SYSTEMS AND METHODS FOR SECURE REPROVISIONING

    公开(公告)号:US20250078069A1

    公开(公告)日:2025-03-06

    申请号:US18242389

    申请日:2023-09-05

    Abstract: Systems and methods for authentication may include a first device having an association with a first account, including a memory containing one or more applets, a counter value, and transmission data, a communication interface, and one or more processors in communication with the memory and communication interface. The first device may create a cryptogram based on the counter value, wherein the cryptogram includes the counter value and the transmission data. The first device may transmit, after entry of the communication interface into a communication field, the cryptogram, and update, after transmission of the cryptogram, the counter value. The first device may receive, via the communication interface, one or more encrypted keys and one or more parameters. The first device may decrypt the one or more encrypted keys and, after decryption of the one or more encrypted keys, switch an association from the first account to a second account.

    SYSTEMS AND METHODS FOR MACHINE LEARNING-BASED TARGETED LINK SHARING

    公开(公告)号:US20250029134A1

    公开(公告)日:2025-01-23

    申请号:US18353242

    申请日:2023-07-17

    Abstract: Disclosed are methods and systems for targeted link sharing. For instance, a sharable link may be detected on a sharing user's computing device, and one or more users associated with the sharing user may be determined to be suitable to use the link. For each suitable user, an interaction history of the user, a code use behavior of the user, and information associated with the code are provided as inputs to a trained machine learning system to obtain, as output, a likelihood that the user uses the code. Each suitable user determined to have the output meet a predefined criterion may be included in a list of receiving users for display within a notification on the sharing user's computing device. The link may be distributed to a computing device of at least one receiving user selected from the list to share the link.

    SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS

    公开(公告)号:US20240422002A1

    公开(公告)日:2024-12-19

    申请号:US18738330

    申请日:2024-06-10

    Abstract: Example embodiments of systems and methods for data transmission between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device. The receiving device can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

    MULTI-FACTOR AUTHENTICATION PROVIDING A CREDENTIAL VIA A CONTACTLESS CARD FOR SECURE MESSAGING

    公开(公告)号:US20240397316A1

    公开(公告)日:2024-11-28

    申请号:US18790346

    申请日:2024-07-31

    Abstract: Exemplary embodiments may use a contactless card as a secondary form of authentication in a multi-factor authentication for a secure messaging service. The recipient party of a request to initiate a messaging service session (such as a server computing device) may be programmed to use the phone number of the originating device to look up records regarding an identity of a party and their associated phone number as a primary credential and then may require an authentication credential originating from the contactless card as a secondary credential for the initiating party. In some instances, the credential originating from the contactless card is a onetime password that is valid only for a period of time. The recipient party determines whether the onetime password is valid. If both credentials are valid, a secure messaging session may be initiated with the initiating party.

    KEY RECOVERY BASED ON CONTACTLESS CARD AUTHENTICATION

    公开(公告)号:US20240364512A1

    公开(公告)日:2024-10-31

    申请号:US18767089

    申请日:2024-07-09

    CPC classification number: H04L9/0897 H04L9/0819 H04L9/0866 H04L9/0869

    Abstract: Systems, methods, apparatuses, and computer-readable media for key recovery based on contactless card cryptograms. A server may receive, from an application, a request to recover a private key for a digital wallet, the request includes a first cryptogram generated by a contactless card. The server may decrypt the first cryptogram based on a key for the contactless card. The server may determine, based on the decryption, a unique identifier of the contactless card and a diversification factor associated with the digital wallet. The server may generate the private key based on the unique identifier and the diversification factor. The server may transmit the private key to the application via a network.

    SYSTEMS AND METHODS FOR VALIDATING AN INSTRUMENT

    公开(公告)号:US20240330932A1

    公开(公告)日:2024-10-03

    申请号:US18739470

    申请日:2024-06-11

    Abstract: Disclosed are methods and systems for validating instruments. For instance, a request to generate a cashier's check may be received from an application executing on a drawer's computing device. Request information may be stored within a data storage entry for the check, and a code to be printed on the check may be generated to include at least a portion of the request information. Instructions may be provided to a printing system to cause the check to be printed with the code, where the printed check is invalid. Instructions may be provided to the application and/or printing system to cause display of a prompt to facilitate a reading of the code to validate the check. When information within the code is read by and received from the printing system, the check may be validated, which triggers a transfer of funds from the drawer's account. Otherwise, the check may remain invalid.

    SYSTEMS AND METHODS OF SECURE MERCHANT PAYMENT OVER MESSAGING PLATFORM USING A CONTACTLESS CARD

    公开(公告)号:US20240311800A1

    公开(公告)日:2024-09-19

    申请号:US18120513

    申请日:2023-03-13

    CPC classification number: G06Q20/352 G06F9/547 G06Q20/386 G06Q20/401

    Abstract: A method is provided including: receiving, by a server from a user device, a cryptogram of a contactless card, wherein the user device receives a payment request message from a merchant device, and the user device receives the cryptogram from a contactless card upon taping the contactless card to the user device by a user prompted by the payment request message; validating and decrypting, by the server, the cryptogram; extracting, by the server, from the decrypted cryptogram a unique customer identifier associated with the user; verifying, by the server, the unique customer identifier; retrieving, by the server from a database, account information of the user; and calling, by the sever, one or more application programming interfaces (APIs) of the merchant device to make a payment in response to the payment request message; and provisioning, by the server, the account information to the merchant device via the APIs.

    MACHINE LEARNING TO DETECT MISCLASSIFIED ON-CHAIN ADDRESSES

    公开(公告)号:US20240305453A1

    公开(公告)日:2024-09-12

    申请号:US18180263

    申请日:2023-03-08

    CPC classification number: H04L9/0861 G06F21/554 G06N5/022 H04L9/50

    Abstract: A method and related system of operations that include retrieving a set of on-chain transactions of an on-chain address from a scan of on-chain transactions based on a request identifying the on-chain address and generating a sequence of embedding vectors by providing the set of on-chain transactions to a first machine learning model. The method further includes predicting a first use pattern of the on-chain address by providing the sequence of embedding vectors to a second machine learning model and determining whether the first use pattern matches with a second use pattern. The method further includes updating a record of the on-chain address in an off-chain database to indicate anomalous activity in response to a determination that the first use pattern does not match with the second use pattern.

Patent Agency Ranking