Patents by Inventor Mark Allen Nelsen
Mark Allen Nelsen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240086922Abstract: Embodiments of the invention involve using biometric templates to wirelessly authenticate individuals. In one embodiment, a mobile device may generate a first biometric template and a first public value from a first biometric sample of a user and generate a first cryptographic key by passing the first biometric template to a fuzzy extractor's generate function. An access device may generate a second biometric template from a second biometric sample of the user, generate a second secret cryptographic key by passing the second biometric template and the first public value to the fuzzy extractor's reproduce function, encrypt the second biometric template with the second secret cryptographic key, and broadcast the encrypted template to a plurality of nearby mobile devices including the mobile device. If the mobile device is able to decrypt the encrypted template with the first cryptographic key, the access device can associate the user with the mobile device.Type: ApplicationFiled: November 17, 2023Publication date: March 14, 2024Applicant: Visa International Service AssociationInventors: Kim R. Wagner, John F. Sheets, Mark Allen Nelsen
-
Patent number: 11847652Abstract: Embodiments of the invention involve using biometric templates to wirelessly authenticate individuals. In one embodiment, a mobile device may generate a first biometric template and a first public value from a first biometric sample of a user and generate a first cryptographic key by passing the first biometric template to a fuzzy extractors generate function. An access device may generate a second biometric template from a second biometric sample of the user, generate a second secret cryptographic key by passing the second biometric template and the first public value to the fuzzy extractors reproduce function, encrypt the second biometric template with the second secret cryptographic key, and broadcast the encrypted template to a plurality of nearby mobile devices including the mobile device. If the mobile device is able to decrypt the encrypted template with the first cryptographic key, the access device can associate the user with the mobile device.Type: GrantFiled: March 1, 2022Date of Patent: December 19, 2023Assignee: Visa International Service AssociationInventors: Kim R. Wagner, John F. Sheets, Mark Allen Nelsen
-
Publication number: 20220191014Abstract: Embodiments of the invention involve using biometric templates to wirelessly authenticate individuals. In one embodiment, a mobile device may generate a first biometric template and a first public value from a first biometric sample of a user and generate a first cryptographic key by passing the first biometric template to a fuzzy extractors generate function. An access device may generate a second biometric template from a second biometric sample of the user, generate a second secret cryptographic key by passing the second biometric template and the first public value to the fuzzy extractors reproduce function, encrypt the second biometric template with the second secret cryptographic key, and broadcast the encrypted template to a plurality of nearby mobile devices including the mobile device. If the mobile device is able to decrypt the encrypted template with the first cryptographic key, the access device can associate the user with the mobile device.Type: ApplicationFiled: March 1, 2022Publication date: June 16, 2022Inventors: Kim R. Wagner, John F. Sheets, Mark Allen Nelsen
-
Publication number: 20220164799Abstract: A server computing device receives authentication request messages formatted according to a first message format from a party via a computing device of a user involved in a transaction, translates the messages into modified authentication request messages formatted according to a second message format, and transmits the modified authentication request messages to an authorization computer. The server computing device may augment the modified authentication request messages by including data gathered from the received authentication request messages describing the user, user's computing device, and/or network path between the server computing device and user's computing device, as well as risk scores generated based upon the received authentication request message.Type: ApplicationFiled: February 10, 2022Publication date: May 26, 2022Inventors: Mark Allen Nelsen, Craig O'Connell, Karl Newland, Douglas Fisher
-
Patent number: 11303435Abstract: Embodiments of the invention involve using biometric templates to wirelessly authenticate individuals. In one embodiment, a mobile device may generate a first biometric template and a first public value from a first biometric sample of a user and generate a first cryptographic key by passing the first biometric template to a fuzzy extractors generate function. An access device may generate a second biometric template from a second biometric sample of the user, generate a second secret cryptographic key by passing the second biometric template and the first public value to the fuzzy extractors reproduce function, encrypt the second biometric template with the second secret cryptographic key, and broadcast the encrypted template to a plurality of nearby mobile devices including the mobile device. If the mobile device is able to decrypt the encrypted template with the first cryptographic key, the access device can associate the user with the mobile device.Type: GrantFiled: October 26, 2016Date of Patent: April 12, 2022Assignee: Visa International Service AssociationInventors: Kim R. Wagner, John F. Sheets, