contactless payment also requires the user inserting a personal identification number (PIN) at the mobile phone ticketing/payment application; and credentials are sent to the mobile phone application, up to the limit of the granted right to use contactless ticketing/payment services.28. A method according to claim 27 , where the PIN insertion by the user is used to calculate at least part of the ticketing/payment credential used in the context of a given mobile contactless ticketing access/payment.29. A method according to claim 27 , where at least part of the ticketing/payment credentials received and stored in the mobile phone comprises a key that is later used to ...

Подробнее
14-02-2019 дата публикации

System and method of identifying potentially dangerous devices during the interaction of a user with banking services

Номер: US20190053053A1
Принадлежит: Kaspersky Lab AO

Disclosed are systems and methods for identifying potentially dangerous devices during the interaction of a user with banking services. When there are interactions between a user's device(s) and banking services, the described technique acquires a digital fingerprint of the user device. That digital fingerprint indicates at least one characteristic of the user device. Clusters associated with the user device are created based on the at least one characteristic of the user device. Each cluster is associated with a corresponding threat degree. In response to determining that the user device is a threat risk based on the one or more generated clusters, transactions being carried out between the user device and the banking services may be blocked.

Подробнее
13-02-2020 дата публикации

BACKEND SERVICE INTEGRATION

Номер: US20200053071A1
Принадлежит:

A method for providing an integrated service includes assigning a digital credential to a user account; receiving a request to schedule an integrated service in relation to the scheduled presentation of the digital content item; identifying, based on the digital credential assigned to the user account, the scheduled presentation of the digital content item; determining, based on the scheduled presentation of the digital content item, a set of available integrated services; providing, to the computing device, data identifying the set of available integrated services; receiving, from the computing device, a user selection of a first integrated service from the set of available integrated services; generating, based on data associated with the scheduled presentation of the digital content item, a service request to provide the first integrated service; and transmitting, to a remote server that provides the first integrated service, the service request to provide the first integrated service. 1. A method comprising:receiving, by a digital content delivery system, a request from a client-side digital delivery device to rent a first digital movie; assigning a digital content license to a user account associated with the client-side digital delivery device, the digital content license permitting a user associated with the user account to stream the first digital movie from the client-side digital content delivery device associated with the user account; and', 'allocating digital credits to the user account associated with the client-side digital delivery device, the digital credits allocated to the user account being redeemable to attend a scheduled presentation of the first digital movie at an exhibitor location; and, 'in response to receiving the request assigning a digital credential to the user account, the digital credential being redeemable at a first exhibitor location to gain access to the first scheduled presentation of the first digital movie; and', 'deducting a ...

Подробнее
13-02-2020 дата публикации

CONNECTED DEVICE RIGHTS MANAGEMENT ADMINISTRATION

Номер: US20200053092A1
Принадлежит:

Various aspects and embodiments of dwelling automation administration are described. Among other aspects or features of the embodiments, a dwelling automation system in a computing device authenticates a user. A management interface in the dwelling automation system generates a user interface for administering a plurality of automation devices at different dwellings based on access and control rights of the user. The user interface can grant the user access to at least one automation device associated with a hub associated with at least one dwelling. 1. A method for automation rights management , comprising:receiving credential data from a client device for a user;identifying, by at least one computing device, a right to access at least one function of a plurality of automation devices installed at and associated with different rental units at a managed residential property based on an evaluation of the credential data against an access control rule associated with automation management;determining, by the at least one computing device, a group of the plurality of automation devices for which the user has the right to access the at least one function of the plurality of automation devices as a logical group; andadapting a user interface on the client device to collectively administer the at least one function for the group of the plurality of automation devices as the logical group.2. The method of claim 1 , further comprising identifying claim 1 , by at least one computing device claim 1 , a role associated with the user based on the credential data.3. The method of claim 2 , further comprising identifying the right to access the at least one function of the plurality of automation devices based on the evaluation of the credential data and the role against the access control rule.4. The method of claim 2 , further comprising:identifying the role associated with the user as at least one of a resident or an administrator based on the credential data; andadapting the ...

Подробнее
05-03-2015 дата публикации

Wireless technology bridging system

Номер: US20150063472A1
Принадлежит: Individual

A bridged wireless communication system includes a user device that is configured to perform wireless communications natively using a second wireless technology, and a wireless technology bridging system chassis such as, for example, a user device case, coupled to the user device. The wireless technology bridging system chassis houses a first technology wireless controller that is configured to perform wireless communications using a first wireless technology that is different from the second wireless technology, and a second technology wireless controller that is configured to perform wireless communications using the second wireless technology. A bridging engine receives first wireless communications of the first wireless technology through the first technology wireless controller, converts the first wireless communications from the first wireless technology to the second wireless technology, and sends the first wireless communications of the second wireless technology through the second wireless technology controller and to the user device.

Подробнее
21-02-2019 дата публикации

Method and/or System for Extending Payment System Architectures and/or Legacy Order Processing Systems to Mobile Commerce Applications Via Text Messaging

Номер: US20190057375A1
Принадлежит:

A text message order processing system includes: means for receiving text messages from consumers purchasing products from one or more merchants, each of the text messages being addressed to an address selected by the consumer and including an identification of the product being purchased and an identification of a device from which the text message was sent; means for parsing each text messages to extract the identification of the product and the identification of the device from the text massage; means for selecting based upon each received text message a payment instrument to be used to pay for the purchase; means for establishing payment information related to the selected payment instrument and delivery information indicating where the purchased product is to be delivered; means for generating for each received text message an order including the established payment information, delivery information and identification of the product being purchased; and, means for submitting the generated order to an order management system of the merchant. 1. A mobile communication device system comprising:a mobile communication processor programmed or configured to:send a first text message from the mobile communication device to a text message processing server, the first text message comprising an identification of information being sought by the party and instructions to manipulate the identified information, wherein the first text message is in short message service (SMS) format;receive a second text message from the text message processing server comprising at least one processor programmed or configured to: when two or more merchants share a common shortcode, identify a particular merchant by a keyword in a body of the first text message, parse the first text message to identify the information being sought by the party, generate a request for the identified information and manipulate the identified information in accordance with the instructions, the request being in a ...

Подробнее
21-02-2019 дата публикации

DECENTRALIZED CONTENT DISTRIBUTION

Номер: US20190058910A1
Автор: Solow Hillel
Принадлежит:

In one embodiment, a computing device includes: a media player operative to at least play a content item on the computing device, a blockchain-based wallet application operative to transfer a transaction amount to a publisher wallet ID via an associated blockchain-based transaction service, a secure digital rights management (DRM) client application operative to verify the transfer of the transaction amount to said publisher wallet ID according to a public transaction ledger associated with the associated blockchain-based transaction service and upon successful verification of the transfer of the transaction amount to the publisher wallet ID at least unlock a locked version of the content item, and a processor operative to execute the media player, the blockchain-based wallet application, and the DRM client application. 1. A computing device comprising:a media player operative to at least play a content item on said computing device;a blockchain-based wallet application operative to transfer a transaction amount to a publisher wallet ID via an associated blockchain-based transaction service; verify transfer of said transaction amount to said publisher wallet ID according to a public transaction ledger associated with said associated blockchain-based transaction service, and', 'upon successful verification of said transfer of said transaction amount to said publisher wallet ID, at least unlock a locked version of said content item; and, 'a secure digital rights management (DRM) client application operative toa processor operative to execute said media player, said blockchain-based wallet application, and said secure DRM client application.2. The computing device according to and further comprising:an input/output (I/O) module operative to download said locked version of said content item from an information centric networking (ICN) network.3. The computing device according to wherein:said locked version of said content item is an encrypted version of said content ...

Подробнее
20-02-2020 дата публикации

Distributed ledger-based supplier evaluation

Номер: US20200057992A1
Принадлежит: SAP SE

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, employing a permissioned distributed ledger to capture information regarding shipments and evaluations of the suppliers of these shipments. In one aspect, a method includes receiving transactional data regarding a shipment of goods from the supplier to a client; determining a score value for each of a plurality of key performance indicators (KPIs) based on the transactional data; determining an overall rating for the supplier based on a weighted aggregate of the score values and previously determined score values for previous shipments from the supplier to at least one of a plurality of clients, the previously determined score values stored to a distributed ledger; and persisting a new transaction entry for the transactional data to the distributed ledger; and providing the overall rating to a user interface.

Подробнее
01-03-2018 дата публикации

Connected device rights management administration

Номер: US20180063150A1
Принадлежит: Dwelo Inc

Various aspects and embodiments of dwelling automation administration are described. Among other aspects or features of the embodiments, a dwelling automation system in a computing device authenticates a user. A management interface in the dwelling automation system generates a user interface for administering a plurality of automation devices at different dwellings based on access and control rights of the user. The user interface can grant the user access to at least one automation device associated with a hub associated with at least one dwelling.

Подробнее
08-03-2018 дата публикации

Transaction scheme for offline payment

Номер: US20180068290A1
Автор: Jupeng XIA
Принадлежит: Alibaba Group Holding Ltd

An authentication factor is received, including an authentication key, an account information of a user, and a dynamic time factor. A bound authentication information is generated by using the authentication factor and a device information of a client device that requested the secure offline payment. The bound authentication information is transmitted to a service server system perform an offline payment authorization based on the bound authentication information. In response to a successful offline payment authorization, a graphical identifier is generated for completing the secure offline payment associated with the authentication factor, where the graphical identifier includes the bound authentication information and a dynamic password generated based on the dynamic time factor.

Подробнее
08-03-2018 дата публикации

METHOD, USER TERMINAL, AND SERVICE TERMINAL FOR PROCESSING SERVICE DATA

Номер: US20180068378A1
Принадлежит:

A service terminal, which is communicatively coupled to a remote server, communicates with an offline mobile phone located nearby via a short-range wireless communication protocol to complete a service request initiated by the mobile phone. The service terminal repeatedly broadcasts, via a short-range wireless transceiver, a service message to neighboring mobile terminals until after receiving a service purchase request message from one of the mobile terminals. The service terminal then suspends the broadcast of the service message and submits the service purchase request to the remote server and then receives a purchase confirmation message from the remote server. Next, the service terminal transmits, via the short-range wireless transceiver, the purchase confirmation message back to the user terminal. 1. A computer-implemented method performed at a service terminal having one or more processors and memory and a short-range wireless signal transceiver , wherein the service terminal is communicatively coupled to a remote server , the method comprising:repeatedly broadcasting, via the short-range wireless signal transceiver, a service message including a first user account identifier of a social networking application and service-related information;receiving, via the short-range wireless signal transceiver, a service purchase request message from a mobile phone adjacent the service terminal, wherein the mobile phone transmits the service purchase request message via a short-range wireless signal transceiver in the mobile phone and the service purchase request message includes a second user account identifier of the social networking application and service-purchasing authorization information corresponding to the service-related information via the mobile phone; transmitting the first user account identifier of the social networking application, the second user account identifier of the social networking application, and the service-purchasing authorization ...

Подробнее
27-02-2020 дата публикации

UNIVERSAL ACCESS TO AN ELECTRONIC WALLET

Номер: US20200065800A1
Принадлежит:

The described system and method allows a contact such as a mobile phone number to be associated with a specific mobile wallet account and by submitting a mobile phone number to an ecommerce site, a URL will be communicated to the contact which opens the payment wallet with the relevant information from the ecommerce transaction. 1. A system for creating communications to effectuate a purchase using an electronic wallet application , the electronic wallet application stored and executed on a mobile computing device , the system comprising:a processor of a transaction server; receive data from a merchant consisting of: a mobile number corresponding to the mobile computing device and a mobile wallet account of the electronic wallet application, an indicator of an item selected for purchase, and a merchant identifier; and', 'in response to the data from the merchant, send a response message including a URL to an electronic wallet application, the URL including payment details, wherein payment details include an identification for the electronic wallet application;', 'wherein selection of the URL redirects a browser of the mobile computing device to open the electronic wallet application based on the URL of the response message and populates the electronic wallet application with the payment details of the URL., 'a memory in communication with the processor of the transaction server, the memory storing instructions, that when executed by the processor of the transaction server, cause the processor of the transaction server to2. The system of claim 1 , wherein the memory stores further instructions claim 1 , that when executed by the processor of the transaction server claim 1 , cause a processor of the mobile computing device to create a transaction in the electronic wallet application using the payment details of the response message.3. The system of claim 2 , wherein the memory stores further instructions claim 2 , that when executed by the processor of the transaction ...

Подробнее
27-02-2020 дата публикации

NEURAL NETWORK SYSTEMS AND METHODS FOR GENERATING DISTRIBUTED REPRESENTATIONS OF ELECTRONIC TRANSACTION INFORMATION

Номер: US20200065818A1
Принадлежит: Capital One Services, LLC

Computer-implemented methods and systems are provided for generating a distributed representation of electronic transaction data. Consistent with disclosed embodiments, generation may include receiving electronic transaction data including first and second entity identifiers. Generation may also include generating an output distributed representation by iteratively updating a distributed representation using the electronic transaction data. The distributed representation may include rows corresponding to first entity identifiers and rows corresponding to second entity identifiers. An iterative update may include generating a training sample and an embedding vector using the components and the distributed representation; determining, by a neural network, a predicted category from the embedding vector; and updating the distributed representation using the predicted category and the training sample. The embodiments may also include outputting the output distributed representation to determine authorization of electronic transactions. Disclosed embodiments may also receive an electronic transaction and determine whether to authorize the electronic transaction based on a distributed representation of electronic transaction data. 123-. (canceled)24. A computer-implemented neural network method for generating a distributed representation of electronic transaction data , comprising:receiving a first set of electronic transaction data;generating a first distributed representation based on the first set of electronic data by iteratively updating the first distributed representation using the first electronic transaction data, the first distributed representation including rows corresponding to a first plurality of entity identifiers;receiving a second set of electronic transaction data;generating a second distributed representation based on the second set of electronic by iteratively updating the second distributed representation using the second electronic transaction data, ...

