Todd N. Telle - St. Louis MO, US Sue Ellen Moskowitz - New Rochelle NY, US
International Classification:
G06Q 40/00 G06K 5/00
US Classification:
705 44, 235380
Abstract:
A system and computer-based method for using a one-time password (OTP) to authenticate an identity of a cardholder in a financial transaction initiated by the cardholder with a merchant via a first communication medium. A one-time password is generated at an interchange computer system and transmitted to the cardholder via a second communication medium. The cardholder is prompted to enter access credential information, including the one-time password. When the entered access credential information is verified (e.g., the entered one time password is equal to the generated one-time password), a successful authentication is indicated to the merchant.
Systems And Methods For Monitoring Computer Authentication Procedures
- Purchase NY, US Sheryl J. Lock - St. Charles MO, US Sue Ellen Moskowitz - New Rochelle NY, US
International Classification:
H04L 29/06 G06Q 20/40 H04L 9/32
Abstract:
A method, implemented using an authentication monitoring (AM) computer device, for monitoring an execution of a digital authentication program is provided. The method includes receiving an authentication data file from an authenticating computer device executing the digital authentication program, wherein the authenticating computer device is associated with an authenticating entity, processing the authentication data file to extract at least one authentication value, testing the authentication value against at least one authentication rule associated with the digital authentication program, determining that a stored metric for the authenticating computer device fails to meet a predefined benchmark, wherein the stored metric is associated with the digital authentication program, and initiating an authentication remediation process, wherein the authentication remediation process causes an update to the digital authentication program used by the authenticating computer device.
Systems And Methods For Monitoring Computer Authentication Procedures
- Purchase NY, US Sheryl J. Lock - St. Charles MO, US Sue Ellen Moskowitz - New Rochelle NY, US
International Classification:
H04L 29/06 G06Q 20/40
Abstract:
A method, implemented using an authentication monitoring (AM) computer device, for monitoring an execution of a digital authentication program is provided. The method includes receiving an authentication data file from an authenticating computer device executing the digital authentication program, wherein the authenticating computer device is associated with an authenticating entity, processing the authentication data file to extract at least one authentication value, testing the authentication value against at least one authentication rule associated with the digital authentication program, determining that a stored metric for the authenticating computer device fails to meet a predefined benchmark, wherein the stored metric is associated with the digital authentication program, and initiating an authentication remediation process, wherein the authentication remediation process causes an update to the digital authentication program used by the authenticating computer device.