Method and System for Detecting Two-Factor Authentication

    公开(公告)号:US20230155999A1

    公开(公告)日:2023-05-18

    申请号:US18052747

    申请日:2022-11-04

    CPC classification number: H04L63/083 G06F9/547

    Abstract: Embodiments disclosed herein generally related to a system and method for assessing a fraud risk. In one embodiment, a method for assessing a fraud risk is disclosed herein. A web browser extension executing on the computing device identifies an account associated with the computing device. The web browser extension detects that the computing device navigated to a web page hosted by a third party server. The web browser extension determines that the third party server prompted the computing device to opt into two-factor authentication functionality. The web browser extension determines that the computing device did not opt into the two-factor authentication functionality. The web browser extension prompts, via an application programming interface (API), an organization computing system to update a fraud metric associated with the account.

    Tap card to securely generate card data to copy to clipboard

    公开(公告)号:US11544717B2

    公开(公告)日:2023-01-03

    申请号:US17382541

    申请日:2021-07-22

    Abstract: A web browser may output a form comprising a payment field. A URL may be received from a communications interface of a contactless card, the URL comprising encrypted data generated by the contactless card based on a private key stored in a memory of the contactless card. An application may transmit the encrypted data to an authentication server, which may decrypt the encrypted data based on the private key. The application may receive, from a virtual account number server, a virtual account number. The application may receive an expiration date and a CVV. The application may copy the virtual account number to a clipboard of an OS. The OS may paste the virtual account number from the clipboard to the payment field of the form in the web browser. The OS may output a notification comprising the expiration date and the CVV associated with the virtual account number.

    SYSTEMS AND METHODS FOR AUTOMATICALLY PERFORMING SECONDARY AUTHENTICATION OF PRIMARY AUTHENTICATION CREDENTIALS

    公开(公告)号:US20220182380A1

    公开(公告)日:2022-06-09

    申请号:US17679259

    申请日:2022-02-24

    Abstract: The disclosed technology includes systems and methods for determining secondary authentication of a user's log-in attempts by comparing received behavioral biometric data and/or received scenario-specific data to saved behavioral biometric data and/or saved scenario-specific data, respectively. Responsive to determining that the received behavioral biometric data and/or received scenario-specific data is above a predetermined threshold of similarity with respect to the saved behavioral biometric data and/or saved scenario-specific data, respectively, the systems and methods can determine that the corresponding log-in attempt is secondarily authenticated. of a user device via behavioral biometric data. Responsive to determining that the level of similarity is not above the predetermined threshold, the systems and methods can initiate a secondary authentication method and can associate the received behavioral biometric data with a second user model.

    Systems and methods data transmission using contactless cards

    公开(公告)号:US11321546B2

    公开(公告)日:2022-05-03

    申请号:US16942205

    申请日:2020-07-29

    Abstract: Example embodiments of systems and methods for data transmission between a contactless card and a receiving application are provided. The transmitting device may include a processor, memory, and communication interface. A receiving application may include instructions for execution on a receiving device having a processor, a memory, a communication interface configured to create a communication field for data communication with the transmitting device, and one or more sensors. Upon movement of the transmitting device, the receiving application is configured to receive, via one or more sensors, feedback information associated with the transmitting device, display one or more instructions regarding the position of the transmitting device relative to the receiving device until the transmitting device enters the communication field. Upon entry into the communication field, the transmitting device is configured to transmit data to the receiving device.

    COMPUTER-BASED SYSTEMS WITH PROGRAMMED AUTOMATIC REAL-TIME UPDATABLE BROWSING DATA OBJECTS AND ACTIVITY DATA OBJECTS AND METHODS OF USE THEREOF

    公开(公告)号:US20210232672A1

    公开(公告)日:2021-07-29

    申请号:US16902538

    申请日:2020-06-16

    Abstract: In order to provide improved matching of records between different sources, systems and methods include generating a data link between a stored interaction profile of the user and activity data records that identify activities performed by the user. Online interaction data associated with the user is received, including tracking data indicative of online interactions with content. The online interaction data is stored in the stored interaction profile associated with the user. An activity model is used to predict correlation parameters representing groupings of online interactions of the online interaction data with activities performed by the user, where the prediction is based on the tracking data and each activity in the interaction profile. The interaction profile is updated with the groupings and user activities are authenticated based on the interaction profile.

    Management of login information affected by a data breach

    公开(公告)号:US11068583B2

    公开(公告)日:2021-07-20

    申请号:US16839220

    申请日:2020-04-03

    Abstract: A device determines that a data breach of an application has been reported and determines that an individual has an account with the application based on identifying an association between an application identifier and a username the individual uses to access the application. The device receives, from a user device associated with the individual, password information used to access the application. The device uses the password information and usernames for a group of applications with which the individual has accounts to perform a login procedure for the group of applications to determine that login information for one or more of the applications includes the password information used to access the application affected by the data breach. The device provides, to the user device or another device, a recommendation to change the password information used to access the application and the one or more applications.

Patent Agency Ranking