THE TORONTO-DOMINION BANK Patent applications |
Patent application number | Title | Published |
20160132670 | SYSTEMS AND METHODS FOR AUTHENTICATING USER IDENTITY BASED ON USER-DEFINED IMAGE DATA - The disclosed embodiments include computerized methods and systems that facilitate two-factor authentication of a user based on a user-defined image and information identifying portions of the image sequentially selected by the user. In one aspect, a communications device presents a first digital image of a first user on a touchscreen display. The communications device may receive, from the first user, information identifying portions of the first digital image selected in accordance with a candidate authentication sequence established by the first user. The selected first image portions may, for example, be associated with corresponding facial features of the first user. The communications device may determine whether the candidate authentication sequence matches a reference authentication sequence associated with the first digital image, and may authenticate an identity of the first user, when the first selection sequence is determined to match the second selection sequence. | 05-12-2016 |
20160092870 | SYSTEMS AND METHODS FOR GENERATING AND ADMINISTERING MOBILE APPLICATIONS USING PRE-LOADED TOKENS - The disclosed embodiments include computerized methods and systems that provide mobile application programs to devices of users and that administer these mobile application programs using tokens “pre-loaded” with data. In one aspect, the disclosed embodiments may generate a mobile payment product, such as a mobile wallet, that is “pre-loaded” with eligible financial products. For example, the disclosed embodiments may receive a request from a user device to obtain an application program that administers the mobile wallet, and in response to the received request, may obtain information identifying one or more financial products eligible for inclusion in the mobile wallet. The disclosed embodiments may generate a mobile wallet token based on the eligible financial product information and store the mobile wallet token in cloud-based storage. The user device may, upon authenticating the user, obtain the mobile wallet token and provision the mobile wallet with the eligible financial products. | 03-31-2016 |
20160092869 | SYSTEMS AND METHODS FOR ADMINISTERING MOBILE APPLICATIONS USING PRE-LOADED TOKENS - The disclosed embodiments include computerized methods and systems that enable users to delegate a functionality of a mobile application through pre-loaded tokens. In one aspect, the disclosed embodiments may temporarily delegate or “loan” financial products loaded into a mobile wallet of a user to other eligible users. For example, the disclosed embodiments may receive, from a first user, a request to delegate a financial product to a second user to complete purchase transactions. In response to the received request, the disclosed embodiments may identify one or more temporal or financial conditions on the delegation, and may generate a corresponding mobile wallet token for transmission to a second user device. The second user device may, for example, process the mobile wallet token and establish the delegated financial provide in the second user's mobile wallet in accordance with the at least one of the temporal or financial conditions. | 03-31-2016 |
20160092867 | SYSTEMS AND METHODS FOR ADMINISTERING MOBILE APPLICATIONS USING PRE-LOADED TOKENS - The disclosed embodiments include computerized methods and systems that administer mobile application programs using tokens “pre-loaded” with data. For example, the disclosed embodiments may adaptively identify and pre-load mobile wallets with loyalty products of potential interest to customers. In one aspect, the disclosed embodiments may identify one or more loyalty products that may be of potential interest to a user, and further, that may be missing from the user's mobile wallet. The disclosed embodiments may determine that the user fails to hold a corresponding one of the missing loyalty products, and may transmit user information to an issuer system as a request to acquire the corresponding missing loyalty product from an issuer. Upon receipt of information confirming the acquisition of the corresponding missing loyalty product, the disclosed embodiments may generate a token based on the newly-acquired loyalty product and push the token to a user device. | 03-31-2016 |
20160028715 | SYSTEMS AND METHODS FOR AUTHENTICATING USER IDENTITIES IN NETWORKED COMPUTER SYSTEMS - The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network. | 01-28-2016 |
20160027009 | SYSTEMS AND METHODS FOR AUTHENTICATING USER IDENTITIES IN NETWORKED COMPUTER SYSTEMS - The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network. | 01-28-2016 |
20160019641 | MULTIPLE PARTY BRANCH RECOMMENDATION - A method and system for recommending a physical location at which to complete an electronic activity are disclosed. In some examples, initiation of the electronic activity by a user at a first physical location is detected, that the electronic activity is to be completed at a physical location different from the first physical location at least in part because completion of the electronic activity requires the user and one or more other parties is determined, one or more portions of the electronic activity that remain incomplete are determined, a second physical location at which to complete the one or more incomplete portions of the electronic activity is identified, and information about the electronic activity is provided to the one or more other parties. | 01-21-2016 |
20160019640 | BRANCH RECOMMENDATION - A method and system for recommending a physical location at which to complete an electronic activity are disclosed. In some examples, initiation of the electronic activity by a user at a first physical location is detected, that the electronic activity is to be completed at a physical location different from the first physical location is determined, one or more portions of the electronic activity that remain incomplete are determined, a second physical location at which to complete the one or more incomplete portions of the electronic activity is identified, and information about the electronic activity is provided to the second physical location. In some examples, the identification of the second physical location is based on at least characteristics of the electronic activity, the user, and/or the second physical location. | 01-21-2016 |
20150379644 | SYSTEMS AND METHODS FOR IDENTIFYING AND REMEDYING ACCOUNT ERROR EVENTS IN NETWORKED COMPUTER SYSTEMS - The disclosed embodiments include computerized methods and system for detecting error events, such as account shortfalls, within networked computer systems operated by the financial institutions and other business entities. In one aspect, a system includes a memory storing instructions and one or more processors configured to execute the instruction to perform operating, such as receiving a payment request for a payment amount from a first account of a user to a destination account. The operations may also include determining that the first account lacks sufficient funds to cover the payment amount, and determining that the user has pre-approved a credit line account secured by a first set of investment holdings of the user that generate revenue that is periodically transferred to the first account. The operations may also include performing a fund transfer operation for the payment amount from the credit line account to the first account. | 12-31-2015 |
20150379485 | SYSTEMS AND METHODS FOR IDENTIFYING AND REMEDYING ACCOUNT ERROR EVENTS IN NETWORKED COMPUTER SYSTEMS - The disclosed embodiments include methods and system for detecting error events, such as account shortfalls, within networked computer systems operated by the financial institutions and other business. In one aspect, a system includes a memory storing instructions and one or more processors configured to execute the instruction to perform operating, such as receiving a payment request for a payment amount from a first account of a user to a destination account. The operations may also include determining that the first account lacks sufficient funds to cover the payment amount, and determining that the user has pre-approved credit facility secured by a first set of investment holdings of the user that generate revenue that is periodically transferred to the first account. The operations may also include performing a fund transfer operation for the payment amount from the credit line account to the first account. | 12-31-2015 |
20150348042 | SYSTEMS AND METHODS FOR PROVIDING MERCHANT FRAUD ALERTS - Mobile communications devices, systems and methods are provided for identifying a risk of fraudulent activity associated with a merchant before a user executes a transaction with the merchant. In an embodiment, a mobile communications device obtains first information identifying prior instances of fraudulent activity associated with a merchant. The mobile communications device may determine a level of risk of fraudulent activity associated with the merchant based on the obtained first information, and may identify, based on the determined risk level, one or more payment instruments and associated incentives appropriate for financial services transactions involving the merchant. The mobile communications device may present, to a user, a notification including the identified payment instruments and associated incentives prior to execution of a transaction between the user and the merchant. | 12-03-2015 |
20150288702 | SYSTEMS AND METHODS FOR PROVIDING INFORMATION-TECHNOLOGY ASSETS IN AN OPEN ENVIRONMENT - The disclosed embodiments include methods and systems for providing information-technology (IT) assets in an open environment. In certain aspects, an IT system may provide an online portal that presents an IT self-serve store of IT assets that a user may select for access or use. The IT system may, for example, determine that the selected IT assets comply with one or more compliance and permissioning policies, and based on the determination, may assemble the selected IT assets to generate or “spin-up” instances of applications executable by various hardware platforms. The IT system may also perform processes that perform automated operations relating to certain IT assets, such as testing, modeling, recommendations, etc. | 10-08-2015 |
20150262183 | SYSTEMS AND METHODS FOR PROVIDING POPULATED TRANSACTION INTERFACES BASED ON SYSTEM-GENERATED TRIGGERS - The disclosed embodiments include methods and systems that automatically populate interfaces facilitating electronic transactions. In one embodiment, a system may detect an system-generated event triggering an account transfer transaction. The system may also determine a first account associated with a first user based on the detected event, and determine a second account based on the detected event and a set of rules associated with the first user. The system may generate, based on the detected event and the set of rules, first information used to provide prefilled content identifying the first account as a source account and the determined second account as a destination account. The system may also generate, in response to an authorization, second information used to provide second content including a notification that a transfer of funds from the first account to the second account has occurred. | 09-17-2015 |
20150262182 | SYSTEMS AND METHODS FOR PROVIDING POPULATED TRANSACTION INTERFACES BASED ON CONTEXTUAL TRIGGERS - The disclosed embodiments include methods and systems that automatically populate interfaces facilitating electronic transactions. In one embodiment, a system may identify a contextual event triggering an account transfer transaction. The system may also determine a first account associated with a first user based on the contextual event, and determine a second account based on the contextual event and a set of rules associated with the first user. The system may generate, based on the detected event and the set of rules, first information used to provide prefilled content identifying the first account as a source account and the determined second account as a destination account. The system may also generate, in response to an authorization, second information used to provide second content including a notification that a transfer of funds from the first account to the second account has occurred. | 09-17-2015 |
20150262181 | SYSTEMS AND METHODS FOR PROVIDING POPULATED TRANSACTION INTERFACES BASED ON USER-GENERATED TRIGGERS - The disclosed embodiments include methods and systems that automatically populate interfaces facilitating electronic transactions. In one embodiment, a system may detect an action of a first user that triggers an account transfer transaction. The system may also determine a first account associated with the first user based on the detected action, and determine a second account based on the detected action and a set of rules associated with the first user. The system may generate, based on the detected event and the set of rules, first information used to provide prefilled content identifying the first account as a source account and the determined second account as a destination account. The system may also generate, in response to an authorization, second information used to provide second content including a notification that a transfer of funds from the first account to the second account has occurred. | 09-17-2015 |
20150193869 | SYSTEMS AND METHODS FOR PROVIDING BALANCE NOTIFICATIONS TO CONNECTED DEVICES - The disclosed embodiments include methods and systems for providing account and event status notifications. The disclosed embodiments include, for example, a communications device including a memory storing software instructions and one or more processors configured to execute the software instructions to perform operations. In one aspect, the operations may include receive a notification of a status of an account parameter. The operations may also include identifying a device eligible to access the notification in accordance with a user-specified data restriction, and identifying at least a portion of the notification that is consistent with the data restriction. The communications device provide the identified portion of the notification to the eligible device without receiving input from the user, and the eligible device may present at least one of a visual, audible, or tactile indicator of the status of the account parameter. | 07-09-2015 |
20150193868 | SYSTEMS AND METHODS FOR PROVIDING BALANCE AND EVENT NOTIFICATIONS - The disclosed embodiments include methods and systems for providing account and event status notifications. The disclosed embodiments include, for example, a device including a memory storing software instructions and one or more processors configured to execute the software instructions to perform operations. In one aspect, the operations may include obtaining information identifying an event and a deadline specified by a user. The obtained information may link the event and deadline to corresponding user-specified temporal intervals. The operations may also include determining whether a current date falls within a time period prior to the deadline, the time period being established by the first temporal interval. When the current date falls within the time period, the operations may generate first notification information that, when presented via a client device in accordance with a user-specified indicator type, notified the user that the current sate falls within the first time period. | 07-09-2015 |
20150193867 | SYSTEMS AND METHODS FOR PROVIDING BALANCE NOTIFICATIONS IN AN AUGMENTED REALITY ENVIRONMENT - The disclosed embodiments include methods and systems for providing account status notifications. The disclosed embodiments include, for example, a device for providing account status notifications including a memory storing software instructions and one or more processors configured to execute the software instructions to perform operations. In one aspect, the operations may include receiving account status notification information for a first account associated with a user. The account status notification information may be generated based on one or more notification rules and account information associated with the first account. The operations may also include generating, based on the received account status notification information, a first account status indicator that provides a status of a first account parameter associated with the first account that is presented, via a device component and within a field-of-view of the user, without a user request to receive the status of the first account parameter. | 07-09-2015 |
20150193866 | SYSTEMS AND METHODS FOR PROVIDING BALANCE NOTIFICATIONS - The disclosed embodiments include methods and systems for providing account status notifications. The disclosed embodiments include, for example, a device for providing account status notifications including a memory storing software instructions and one or more processors configured to execute the software instructions to perform operations. In one aspect, the operations may include receiving account status notification information for a first account associated with a user. The account status notification information may be generated based on one or more notification rules and account information associated with the first account. The operations may also include generating, based on the received account status notification information, a first account status indicator that provides a status of a first account parameter associated with the first account that is presented via a device component without a user request to receive the status of the first account parameter. | 07-09-2015 |
20150100519 | SYSTEMS AND METHODS FOR IDENTIFYING PRODUCT RECOMMENDATIONS BASED ON INVESTMENT PORTFOLIO DATA - The disclosed embodiments include, for example, systems and methods for providing recommendations of one or more alternative products to a user based on investment portfolio data. In one aspect, the disclosed embodiments may include a system that is configured to obtain information associated with one or more products of interest to the user. In certain aspects, the obtained information may identify a product previously purchased by the user, one or more products that form a shopping list of the user, and/or a product identified by the user as a potential purchase. The system may be configured to identify one or more alternative products that are similar to the products of interest and that are related to one or more securities associated with an investment portfolio of the user. | 04-09-2015 |
20150100495 | Systems and Methods for Providing Tokenized Transaction Accounts - The disclosed embodiments include methods and systems for providing tokenized transaction accounts. In one embodiment, a computer-implemented method is provided that may include generating, by one or more processors, a first tokenized transaction account from a first transaction account associated with a first user. The method may also include providing the first tokenized transaction account to a client device associated with the first user for storage in the client device and use in transactions. The method may also include updating the first tokenized transaction account based on one or more conditions and providing the updated first tokenized transaction account to the client device for storage and use in a subsequent transaction. | 04-09-2015 |
20150100456 | SYSTEMS AND METHODS FOR IDENTIFYING PRODUCT RECOMMENDATIONS BASED ON INVESTMENT PORTFOLIO DATA - The disclosed embodiments include, for example, systems and methods for providing recommendations of one or more alternative products to a user based on investment portfolio data. In one aspect, the disclosed embodiments may include a system that is configured to receive an identifier of a product prior to a purchase of the product by a user, and determine parameters associated with the product based on the received product identifier. In certain aspects the system may be configured to identify an alternative product associated with at least one of the product parameters and at least one of a plurality of securities associated with the investment portfolio of the user. The system may also be configured to perform a process that causes transmission of information identifying the alternative product for presentation on a device of the user. | 04-09-2015 |
20150100443 | Systems and Methods for Providing Enhanced Point-Of-Sale Services Involving Multiple Financial Entities - Systems and methods are provided for identifying enhanced services for presentation to a user at a point-of-sale terminal. The disclosed embodiments include, for example, a system that may be configured to receive a request to authenticate a purchase transaction that identifies a financial service account and a point-of-sale terminal. The system may be configured to determine an issuer of the user's account and to obtain, from the issuer, information identifying one or more first services offered by the issuer. The server may be further configures to transmit, to a point-of-sale device, information identifying the at least one of the first services available to the user | 04-09-2015 |
