METHOD AND SYSTEM FOR INTEGRATING IDENTITY PROVIDER

    公开(公告)号:US20240265087A1

    公开(公告)日:2024-08-08

    申请号:US18569094

    申请日:2022-06-22

    IPC分类号: G06F21/44

    CPC分类号: G06F21/44

    摘要: A method includes a computer receiving a request to conduct an interaction from a mobile device. The computer obtains a computer address and provides the computer address to the mobile device. The mobile device provides an access request to the computer address, and the access request is thereafter routed to an identity provider computer. The identity provider computer identifies identity data associated with the mobile device or a user of the mobile device. The computer obtains the identity data or a derivative of the identity data from the identity provider computer. The computer determines if the identity data or the derivative of the identity data matches previously stored identity data or a previously stored derivative of identity data. If a match is determined, the computer provides a list of user device identifiers to the mobile device.

    Systems and methods for device push provisoning

    公开(公告)号:US10243958B2

    公开(公告)日:2019-03-26

    申请号:US15402095

    申请日:2017-01-09

    IPC分类号: H04L29/06 H04W12/04 H04W88/02

    摘要: Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data.

    Use of web authentication to enhance security of secure remote platform systems

    公开(公告)号:US12126614B2

    公开(公告)日:2024-10-22

    申请号:US17764123

    申请日:2020-11-12

    IPC分类号: H04L9/40 H04L9/08 H04L9/32

    摘要: A method includes receiving, by a universal authentication application from a resource provider computer, a user credential verification request message comprising a user identifier, server computer data, and interaction data for an interaction. The universal authentication application transmits the user credential verification request message to a browser that invokes the authenticator to verify biometric information of a user. The universal authentication application receives a user credential verification response message from the authenticator. The user credential verification response message includes signed interaction data. The universal authentication application sends the user credential verification response message to the resource provider computer. The resource provider computer provides at least the signed interaction data to a plurality of server computers to retrieve a plurality of portable device credentials respectively associated with the plurality of server computers.

    Systems and methods for code display and use

    公开(公告)号:US11080696B2

    公开(公告)日:2021-08-03

    申请号:US15421891

    申请日:2017-02-01

    摘要: Embodiments of the present invention relate to systems and methods that allow users to use their communication devices to perform transactions (e.g., payment transactions, access transactions, etc.). To complete a transaction, a resource provider electronically generates a code representing transaction data and displays it on an access device. The user scans the code with his or her communication device using a camera associated with the communication device, for example. The code is interpreted by an application on the communication device. The user may request and receive a token at the communication device corresponding to sensitive information selected to perform the transaction (e.g., a primary account number). The user may then provide the token and the transaction data via the communication device to a server computer, which may facilitate completion of the transaction between the user and the resource provider using the transaction data and the token.

    Authentication systems and methods using location matching

    公开(公告)号:US10922672B2

    公开(公告)日:2021-02-16

    申请号:US15431235

    申请日:2017-02-13

    摘要: According to some embodiments of the invention, an authentication method is provided. Transaction data for a transaction is received at a communication device from an access device or a resource provider. The transaction data comprises a location of the access device. A location of the communication device is determined by the communication device. It is determined whether a distance between the location of the access device and the location of the communication device is within a predetermined threshold. The transaction is not authorized if the distance between the location of the access device and the location of the communication device is not within a predetermined threshold.

    Systems and methods for device push provisioning

    公开(公告)号:US10911456B2

    公开(公告)日:2021-02-02

    申请号:US16268377

    申请日:2019-02-05

    摘要: Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data.