Abstract:
Methods, systems, and computer program products for providing transaction verification through enhanced authentication are provided. A method performed by a computer system may include receiving one or more credentials to authenticate an application programming interface request received from a second computer system based on a first level of authentication, generating an additional authentication challenge to further authenticate the application programming interface request in response to detecting a change associated with the second computer system, issuing the additional authentication challenge to the second computer system, and processing the application programming interface request based on a result of the additional authentication challenge.In some examples, the additional authentication challenge may be encrypted using a key associated with the second computer system before issuance the additional authentication challenge. For example, the key may be a public key corresponding to a private key stored in a highly secure area on the second computer system.
Abstract:
Systems and methods for authenticating requests to use an Application Programming Interface (“API”) are described. In some embodiments, a request to use an API is received. Based on a comparison of the request to use the API with a pattern of activity associated with the client, a determination is made whether the client deviates from an expected behavior. Once a determination that the client deviates from the expected behavior is made, an authentication challenge is generated and issued. In some embodiments, the comparison of the request to use the API with a pattern of activity involves comparing transactional attributes of the request to use the API with past client behavior.
Abstract:
Methods, systems, and computer program products for online content referral are provided. A computer-implemented method may include issuing a challenge to an application interacting with a computer system to determine whether activity performed by the application is scripted, analyzing data associated with a result of the challenge to determine whether the result is at least partially correct, and computing a reputation score for the application based on the result of the challenge. A computer-implemented method also may include comparing the reputation score for the application to a threshold for identifying non-scripted activity, and determining that that the activity performed by the application is scripted when the reputation score for the application does not meet the threshold for identifying non-scripted activity.
Abstract:
Systems and methods for authenticating requests to use an Application Programming Interface (“API”) are described. In some embodiments, a request to use an API is issued from a client to a server. One or more credentials for a first-level authentication challenge are provided from the client to the server. Responsive to the server determining that the client deviates from an expected behavior based on comparing the request to use the API with a pattern of activity associated with the client, the client receives a second authentication challenge.
Abstract:
Methods, systems, and computer program products for providing transaction verification through enhanced authentication are provided. A method performed by a computer system may include receiving an application programming interface (API) request from a client, detecting a change associated with the API request as compared to a prior use of the API by the client, generating an encrypted challenge to authenticate the API request based on detecting the change, and issuing the encrypted challenge to the client to authenticate the API request.
Abstract:
Methods, systems, and computer program products for providing transaction verification through enhanced authentication are provided. A method performed by a computer system may include receiving an application programming interface (API) request from a client, detecting a change associated with the API request as compared to a prior use of the API by the client, generating an encrypted challenge to authenticate the API request based on detecting the change, and issuing the encrypted challenge to the client to authenticate the API request.
Abstract:
Methods, systems, and computer program products for providing transaction verification through enhanced authentication are provided. A method performed by a computer system may include receiving one or more credentials to authenticate an application programming interface request received from a second computer system based on a first level of authentication, generating an additional authentication challenge to further authenticate the application programming interface request in response to detecting a change associated with the second computer system, issuing the additional authentication challenge to the second computer system, and processing the application programming interface request based on a result of the additional authentication challenge.In some examples, the additional authentication challenge may be encrypted using a key associated with the second computer system before issuance the additional authentication challenge. For example, the key may be a public key corresponding to a private key stored in a highly secure area on the second computer system.
Abstract:
Systems and methods for authenticating requests to use an Application Programming Interface (“API”) are described. In some embodiments, a request to use an API is received. Based on a comparison of the request to use the API with a pattern of activity associated with the client, a determination is made whether the client deviates from an expected behavior. Once a determination that the client deviates from the expected behavior is made, an authentication challenge is generated and issued. In some embodiments, the comparison of the request to use the API with a pattern of activity involves comparing transactional attributes of the request to use the API with past client behavior.
Abstract:
Methods and systems for authenticating a transaction are described. A user provides a user account and contact information to a merchant, and the merchant transmits this information to a service provider. The service provider generates an access token for the transaction and sends it to the contact information. The service provider also sends a notification to the user account. The user provides the access token to the service provider. The service provider confirms the access token, and processes the payment.