20150100442 | Systems and Methods for Providing Enhanced Point-Of-Sale Services - Systems and methods are provided for identifying enhanced services for presentation to a user at a point-of-sale terminal. The disclosed embodiments include, for example, a system that may be configured to receive a request to authenticate a purchase transaction that identifies a financial service account and a point-of-sale terminal. The system may be configured to determine, based on the request, whether an issuer of the user's account corresponds to a provider associated with the point-of-sale terminal. The server may also be configured to identify one or more services available to the user, when the issuer corresponds to the provider, and provide information identifying the services to the point-of-sale terminal. | 04-09-2015 |
20150100404 | Systems and Methods for Identifying Product Recommendations Based On Investment Portfolio Data - The disclosed embodiments include, for example, systems and methods for providing recommendations of one or more alternative products to a user based on investment portfolio data. In one aspect, the disclosed embodiments may include a system that is configured to obtain information associated with one or more products of interest to the user. In certain aspects, the obtained information may identify a product previously purchased by the user, one or more products that form a shopping list of the user, and/or a product identified by the user as a potential purchase. The system may be configured to identify one or more alternative products that are similar to the products of interest and that are related to one or more securities associated with an investment portfolio of the user. In one aspect, the system may be configured to generate one or more instructions to transmit information identifying the one or more alternatives product to a device of the user. | 04-09-2015 |
20150095263 | SYSTEMS AND METHODS FOR ADMINISTERING INVESTMENT PORTFOLIOS BASED ON TRANSACTION DATA - The disclosed embodiments include systems and methods for administering actual and virtual investment portfolios based on transaction data associated with one or more users. The disclosed embodiments may be configured to modify an investment risk tolerance of a user based on transaction data identifying one or more first products purchased by the user and one or more prior financial services transactions associated with the user. The disclosed embodiments may also be configured to identify one or more first securities based on a portion of the transaction data and the modified investment risk tolerance. In certain aspects, the identified first securities may be related to at least one of the purchased products. | 04-02-2015 |
20150095261 | SYSTEMS AND METHODS FOR ADMINISTERING INVESTMENT PORTFOLIOS BASED ON TRANSACTION DATA - The disclosed embodiments include systems and methods for administering actual and virtual investment portfolios based on transaction data associated with one or more users. The disclosed embodiments may be configured to modify an investment risk tolerance of a user based on transaction data identifying one or more first products purchased by the user and one or more prior financial services transactions associated with the user. The disclosed embodiments may also be configured to identify one or more first securities based on a portion of the transaction data and the modified investment risk tolerance. In certain aspects, the identified first securities may be related to at least one of the purchased products. | 04-02-2015 |
20150095216 | METHODS AND SYSTEMS FOR DETERMINING AND PROVIDING NEGATIVE EVENT NOTIFICATIONS - The disclosed embodiments include systems and methods for determining and providing notifications of negative events. The disclosed embodiments include, for example, a computer-implemented method for determining negative events. The method may include collecting, by one or more processors, prior financial transaction information associated with a user. The method may also include determining a transaction pattern associated with the user based on the collected financial transaction information. In another aspect, the method may include determining a negative event reflecting a deviation from the transaction pattern associated with the user, the deviation being a nonoccurrence of an expected financial transaction consistent with the transaction pattern. The method may also include providing a notification identifying the deviation. | 04-02-2015 |
20150095206 | SYSTEMS AND METHODS FOR PROVIDING TRANSACTION COMPLETION ALERTS - Systems and methods are provided for identifying interrupted transactions and automatically completing interrupted transactions based on responses to transaction completion alerts. The disclosed embodiments may include a server that may obtain one or more first terms of a transaction from a customer. The server may be configured to identify an interruption in an execution of the transaction, and determine, in response to the identified interruption, whether the first transaction terms include a predetermined subset of second transaction terms used to execute the transaction. The server may also complete the execution of the interrupted transaction when the first transaction terms include at least the predetermined subset of the second transaction terms. | 04-02-2015 |