Подробнее
11-03-2021 дата публикации

Digital Safety and Account Discovery

Номер: US20210075804A1
Принадлежит: Allstate Insurance Co

Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscriptions and financial accounts. The identified subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.

Подробнее
07-03-2019 дата публикации

Method and system for facilitation of wireless e-commerce transactions

Номер: US20190073642A1
Принадлежит: Aeritas, LLC

A method for facilitating a wireless transaction includes receiving, by a transaction fulfillment system, a transaction request from a transaction requester and verifying an identity of the transaction requester. After verifying the identity of the transaction requester, a transaction code is communicated from the transaction fulfillment system to a wireless communication device. After receiving the transaction code, the transaction code is optically scanned from a visual display of the wireless communication device by the transaction fulfillment system. 1. A method for facilitating a wireless transaction , comprising:receiving, at a transaction system and at least in part over a wireless communication link, a transaction request for a user-selected wireless transaction, the transaction request associated with a wireless transaction comprising an authorization with respect to a product or service, and a fulfillment event associated with the authorization, the fulfillment event occurring at a fulfillment location;in response to the received user-selected transaction request, determining whether the authorization has been obtained;if the authorization has been obtained, communicating an transaction code from the transaction system to a wireless communication device, the transaction code that, at a first point in time, is capable of being received from the wireless communication device at the fulfillment location over a short-range radio link to partially complete the wireless transaction; andat a second point in time and while the wireless transaction remains only partially complete, completing the wireless transaction at the fulfillment location by receiving a transaction code from the wireless communication device over the short-range radio link.2. The method as described in wherein the short-range radio link is a short-range wireless radio link.3. The method as described in wherein the short-range wireless radio link is Bluetooth. The disclosures herein relate ...

Подробнее
16-03-2017 дата публикации

Method and apparatus for facilitating electronic payments using a wearable device

Номер: US20170076284A1
Принадлежит: Alibaba Group Holding Ltd

Apparatus and methods for binding a wearable device for use with the wearable device, a terminal, and a server are presented. The method executed by the wearable device includes providing device information to the terminal, receiving a device certificate from the server, and storing the device certificate for performing payment using the corresponding user account. The method executed by the server includes receiving a binding request from the wearable device via the terminal, generating a device certificate of the wearable device based on the device identification, and providing the device certificate to the wearable device. The method executed by the payee device includes acquiring a transaction certificate of a wearable device and sending a payment collection request to a server including the transaction certificate of the wearable device and payment sum information.

Подробнее
16-03-2017 дата публикации

AUTHORIZATION OF CREDENTIAL ON FILE TRANSACTIONS

Номер: US20170076288A1
Автор: Awasthi Amitabh
Принадлежит:

A user may establish a relationship with a merchant so that the user can conduct repeated transactions with the merchant. The merchant computer associated with the merchant may store credentials associated with the user's account. The repeated transactions may not occur at regular intervals. The merchant may include an indicator in the authorization request messages for the user's transactions that indicates that the user is part of the established relationship. Hence, other entities that receive the indicator can accordingly identify and process the transaction as low risk, which results in higher approvals of the user's transactions conducted with the merchant. 1. A method comprising:receiving, by a server computer, an authorization request message for a transaction conducted by a user with a resource provider, wherein the authorization request message includes a credential on file indicator;determining, by the server computer, that the authorization request message comprises the credential on file indicator; andperforming, by the server computer, additional processing in response to the determination of the credential on file indicator in the authorization request message.2. The method of claim 1 , wherein the additional processing comprises at least one of performing an account update process using the credential on file indicator claim 1 , performing a fraud analyses using the credential on file indicator claim 1 , or performing token processing using the credential on file indicator.3. The method of claim 2 , further comprising:sending, by the server computer, the authorization request message including the credential on file indicator to an authorization computer, wherein the authorization computer uses the credential on file indicator to determine whether to authorize the transaction.4. The method of claim 3 , wherein the authorization computer performs additional fraud analyses for the transaction using the credential on file indicator.5. The method of ...

Подробнее
15-03-2018 дата публикации

Code sequencing

Номер: US20180077141A1
Автор: Samuel A. Bailey, Jr.

A system, method, and computer-readable medium for challenge-response authentication are provided. A plurality of codes is received over a communication network based on input provided by way of a user interface displaying a plurality of images. An alphanumeric string is generated based on the received plurality of codes and based on a table that associates each one of the plurality of codes with a respective one of the plurality of images and with a respective one of a plurality of alphanumeric characters. A determination is made as to whether to grant authorization based on whether the generated alphanumeric string matches an alphanumeric user identifier stored in a memory device in association with a user.

Подробнее
05-03-2020 дата публикации

Enhancing information security via the use of a dummy credit card number

Номер: US20200074473A1
Принадлежит: PayPal Inc

The present disclosure is directed to enhancing electronic information security. An electronic device is registered in a registration process. The registration process of the electronic device includes at least one of: obtaining a device identifier that is unique to the electronic device and storing the device identifier as a registered device identifier; or obtaining a location of the electronic device via Global Positioning System (GPS) and storing the location as a registered location of the electronic device. A dummy credit card number is generated. After the registration process and after the dummy credit card number is generated, a request to conduct a transaction electronically is received. The request contains the dummy credit card number. A determination is made as to whether the request was sent from the registered electronic device. The request is processed if the request has been determined to come from the registered electronic device.

Подробнее
24-03-2016 дата публикации

Messaging customer mobile device when electronic bank card used

Номер: US20160086188A1
Принадлежит: Sony Corp

A bank customer's CE device is texted by a bank computer when the customer's electronic debit or credit card (“e-card”) is sought to be used so that the customer is alerted to possibly fraudulent “fishing” of the e-card data by a nearby thief device.

Подробнее
26-03-2015 дата публикации

Method, apparatus, and system for performing online transactions with biometric authentication

Номер: US20150088750A1
Автор: Robin Dua
Принадлежит: Individual

An apparatus, system and method for conducting financial and other transactions using a wireless device are provided. A computing device includes a display screen, a user input interface, and one or more processors. A memory device has stored therein a wallet application for completing transactions based on wireless data communications between the computing device and a merchant system. The memory device further stores at least one electronic credential. The computing device is configured to wirelessly communicate with the merchant system via at least one of a network transceiver and a short-range RF transceiver, and to display information regarding one or more transactions with the merchant system on the display screen. At least one electronic credential is transmitted to the merchant system based on comparing the biometric characteristic of the user with stored biometric information to initiate the one or more transactions with the merchant system.

Подробнее
12-03-2020 дата публикации

SYSTEM AND METHOD FOR DETERMINING DANGEROUSNESS OF DEVICES FOR A BANKING SERVICE

Номер: US20200084632A1
Принадлежит:

Disclosed are systems and methods for determining dangerousness of devices for a banking service. In one aspect, the method comprises detecting an interaction between a user device and the banking service, acquiring characteristics of the user device including one or more of: an operating system under whose control the user device is running, a location of the user device, a regional characteristic of a firmware of the user device, an account identifier associated with the user device, acquiring data related to a threat risk state of the user device, and determining a dangerousness of the user device based on the acquired characteristics and the acquired data related to the threat risk of the user device. 1. A method for determining dangerousness of devices for a banking service , the method comprising:detecting an interaction between a user device and the banking service;acquiring characteristics of the user device including one or more of: an operating system under whose control the user device is running, a location of the user device, a regional characteristic of a firmware of the user device, an account identifier associated with the user device;acquiring data related to a threat risk state of the user device; anddetermining a dangerousness of the user device based on the acquired characteristics and the acquired data related to the threat risk of the user device.2. The method of claim 1 , wherein the threat risk state of the user device is based on: a frequency of infection of user devices for a predetermined region claim 1 , a frequency of infection of user devices for a plurality of different regions claim 1 , or a combination of frequencies of infections of user devices for the predetermined region and the plurality of different regions.3. The method of claim 1 , wherein the threat risk state of the user device is based on whether or not a root access is present on the user device.4. The method of claim 1 , wherein the threat risk state of the user device ...

Подробнее
29-03-2018 дата публикации

METHOD, DEVICE, AND SYSTEM

Номер: US20180088999A1
Автор: MATSUMOTO Yasuhide
Принадлежит: FUJITSU LIMITED

A method executed by a computer. The method includes, acquiring a request for a service, executing a first determination of a first service provider as a target for disclosing the request, executing a second determination of a second service provider as a target for disclosing the request, based on a result of receiving a requirement for providing the service from a first terminal corresponding to the first service provider. 1. A method executed by a computer , the method comprising:acquiring a request for a service;executing a first determination of a first service provider as a target for disclosing the request;executing a second determination of a second service provider as a target for disclosing the request, based on a result of receiving a requirement for providing the service from a first terminal corresponding to the first service provider.2. The method according to claim 1 , wherein when the result indicates that the service satisfying the request is not provided claim 1 , the second determination is executed.3. The method according to claim 1 , the method further comprising claim 1 , prior to executing the second determination: transmitting the result to a second terminal that has transmitted the request claim 1 ,wherein when another request that is equal to the request is received from the second terminal, the second determination is executed.4. The method according to claim 1 , the method further comprising:receiving another requirement for providing the service from a second terminal corresponding to the second service provider; andtransmitting the other requirement to a third terminal that has transmitted the request.5. The method according to claim 1 ,wherein the first determination includes determining another service provider as a target for disclosing the requirement, the other service provider having a same attribute as an attribute of the first service provider, andwherein the second determination is executed based on the result of receiving ...

Подробнее
02-04-2015 дата публикации

Apparatus, system, and method of securing financial transactions using a mobile device

Номер: US20150095174A1
Автор: Robin Dua
Принадлежит: Robin Dua

A novel system and methodology for conducting financial and other transactions using a wireless device. Credentials may be selectively issued by issuers such as credit card companies, banks, and merchants to consumers permitting the specific consumer to conduct a transaction according to the authorization given as reflected by the credential or set of credentials. The preferred mechanism for controlling and distributing credentials according to the present invention is through one or more publicly accessible networks such as the Internet wherein the system design and operating characteristics are in conformance with the standards and other specific requirements of the chosen network or set of networks. Credentials are ultimately supplied to a handheld device such as a mobile telephone via a wireless network. The user holding the credential may then use the handheld device to conduct the authorized transaction or set of transactions via, for example, a short range wireless link with a point-of-sale terminal.

Подробнее
12-05-2022 дата публикации

SYSTEMS AND METHODS FOR PROVIDING ACCESS TO LOCATIONS AND SERVICES

Номер: US20220143494A1
Принадлежит:

Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security checks, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users. 1a medium for storing identifying information; andan emitter for communicating the identifying information to a gaming device such that access to the gaming device is provided when the identifying information is associated with a user that is authorized to operate the gaming device.. An apparatus comprising: This application is a continuation of U.S. patent application Ser. No. 17/001,426 filed Aug. 24, 2020, which is a continuation of U.S. patent application Ser. No. 16/387,823 filed on Apr. 18, 2019 (now U.S. Pat. No. 10,751,607 issued Aug. 25, 2020), which is a continuation of U.S. patent application Ser. No. 14/252,407 filed Apr. 14, 2014 (now U.S. Pat. No. 10,286,300 issued on May 14, 2019), which is a continuation of U.S. patent application Ser. No. 12/324,269, filed Nov. 26, 2008 (now U.S. Pat. No. 8,695,876 issued on Apr. 15, 2014), which is a continuation of U.S. patent application Ser. No. 11/418,939, filed May 5, 2006 (now U.S. Pat. No. 7,549,576 issued on Jun. 23, 2009), each of which is hereby incorporated by reference herein in its entirety.The present invention relates generally to the field of gaming and, more particularly, to a gaming system and method incorporating a wireless network and systems and methods for providing access thereto.Virtual casinos are accessible via communications networks such as the Internet. For example, on-line casinos present a graphical representation ...

Подробнее
09-04-2015 дата публикации

Method, apparatus, and system for performing wireless transactions with near-field communication (nfc) set up

Номер: US20150100499A1
Автор: Robin Dua
Принадлежит: Robin Dua

An apparatus, system and methodology for establishing a wireless communications link using a wireless device are provided. A computing device includes a wallet application for completing transactions based on wireless data communications between the computing device and at least one external electronic device. The computing device includes a short-range radio frequency (RF) transceiver to communicate with an external RF transceiver. A near-field communication (NFC) module includes a NFC antenna, and the NFC module is configured to transmit wireless setup information between the NFC antenna and a NFC reader in communication with the external electronic device based on the NFC antenna of the computing device being within a RF range of the NFC antenna of the NFC reader. A processor establishes a wireless communications link between the short-range RF transceiver and the external RF transceiver to initiate transactions between the computing device and the at least one external electronic device.

