Abstract: A system for authenticating near field communication (NFC) transactions that has an NFC merchant reader that provides an electromagnetic field and an NFC hand-held device that senses the electromagnetic field and prompts a user for a personal identifier (PI) in response to the electromagnetic field. Additionally, the NFC hand-held device wirelessly transmits the PI, and the NFC hand-held-device receives an approval code transmitted to the NFC hand-held device in response to the PI. Further, the NFC hand-held device transmits the approval code to the NFC merchant reader, and the NFC merchant reader transmits a payment request comprising the approval code.
Abstract: A system for transferring secured data has an authentication facilitator that transmits data indicative of a graphical key pad to a remote display device of a user computing device and, in response, receives from the user computing device icon location data indicative of locations of icons selected by a user. Additionally, the authentication facilitator recovers a personal identifier (PI) from the icon location data, translates the recovered PI to obtain a translated PI, and transmits the translated PI. The system further has a partner computing apparatus that receives the translated PI and allows the user access to a secured area based upon the translated PI.
Abstract: Computer program products, methods, systems, apparatus, and computing entities are provided for transferring funds. In one embodiment, a sender can provide account information and be authenticated to transfer funds to a receiver. The funds can then be transferred to the receiver or held in escrow for transfer to the receiver upon receipt of the receiver's account information.
Abstract: A system and method of secure PIN processing in a network transaction includes a transaction manager that sends terminal data to a terminal. The terminal generates corollary data from user input and the terminal data. The corollary data is sent to the transaction manager. The transaction manager then sends the corollary data and HSM data to a hardware security module. The hardware security module generates a PIN from the corollary data and the HSM data, encrypts the PIN and generates a PIN block. The transaction manager uses the PIN block and transaction data to send a transaction request to the ATM Network.