20150095150 | SYSTEMS AND METHODS FOR ADMINISTERING INVESTMENT PORTFOLIOS BASED ON TRANSACTION DATA - The disclosed embodiments include systems and methods for administering actual and virtual investment portfolios based on transaction data associated with one or more users. The disclosed embodiments may be configured to obtain first transaction data associated with a first user and identifying one or more first products purchased by the first user. The disclosed embodiments may also be configured to obtain program data identifying a first loyalty program associated with the first user, and geographic data specifying a geographic region associated with the first user. Additionally, the disclosed embodiments may be configured to identify one or more first securities based on the first transaction data and the obtained program and/or geographic data. The disclosed embodiments may also generate one or more first electronic instructions to transmit information identifying a first set of the one or more first securities to a device of the first user. | 04-02-2015 |
20150095132 | SYSTEMS AND METHODS FOR ADMINISTERING INVESTMENT PORTFOLIOS BASED ON INFORMATION CONSUMPTION - The disclosed embodiments include systems and methods for administering actual and virtual investment portfolios based on social media activities associated with and information consumed by one or more users. The disclosed embodiments may be configured to obtain digital activity data identifying an interaction between the user and one or more social networks, and further, one or more elements of electronic content accessed by the user. The disclosed embodiments may also be configured to identify a loyalty program associated with the user, and a geographic region associated with the user. The disclosed embodiments may also be configured to identify one or more first securities based on the digital activity data, an investment risk tolerance of the user, and at least one or the loyalty program or the geographic region, and to transmit information identifying a first set of the one or more first securities to a user device. | 04-02-2015 |
20140358786 | VIRTUAL CERTIFIED FINANCIAL INSTRUMENT SYSTEM - The disclosed embodiments include systems and methods for issuing a virtual certified financial instrument. The disclosed embodiments may be configured to receive a financial instrument request for a virtual certified financial instrument, generate a payor token and a payee token, generate a reference token from the payor token and the payee token using an algorithm rendering it computationally infeasible for the reference token to be derived from only one of the payor token and the payee token, and uniquely associate the reference token with the virtual certified financial instrument. The disclosed embodiments may also be configured to receive, from the payor device or the payee device, a financial instrument redemption request that includes a composite token, and redeem the virtual financial instrument in accordance with a confirmation that the composite token matches the reference token. | 12-04-2014 |
20140337235 | PERSON-TO-PERSON ELECTRONIC PAYMENT PROCESSING - A method of person-to-person anonymous electronic payment processing may involve a payment processing server receiving from a payor payment device a payment initiation request for a payment from a payor account. The payment initiation request may identify a payment amount and excludes payee particulars and the payee account. The server may also receive from a payee payment device a payment completion request requesting completion of the payment. The payment completion request may include a payee identifier and exclude the payment amount, payor account and payor particulars. The server may confirm that the payment completion request is uniquely associated with the payee payment device and the payee identifier, and determine the payment amount and the payor account by correlating the payment completion request with the payment initiation request. In accordance with an outcome of the confirming, the payment processing server may effect a transfer in the payment amount from the payor account to the payee account. | 11-13-2014 |
20140337225 | BIOMETRIC-BASED TRANSACTION FRAUD DETECTION - A method of identifying potentially fraudulent electronic transactions at an electronic transaction device may involve the transaction device receiving a transaction request for an electronic transaction. The transaction request may include a biometric credential sample and an authentication credential. Upon locating in the transaction history (i) no entry corresponding to the biometric credential sample or (ii) an entry comprising the biometric credential sample in association with the authentication credential, the electronic transaction device may insert into the transaction history a new entry comprising the biometric credential sample in association with the authentication credential and initiates completion of the electronic transaction. Otherwise, the transaction device may insert into the transaction history a new entry comprising the biometric credential sample in association with the authentication credential and generates an alarm signal identifying the electronic transaction as potentially fraudulent. | 11-13-2014 |
