摘要:
A method for authenticating a consumer. The method includes receiving an authorization request message associated with a consumer conducting a transaction with a portable consumer device. A challenge message is sent to the consumer, where the challenge message is dynamic or semi-dynamic. A challenge response message is received from the consumer, and an authorization response message is sent to the consumer. The authorization response message indicates whether or not the transaction is authorized.
摘要:
Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Payment information can be sent directly from a consumer to a non-merchant, thereby allowing no new entities to obtain the payment information. Transaction identifiers can be used to facilitate communications among the entities. The payment information can be sent to the non-merchant via a merchant application with a submit payment button directed to the non-merchant so little or no deviations from standard practices are required.
摘要:
Systems and methods for service activation using algorithmically defined keys are disclosed. A consumer who has a relationship with a first party may wish to enroll in a service provided by a third party. The first party can maintain control of such enrollments through the use of algorithmically defined keys. The algorithmically defined keys also allow the third party service provider to verify data provided by the consumer as matching data stored by the first party. The verification provides for data synchronization without requiring the third party to have access to the first parties data systems.
摘要:
A method and a system that retrieves dynamic data when a notification with dynamic data is triggered. The dynamic data is associated with an account that is associated with a portable consumer device associated with a consumer. The method and system automatically send the notification with the dynamic data to a notification device, wherein the notification with the dynamic data is provided to the consumer.
摘要:
Methods, devices, and systems are described for bumping a mobile device, such as a smart phone, against a fixed poster board display at a store to initiate a download of coupons, advertisements, or other benefits to the mobile device. Products can be rated by a user's up/down bump or other bump patterns. Using accelerometer-based inertial measurements, multiple users can control multiple mouse cursors on a large display with their mobile devices in order to select information to be downloaded to their mobile devices.
摘要:
A method is disclosed. It includes displaying, by a device, an authentication image including a plurality of image elements comprising a set of image elements, wherein the image elements in the set of image elements are located at a set of positions on a display screen. The method also comprises receiving, at the device, a glyph having a configuration corresponding to the set of image elements from a user while the authentication image is displayed. The method further comprises determining if the glyph is authentic, and initiating a payment transaction after receiving the glyph.
摘要:
Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Challenge questions may be presented from the non-merchant to the consumer after receiving the payment information, thereby allowing a judicious determination of when to ask such challenge questions and allowing complex and probative questions. The time limit for such challenge questions may advantageously be unconstrained, while still preserving security. Also, a risk analysis may be started prior to the consumer submitting payment information, thus allowing an efficient and complex risk analysis. Information about an access device used by the consumer may be obtained at the non-merchant from the access device with code sent to the access device from the merchant, and the device information may be used in the risk analysis.
摘要:
A phone used in an authentication process. The phone includes a processor, a display coupled to the processor, and a computer readable medium coupled to the processor. The computer readable medium includes (i) code for displaying a first authentication image including a plurality of image elements including a set of image elements, where the image elements in the set of image elements are located at a first set of positions on a display screen, (ii) code for receiving a first glyph having a first configuration corresponding to the set of image elements from a user while the first authentication image is displayed, (iii) code for displaying a second authentication image including the plurality of image elements including the set of image elements, where the image elements in the set of image elements are located at a second set of positions on the display screen, where the second set of positions is different than the first set of positions, and (iv) code for receiving a second glyph having a second configuration corresponding to the set of image elements from a user while the second authentication image is displayed.
摘要:
Systems, methods and devices for making and using EMF signature enabled portable consumer devices are disclosed. EMF signature enabled portable consumer devices, such as credit cards, can include a conductive or semiconductive brittle material layer with an intentionally created random crack or fissure pattern. The intentionally created unique random crack patterns can be created by cost effective and highly scalable standardized processes. When an input signal is applied to the portable consumer device, an EMF signature based on the unique random crack pattern can be induced. The resulting EMF signature can be detected, processed and used as the basis for various encryption, security or authentication protocols.
摘要:
Embodiments of the present invention are directed to systems, apparatuses and methods for using a mobile device with an accelerometer to gain access into a secured or restricted area. A first device and a second device interact by making physical contact with each other thereby generating interaction data that is representative of the physical interaction between the first and second device. The first and second device may be mobile phones. The second device may be a point of sale terminal, access point device, or any other stationary (i.e., in a fixed position) device positioned at a line, door, gate, or entrance. A server computer determines, based on interaction data, that the first device and the second device made physical contact. After determining that the first device and the second device made contact, communications may be initiated between the devices. Communications may relate an access transaction comprising an exchange of information, such as credentials, between a prospective entrant (operating the first device) and a gatekeeper (operating the second device) to verify that the prospective entrant is permitted or is not permitted access to a particular area that is secured or restricted by the gatekeeper. Other embodiments are direct to confirmation transactions. Access transaction and confirmation transactions may be combined with a financial transaction using a payment processing network.