摘要:
Using cryptographic techniques, sensitive data is protected against disclosure in the event of a compromise of a content delivery network (CDN) edge infrastructure. These techniques obviate storage and/or transfer of such sensitive data, even with respect to payment transactions that are being authorized or otherwise enabled from CDN edge servers.
摘要:
The present system provides a user remuneration in exchange for participation in a qualifying event. The system has an internet interface for interacting with a plurality of users and a plurality of advertisers, an account database; and a token generation module. The token generation module is configured such that when a user encounters a qualifying event on the internet as presented by the advertiser, the token generation module, upon login by the user, delivers an authentication token to the advertiser. When the user finishes the qualifying event, the authentication token is authenticated by the advertiser and returned to the system, such that the system can account for a remuneration for the user to be credited in an account associated with the user in the account database.
摘要:
Techniques for maintaining potentially compromised authentication information for a plurality of accounts may be provided. An individual piece of authentication information may be associated with one or more tags that indicate access rights with respect to requestors that also provide and maintain other potentially compromised authentication information. A subset of the potentially compromised authentication information may be determined based on the one or more tags in response to a request from a requestor for the potentially compromised authentication information. In an embodiment, the subset of the potentially compromised authentication information may be provided to the requestor.
摘要:
The present invention provides a solution to the needs described above through a system and method for a wireless universal mobile product interface (WUMPI). Generally, products/objects have their own interface, or man-machine-interface (MMI). Technically, the wireless universal mobile product interface of the present invention (WUMPI) innovates this space by replacing the product's MMI by implementing reverse software control via wireless transmission channel and or Bluetooth wireless technologies to control the mobile device's screen—replacing the local software component on the mobile device which controls what is shown on the screen in terms of a man-machine interface (MMI). This enables a product/object within the area of the mobile device to take over control via the wireless transmission channel or other wireless capability of the mobile device and to “extend” the product interface to the mobile device that came within its control range, or the product/object's personal area network (PAN).
摘要:
The invention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online transaction, performing the amount of real-time risk analysis based on the set amount, and performing an amount of time-delayed risk analysis. In some embodiments, the amount of real-time risk analysis may depend on a predetermined period of time for completion of the real-time risk analysis. In other embodiments, the amount of real-time risk analysis may depend on selected tests to be completed during the real-time risk analysis.
摘要:
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, detecting a cyber-attacker, and detecting click-fraud. An end-user device (a desktop computer, a laptop computer, a smartphone, a tablet, or the like) interacts and communicates with a server of a computerized server (a banking website, an electronic commerce website, or the like). The interactions are monitored, tracked and logged. User Interface (UI) interferences or irregularities are intentionally introduced to the communication session; and the server tracks the response or the reaction of the end-user to such communication interferences. The system determines whether the user is a legitimate human user, or a cyber-attacker or automated script posing as the legitimate human user. The system further detects click-fraud, and prevents or mitigates Application Distributed Denial-of-Service attacks.
摘要:
A data interaction method, a verification terminal, a server, and a system are described. The method includes: receiving, by a verification terminal, identity verification information from a user terminal, the identity verification information being information sent to the user terminal by a server in advance; sending, by the verification terminal, a request instruction to the server, the request instruction including the identity verification information; executing, by the server, an operation corresponding to the request instruction; and sending, by the server, feedback information to the verification terminal.
摘要:
Systems and methods for facilitating purchases of broadband content and services are provided. A request to purchase broadband content or a broadband service may be received by a server from a customer device. A transaction associated with the received purchase request may be completed in real-time. Based upon the completion of the transaction, one of (i) access rights associated with the broadband content or (ii) a feature set associated with the broadband service may be altered. The requested broadband content or broadband service is then made available to the customer.
摘要:
The present disclosure relates generally to the field of providing a computer-implemented system and method that provides a secure universal electronic transaction card-based payment system. The system provides consumers the ability to conveniently, securely and safely use a single physical universal electronic transaction card, in a standard ISO-7810 credit card form factor that will be accepted at any standard POS device. A multiplicity of transaction account numbers, applets and or tokens are stored in a secure element from which the consumer can transact from any of their credit, debit, pre-paid, club access cards, gift cards, rewards and loyalty cards accounts, using either, Mag Stripe, EMV, or NFC at existing POS terminals, in such a way that only the legitimate owner of the electronic transaction card can activate, provision and unlock the electronic transaction card for use via biometric identification. After the use of the electronic transaction card all information is locked, the card is unusable again without a subsequent biometric identification by the legitimate owner. In the body of this document the universal electronic transaction card will also be referred to as the universal smartcard or the smartcard.
摘要:
An authorization and validation system and method for mobile financial transactions uses (1) historic Global Positioning System (GPS) and time at specific locations and (2) both visible and invisible prompts to allow access to assets and performance of financial transactions. Said system and method also determines when the mobile device, tablet or smart phone, is lost or is operated by an impersonator. Special attention is devoted when said system is engaged in determining whether the user is under threat or not.