20140337171 | SYSTEM AND METHOD FOR CONSUMER-MERCHANT TRANSACTION ANALYSIS - A system, method and computer program product that is capable of determining respective merchant behaviour scores and consumer behaviour scores. Merchant locations (e.g. point of purchase or other geographic or virtual locations), in association with which merchants and consumers conduct transactions, can be used to enhance behaviour scoring capabilities. A merchant location may be attributed a merchant behaviour score such as one determined in accordance with consumer behaviour/financial/risk metrics of consumers who conduct transactions with the location. A specific consumer may be attributed a consumer behaviour score determined in accordance with the respective merchant behaviour scores of locations with which the specific consumer conducts transactions. | 11-13-2014 |
20140108265 | SYSTEM AND METHOD OF AUTHENTICATING A NETWORK GATEWAY - A method of network gateway authenticating involves a network gateway receiving an authentication request from a communications terminal. The communications terminal is in communication with an identity token. The authentication request includes a token cryptogram generated from a cryptographic key stored on the identity token. The network gateway transmits the authentication request to a communications network, and receives an authentication response from the communications network in accordance with a validity of the token cryptogram. The authentication response includes a gateway authentication certificate. The gateway authentication certificate is configured to authenticate the network gateway to a network device of the communications network. | 04-17-2014 |
20130254119 | SYSTEM AND METHOD FOR AUTHENTICATING A NETWORK GATEWAY - A method of network gateway authenticating involves a network gateway receiving an authentication request from a communications terminal. The communications terminal is in communication with an identity token. The authentication request includes a token cryptogram generated from a cryptographic key stored on the identity token. The network gateway transmits the authentication request to a communications network, and receives an authentication response from the communications network in accordance with a validity of the token cryptogram. The authentication response includes a gateway authentication certificate. The gateway authentication certificate is configured to authenticate the network gateway to a network device of the communications network. | 09-26-2013 |
20130254116 | SYSTEM AND METHOD FOR AUTHENTICATING A PAYMENT TERMINAL - A method of authenticating a payment terminal, involves the terminal generating a terminal activation request from a private encryption key and from at least one terminal credential that is uniquely associated with the terminal. The terminal activation request includes a public encryption key. The public encryption key and the private encryption key comprise an asymmetric encryption key pair. The terminal transmits the terminal activation request to a certificate server, and receives an activation response from the certificate server in response. The activation response includes a digital authentication certificate that includes the public encryption key. The terminal authenticates to a computer server, that is distinct from the certificate server, using the digital authentication certificate. | 09-26-2013 |
20130254053 | SYSTEM AND METHOD FOR COMPLETING A TRANSACTION WITH A PAYMENT TERMINAL - A method of completing a transaction with a payment terminal involves the payment terminal transmitting to a network gateway via a first communications network a transaction proposal identifying a proposed transaction with a network device, and receiving from the network gateway a transaction proposal response in response to the transaction proposal. The transaction proposal response specifies a pointer to the proposed transaction. The network gateway is configured to authenticate to the network device via a second communications network that comprises the network device. The payment terminal transmits over a payment network, distinct from the communications networks, payment particulars for the proposed transaction, and receives from the payment network a payment confirmation in response to the payment particulars. In accordance with the payment confirmation, the payment terminal initiates completion of the proposed transaction by generating a transaction completion request and transmitting the transaction completion request to the network device via the network gateway. The transaction completion request is generated from the transaction pointer, and requests completion of the proposed transaction with the network device. | 09-26-2013 |
20130046688 | PURCHASING ALERT METHODS AND APPARATUS - Systems and techniques for receiving transaction information at an authentication system. The transaction information may be processed using different rule sets, based on the financial instrument used for the transaction (for example, a particular credit card, debit card, bank account, brokerage account, and the like). One or more alerts may be generated and communicated to the user. The alerts may be formatted based on user device configuration information, such as a cell phone type, email type, and the like. | 02-21-2013 |