Подробнее
19-03-2020 дата публикации

METHOD AND APPARATUS FOR ELECTRONIC PAYMENT AND AUTHENTICATION

Номер: US20200090158A1
Автор: Norair John Peter
Принадлежит:

A first device may be operable to receive a request to accept a payment via an ISO 18000-7 interface. The first device may transmit, via the ISO 18000-7 interface, a wake-up message to a second device comprising an ISO 18000-7 interface. The first device may transmit, via the ISO 18000-7 interface, an authorization request to the second device. The first device may receive an authorization message from the second device. The first device may decide whether to accept the payment based on the received authorization message. The first device may register with a retail outlet's network upon coming into range of a registration terminal of the network. While registered with the network, the first device may communicate with the network utilizing the ISO 18000-7 interface. The first device may deregister with the network upon coming into range of a deregistration terminal of the network. 1. A method comprising: receiving a request to accept a payment via said ISO 18000-7 interface;', 'transmitting, via said ISO 18000-7 interface, a wake-up message to a second communication device comprising an ISO 18000-7 interface;', 'transmitting, via said ISO 18000-7 interface, an authorization request to said second communication device;', 'receiving an authorization message from said second communication device; and', 'deciding whether to accept said payment based on said received authorization message., 'performing by a first communication device comprising an ISO 18000-7 interface2. The method of claim 1 , comprising deciding to accept said payment if said authorization message comprises a correct security code.3. The method of claim 1 , comprising deciding to decline said payment if said authorization message does not comprise a correct security code.4. The method of comprising claim 1 , after accepting said payment claim 1 , transmitting claim 1 , via said ISO 18000-7 interface claim 1 , a cookie to said second communication device claim 1 , wherein said cookie enables access to a ...

Подробнее
01-04-2021 дата публикации

Privilege granting method and privilege granting device

Номер: US20210097531A1
Автор: Tooru Shimizu
Принадлежит: KDDI Corp

A settlement device includes an application reception unit that associates and stores a user ID for specifying a user and application information indicating an application to grant a privilege at the time of purchase of a target commodity in a storage unit when the user ID and the application information are acquired, a token generation unit that generates a settlement token and transmits the settlement token to a user terminal when a request for acquiring the user ID and a settlement code is received from a user terminal, a settlement information reception unit that is configured to receive the settlement information used to perform settlement of commodities, the settlement token, and privilege target commodity information for specifying a commodity which is a privilege target from a store terminal that is configured to read the settlement code according to the settlement token, and a privilege granting unit that is configured to grant the privilege corresponding to application information to the user when the application information associated with the user ID corresponding to the received settlement token corresponds to the received privilege target commodity information.

Подробнее
05-04-2018 дата публикации

Systems and methods for biometric identity authentication

Номер: US20180096354A1
Автор: Manoneet KOHLI
Принадлежит: Mastercard International Inc

A method for authenticating a user identity for a data transaction is provided. The method is implemented using an identity authentication computing device in connection with a memory and a data transaction processor. The method includes receiving a request from a first user of a first client device for a data transaction with a second user, causing a second client device to prompt the second user for biometric identification information, receiving captured biometric identification information corresponding to the second user, retrieving sample biometric identification information associated with the second user, comparing the captured biometric information and the sample biometric information, determining that the captured and the sample biometric information match, completing a data transaction between the first user and the second user, and transmitting an instruction to one or more of the first client device and the second client device displaying a notification that the data transaction is completed.

Подробнее
19-03-2020 дата публикации

Authentication method, device, vr terminal, and vr server based on vr scene

Номер: US20200092092A1
Автор: Hao Zhao
Принадлежит: Alibaba Group Holding Ltd

One or more implementations shown in the present specification provide a VR scenario-based authentication method. Random information from a virtual reality server is obtained. Password information entered by a user in a virtual reality scenario is obtained. Interactive environment authentication information is generated from the random information and the password information. The password information and the interactive environment authentication information is sent to the virtual reality server for security authentication of an interactive environment of the virtual reality scenario.

Подробнее
19-03-2020 дата публикации

CONFIRMING AUTHENTICITY OF A USER TO A THIRD-PARTY SYSTEM

Номер: US20200092287A1
Принадлежит:

A telecommunications network server system provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system. Responsive to receiving from the user device one of the unique electronic transaction codes, the telecommunications network server system provides, to the respective third-party system, authentication of the user. 1. A telecommunications network server device comprising:a processor; receive via the network communications port a request from a third-party electronic device that a user is requesting to be authenticated for a transaction with the third-party electronic device;', 'in response to the request, transmit via the network communications port an electronic transaction code to the third-party electronic device;', 'receive the electronic transaction code and a digital identifier from a user device associated with the user, the digital identifier being storable in encrypted form in the user device and usable to authenticate the user for transactions with third-party electronic devices that are communicatively separate from each other;', 'confirm the electronic transaction code and the digital identifier; and', 'in response to confirming the electronic transaction code and the digital identifier, transmit via the network communications port a confirmation of authenticity of the user to the third-party electronic device., 'a network communications port configured for being controlled by the processor: and a non-transitory computer-readable storage device comprising instructions that are executable by the processor to2. The telecommunications network server ...

Подробнее
28-03-2019 дата публикации

Electronic systems of electronic terminals and servers for securing information integrity in the distributed technological environment and methods of using thereof

Номер: US20190095641A1
Автор: Christos Dimitriadis

In some embodiments, the present invention provides for a computer-implemented method, including: electronically receiving, first terminal data where the first terminal data includes at least one first alphanumerical data sequence; electronically generating at least one first computer-generated barcode; electronically storing the first terminal data and the at least one first computer-generated barcode in at least one database residing in a non-transient computer memory; automatically and electronically transmitting the at least one first computer-generated barcode to the at least one first terminal machine; electronically receiving second terminal data; automatically validating, in real-time, the user input as being representative of the user output.

Подробнее
13-04-2017 дата публикации

Coupon registration and validation system

Номер: US20170103408A1
Принадлежит: Vtu De Colombia SA

In an illustrative system and method for disbursing resources includes (i) receiving a user request for a coupon, the user request including user criteria; ( 2 ) matching the received user criteria with a target audience criteria; ( 3 ) transmitting a coupon to a user, the coupon including a unique password based upon a match of the received user criteria and the target audience criteria; ( 4 ) receiving a request for registration of the unique password of the coupon with the user; ( 5 ) receiving a request for validation of the unique password of the coupon; and ( 6 ) authorizing the user to access the network resource associated with the coupon upon validation of the unique password.

Подробнее
26-03-2020 дата публикации

SELECTABLE ENCRYPTION METHODS

Номер: US20200099723A1
Автор: Bailey, JR. Samuel A.

A secure mobile financial transaction is provided by receiving, over a communication network, a list of protection mechanisms available for implementation by an external terminal. Security-related data is received from one or more sensors and an attack signature is computed based on the security-related data. An appropriate security policy is selected from multiple security policies stored in a database based on the list of protection mechanisms and the attack signature. A secure communication session is established between the external terminal and an internal network component according to the selected security policy. A data message associated with a mobile financial transaction is communicated over the communication network during the communication session. 1. A computer-implemented method , comprising:receiving, by a client device, a policy message protection mechanism, policy message communications channel, and a policy message communications protocol;configuring the client device to implement the policy message protection mechanism, policy message communications channel, and the policy message communications protocol;receiving, with the client device, a first policy message using the policy message communications channel and the policy message communications protocol, the first policy message being protected by the policy message protection mechanism and the first policy message specifying a first encryption method for communications with the client device;protecting, with the client device, a first data message with the first encryption method;receiving, with the client device, a second policy message using the policy message communications channel and the policy message communications protocol, the second policy message being protected by the policy message protection mechanism and the second policy message specifying a second encryption method for communications with the client device; andprotecting, with the client device, a second data message with the ...

Подробнее
02-06-2022 дата публикации

DATA PAYMENT AND AUTHENTICATION VIA A SHARED DATA STRUCTURE

Номер: US20220172311A1
Принадлежит: CHICAGO MERCANTILE EXCHANGE INC.

The disclosed embodiments relate generally to complex data stream control and entitlement. Specifically, the disclosed embodiments provide systems and methods for ensuring that only authenticated/verified participants receive data streams. A third party, e.g., a party other than the data provider or the data recipient, who is nevertheless associated with both the data provider and the data recipient, may be involved in controlling whether data streams from the data provider can reach the data recipient. Thus, a third party may logically sit between the data provider and the data recipient, and may decide whether the data recipient should receive data streams. The disclosed embodiments implement data generation, flow, control and permissioning between multiple entities via digital assets accessed and manipulated on a shared data structure. 1. A computer implemented method comprising:generating, by a processor based on a validated request to receive at least a portion of market data received from a trading device and stored within a distributed data structure shared among a plurality of participant computing systems including an exchange computing system, a market data distributor, and one or more trading devices, a data record which specifies an entitlement of the trading device to receive the requested portion of market data from the exchange computing system, the data record being stored within the distributed data structure, wherein the exchange computing system generates market data indicative of modifications to at least one data object maintained thereby based on at least one of a plurality of electronic data transaction request messages received by the exchange computing system, and transmits the market data to the market data distributor for redistribution to at least a subset of the one or more trading devices upon validation of entitlement thereto as indicated in the stored data record for a respective trading device by the market data distributor.2. The ...

Подробнее
23-04-2015 дата публикации

Method and system for preventing unauthorized processor mode switches

Номер: US20150113642A1
Автор: Gregory R. Conti
Принадлежит: Texas Instruments Inc

A system comprising a processor adapted to activate multiple security levels for the system and a monitoring device coupled to the processor and employing security rules pertaining to the multiple security levels. The monitoring device restricts usage of the system if the processor activates the security levels in a sequence contrary to the security rules.

Подробнее
19-04-2018 дата публикации

Augmented reality device and method for product purchase facilitation

Номер: US20180108080A1
Принадлежит: Mastercard Asia Pacific Pte Ltd

An augmented reality device and method for product purchase facilitation using an augmented reality device are provided. The device includes a display module configured to provide augmented reality visual content, the augmented reality visual content including a virtual image of a product, a biometric authentication module configured to receive biometric data relating to a user and authenticate the user based on the received biometric data, and a transceiver module configured to receive, from a user device, digital payment credentials for facilitating purchase of the product, and transmit the digital payment credentials to a payment processing module for product purchase upon successful authentication of the user.

Подробнее
19-04-2018 дата публикации

BLOCKCHAIN MINING USING TRUSTED NODES

Номер: US20180109541A1
Автор: Gleichauf Paul Harry
Принадлежит:

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more mobile communication devices and/or processing devices to facilitate and/or support one or more operations and/or techniques for blockchain mining using trusted nodes, such as via democratization of associated resources for fair blockchain mining, for example. 1. A method comprising:communicating electronically with a plurality of nodes on a network regarding a validation of a block of on-line transactions for a blockchain, at least some of the plurality of nodes comprising at least one of the following: a full node; a lightweight node; or any combination thereof,one or more communications of the communicating electronically occurring, at least in part, through use of trusted computational capabilities of the at least some of the plurality of nodes.2. The method of claim 1 , wherein the trusted computational capabilities are determined claim 1 , at least in part claim 1 , via at least one of the following: an International Mobile Subscriber Identity (IMSI) of the at least some of the plurality of nodes; an Integrated Circuit Card Identity (ICCID) of the at least some of the plurality of nodes; an International Mobile Equipment Identity (IMEI) of the at least some of the plurality of nodes claim 1 , or a Mobile Station Integrated Services for Digital Network number (MSISDN) of the at least some of the plurality of nodes; or any combination thereof.3. The method of claim 1 , wherein the at least some of the plurality of nodes comprise mining nodes.4. The method of claim 1 , wherein the mining nodes comprise mobile devices associated with a mobile service provider (MSP).5. The method of claim 4 , wherein the validation of the block of on-line transactions is implemented substantially during an idle cycle of a processing unit of the mobile devices.6. The method of claim 4 , wherein the mobile devices comprise one or more ...

Подробнее
29-04-2021 дата публикации

Method and system for completing cross-channel transactions

Номер: US20210125194A1
Принадлежит: Allclear Id Inc

A high security communication channel between the back-end application and the customer's mobile device is disclosed. An application programming interface that integrates into a service provider's back end application and a software development kit that integrates into a mobile application on the customer's mobile device establish a two-way communication channel between the back-end application and the mobile device. When a customer is ready to complete a transaction in one of the service provider's sales channels, such as online, by phone, in-person, by mobile device, or at a kiosk, the transaction moves to the mobile device for completion. A push message on the mobile device launches the service provider's mobile application and the customer completes the transaction quickly and securely using the advanced automation functions, such as biometrics, GPS, wallet, camera or near field communication, available on the mobile device.

Подробнее
11-04-2019 дата публикации

PROVIDING PRIVILEGES AND GRANTING OR DENYING A LEVEL OF ACCESS TO RESOURCES BASED ON AUTHENTICATION BY AUTHENTICATION SOURCES

Номер: US20190108565A1
Принадлежит:

A system and method for a service level application are described. The service level application receives authentication data from a client seeking access to establish an account in an online marketplace. The service level application identifies a source of truth corresponding to the authentication data and verifies the authentication data with the corresponding source of truth. The service level application determines an access level tier to the online marketplace for the client based on the source of truth. 1. A system comprising:one or more computer processors; anda computer-readable medium storing instructions that, when executed by the one or more computer processors, cause the system to perform operations comprising:receiving authentication request data from a client;determining a plurality of authentication types for different portions of the authentication request data;identifying a plurality of sources for authenticating the client based on the plurality of authentication types, the plurality of sources corresponding to the plurality of authentication types;transmitting a plurality of authentication requests to the plurality of sources, each authentication request in the plurality of authentication requests comprising a portion of the authentication request data;in response to receiving authentication response data from the plurality of sources, determining a first set of privileges and a second set of privileges, the second set of privileges including one or more privileges excluded from the first set of privileges;granting the client access to first resources with the first set of privileges; andgranting the client access to second resources with the second set of privileges.2. The system of claim 1 , wherein the operations further comprise identifying the plurality of authentication types of the different portions of the authentication request data based on a plurality of formats of the different portions of the authentication request data.3. The system ...

Подробнее
29-04-2021 дата публикации

ON-DEVICE PRIVACY-PRESERVATION AND PERSONALIZATION

Номер: US20210126904A1
Принадлежит:

Personalization with on-device privacy preservation is provided by receiving, at a user device, a generalized recommendation from a remote provider backend, which include a plurality of candidate items responsive to a request from an application running on the user device; generating a plurality of candidate vectors corresponding to the plurality of candidate items representing a corresponding candidate item in a binary format across a plurality of metrics associated with the plurality of candidate items; generating a user vector based on personal data stored on the user device, the user vector representing a user in a binary format across one or more metrics associated with the personal data; determining interaction propensities based on the user vector and the plurality of candidate vectors according to a global model run on the user device; and displaying, on the user device, the plurality of candidate items according to the interaction propensities. 1. A method comprising:receiving, at a user device, a generalized recommendation from a provider backend remote from the user device, wherein the generalized recommendation includes a plurality of candidate items responsive to a request from an application running on the user device;generating a plurality of candidate vectors corresponding to the plurality of candidate items representing a corresponding candidate item in a binary format across a plurality of metrics associated with the plurality of candidate items;generating a user vector based on personal data stored on the user device, the user vector representing a user in a binary format across one or more metrics associated with the personal data;determining interaction propensities based on the user vector and the plurality of candidate vectors according to a global model run on the user device; anddisplaying, on the user device, the plurality of candidate items according to the interaction propensities.2. The method of claim 1 , wherein displaying the ...

Подробнее
11-04-2019 дата публикации

System, control method for system, voice operation device, control method for voice operation device, and storage medium

Номер: US20190109847A1
Автор: Nao Funane
Принадлежит: Canon Inc

A system including a mobile terminal having an authenticator, a TPM with tamper resistance and a voice assistant. The voice assistant makes a process request corresponding to voice input of a user to a server in accordance with the input, receives a biometric authentication request from the server, makes a request for a biometric authentication process to the mobile terminal of the user in accordance with the request for biometric authentication via wireless communication, and transmits an authentication result from the mobile terminal to a server. The mobile terminal executes the biometric authentication process using biometric information stored in the authenticator and the TPM in accordance with the request for the biometric authentication process from the voice assistant, and transmits an authentication result to the voice assistant.

Подробнее
02-04-2020 дата публикации

Systems and methods for cryptographic authentication of contactless cards

Номер: US20200106752A1
Автор: Jeffrey Rule
Принадлежит: Capital One Services LLC

Example embodiments of systems and methods for replacing card information. In an embodiment, a system comprises an authentication server in data communication with a network and a database in data communication with the authentication server. The authentication server is configured to receive an authentication signal from a user device via the network, retrieve a list of merchants having transaction history with an account associated with the account card, and transmit an access token to at least one merchant server selected using the list of merchants.

Подробнее
02-04-2020 дата публикации

SECURE PERMISSIONING OF ACCESS TO USER ACCOUNTS, INCLUDING SECURE DEAUTHORIZATION OF ACCESS TO USER ACCOUNTS

Номер: US20200106764A1
Принадлежит:

A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate transactions related to a user account, without disclosing to the third-party system account credentials. The system enables the user to also securely de-authorize the third-party system. For example, records may be automatically generated that securely store account information, including one or more permissions related to the account and/or the third-party. A token associated with a record may be shared with the third-party system, but neither the record itself, nor the user account credentials, may be shared with the third-party. Accordingly, the third-party may request user account data and/or initiate transactions by providing the token, but does not itself know, e.g., the user account credentials. Further, the user may set various permissions related to the token, and may also revoke the token (e.g., de-authorize the third-party), thus providing increased security to the user's account. 1. A computer-implemented method comprising: [ account credentials associated with an account of the user held by the institution, and', 'an indication of the account of the user held by the institution,', 'wherein the plug-in is configured to provide the account credentials to the first computing device without storing the account credentials on the third computing device;, 'receiving an authorization request via a plug-in executing on a third computing device associated with a user, the authorization request including information including at least, an electronic record of the information including the account credentials, and', 'a token associated with the electronic record; and, 'generating at least, 'providing the token to a second computing device;, 'by a first computing device comprising one or more processors executing program instructions, the first computing device associated with an institution receiving the token and ...

Подробнее
02-04-2020 дата публикации

SECURE PERMISSIONING OF ACCESS TO USER ACCOUNTS, INCLUDING SECURE DEAUTHORIZATION OF ACCESS TO USER ACCOUNTS

Номер: US20200106765A1
Принадлежит:

A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate transactions related to a user account, without disclosing to the third-party system account credentials. The system enables the user to also securely de-authorize the third-party system. For example, records may be automatically generated that securely store account information, including one or more permissions related to the account and/or the third-party. A token associated with a record may be shared with the third-party system, but neither the record itself, nor the user account credentials, may be shared with the third-party. Accordingly, the third-party may request user account data and/or initiate transactions by providing the token, but does not itself know, e.g., the user account credentials. Further, the user may set various permissions related to the token, and may also revoke the token (e.g., de-authorize the third-party), thus providing increased security to the user's account. 1. A computer-implemented method comprising: receiving, from a third computing device associated with an external application, an authorization request including an indication of a user account;', 'retrieving, from a fourth computing device associated with an institution, information associated with the user account held by the institution;', an electronic record of the information, and', 'a token associated with the electronic record;, 'generating at least, 'causing at least one of a unique identifier associated with the token or the token to be provided to the third computing device; and', the electronic record of the information, and', 'the token associated with the electronic record; and, 'providing, to a second computing device, at least], 'by a first computing device comprising one or more processors executing program instructions [ the electronic record of the information, and', 'the token associated with the electronic ...

Подробнее
26-04-2018 дата публикации

WIRELESS ESTABLISHMENT OF IDENTITY VIA BI-DIRECTIONAL RFID

Номер: US20180114214A1
Принадлежит:

A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID). The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for sending device data including at least a username and a password to a transceiver. The method also includes receiving an identifier of an access point in a wireless network from the transceiver, the transceiver sending the device data to the access point via a security server. The device data is sent to the access point based on the identifier of the access point, the access point establishing a secure connection to the computer infrastructure based on the device data received from the transceiver and the computer infrastructure. 1. A method implemented in a hardware computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions , the method comprising:blocking, by a computing device, generating of a username and a password for a predetermined duration of time by placing an expiration flag on a current username and password for the predetermined duration of time;randomly generating the username and the password at the computing device of the hardware computer infrastructure;sending, by the computing device, device data including at least the username and the password to a transceiver;setting, by the computing device, an expiration time for the username and the password;after the expiration time is reached, generating, by the computing device, another username and password and sending the another username and password to the transceiver;receiving, by the computing device, a service set identifier (SSID) that identifies an access point in a wireless network from the transceiver; andsending the device data to the access point based on the SSID of ...

Подробнее
26-04-2018 дата публикации

METHOD AND APPARATUS FOR MEDIATING COMMUNICATIONS

Номер: US20180115531A1
Принадлежит:

A method of mediating communications between a first computing device and a second computing device, by an intermediary computing device, comprising establishing a communications link to each of the first and second computing devices, receiving a first message from the first computing device, the content of the first message comprising information in a protected format, converting at least part of the information in the protected format to an unprotected format, and transmitting a second message to the second computing device, the content of the second message comprising at least part of the information in the unprotected format. 1. A method of mediating communications between a first computing device and a second computing device , by an intermediary computing device , the method comprising:establishing a communications link to each of the first and second computing devices;receiving a first message from the first computing device, the content of the first message comprising information in a protected format;converting at least part of the information in the protected format to an unprotected format; andtransmitting a second message to the second computing device, the content of the second message comprising at least part of the information in the unprotected format.2. A method according to claim 1 , wherein establishing the communications link to the first computing device includes receiving a connection request addressed to a domain name of the second computing device.3. A method according to claim 1 , wherein establishing the communications link to the first computing device includes receiving a connection request addressed to a universal resource locator of the intermediary computing device.4. A method according to claim 1 , further comprising:receiving an information request message from the second computing device, the information request message comprising an electronic document allowing for entry of information in an unprotected format;modifying the ...

Подробнее
27-04-2017 дата публикации

Method and system for handling sensitive data in a content delivery network

Номер: US20170116607A1
Автор: F. Thomson Leighton
Принадлежит: Akamai Technologies Inc

Using cryptographic techniques, sensitive data is protected against disclosure in the event of a compromise of a content delivery network (CDN) edge infrastructure. These techniques obviate storage and/or transfer of such sensitive data, even with respect to payment transactions that are being authorized or otherwise enabled from CDN edge servers.

Подробнее
18-04-2019 дата публикации

Method and system providing peer effort-based validation

Номер: US20190114636A1
Принадлежит: Individual

A method of performing a transaction between a first user of a first input device, and a second user of a second input device, the method includes generating, via the first input device, a transaction request with a with a first effort-based identity token associated with first user, receiving a response with the token and a validation key obtained from a validation server via the second input device based on a second effort-based identity token associated with the second user and a second user effort, providing the second user effort and second effort-based identity token to the validation server, receiving a second effort validation key from the validation server, and sending the transaction with the first user and second user identity-based tokens and first and second effort validation keys to the second person to complete the transaction while ensuring both the first and second users are consistent throughout the transaction.

Подробнее
09-04-2020 дата публикации

Systems and methods for facilitating network transactions based on user authentication

Номер: US20200111094A1
Принадлежит: Mastercard International Inc

Systems and methods are provided for facilitating network transactions based on user authentication. One exemplary method includes, for a network transaction, receiving, at a card device, an authentication command from an issuer of a payment account associated with the card device. A user of the card device is instructed, at an indicator of the card device, to provide a biometric for use in authenticating the user. Biometric data from the user is captured at biometric sensor of the card device, when the user provides the biometric, and the captured biometric data is compared with reference biometric data stored in a memory of the card device. The card device then returns a command reply to the issuer, where the command reply includes an authentication result based on the comparison, thereby permitting the issuer to employ the authentication result of the user in connection with the network transaction.

Подробнее
18-04-2019 дата публикации

Digital Safety and Account Discovery

Номер: US20190116194A1
Принадлежит: Allstate Insurance Co

Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumers identified subscription and financial accounts. The discovered subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.

Подробнее
03-05-2018 дата публикации

VARIABLE RISK ENGINE

Номер: US20180121915A1
Принадлежит:

The indention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online transactions performing the amount of real-time risk analysis based on the set amount, and performing an amount of time-delayed risk analysis. In some embodiments, the amount of real-time risk analysis may depend on a predetermined period of time for completion of the real-time risk analysis. In other embodiments, the amount of real-time risk analysis may depend on selected tests to be completed during the real-time risk analysis. 120-. (canceled)21. A system for variable risk assessment for an online transaction , the system comprising:an institution server; anda device in communication with the institution server,wherein the institution server is configured to perform, with aid of a computer processor, a risk analysis of an online transaction with the device, andwherein the institution server:selects a plurality of tests associated with an online transaction conducted with the device;performs a first set of tests during the first stage of the online transaction;determines a presence of a transaction event for the online transaction, wherein the transaction event causes the first stage of the online transaction to complete; andperforms a second set of tests during the second stage, wherein the second set of tests is executed in parallel with at least a portion of the first set of tests during the second stage.22. The system of claim 21 , wherein the first stage occurs during the online transaction while the second stage is after the online transaction has occurred.23. The system of claim 21 , wherein the institution server further identifies a third stage associated with the online transaction where no tests are performed during the third stage.24. The system of claim 23 , wherein the third stage occurs between the first stage and the second stage.25. The system of claim 21 ...

Подробнее
05-05-2016 дата публикации

Telecommunication method for securely exchanging data

Номер: US20160127326A1
Автор: Wei Lin
Принадлежит: Individual

The invention provides for a telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer system via a digital cellular wireless telecommunications network, wherein the telecommunications device is a battery powered mobile end user telecommunications device, wherein the method comprises the steps of: encrypting the unencrypted data using a first encryption algorithm into first encrypted data, sending the first encrypted data to a second server computer system via a first network connection of the digital cellular wireless telecommunications network, storing the first encrypted data by the second server computer system, sending an order request to the first server computer system via a second network connection of the digital cellular wireless telecommunications network by the telecommunications device, sending a data publishing request to the second server computer system, generating a cryptographic key pair, sending the first encrypted data, the public key, and the private key to the telecommunications device, decrypting the first encrypted data into the unencrypted data, encrypting the unencrypted data into second encrypted data using the public key, sending the second encrypted data to the second, generating a web service for providing the second encrypted data via an URL, sending the URL to the telecommunications device, sending the URL and the private key, requesting the second encrypted data from the second server computer system, sending the second encrypted data to the first server computer system by the second server computer system using the wired network connection, decrypting the second encrypted data by the first server computer system into the unencrypted data, and combining the order request with the unencrypted data.

Подробнее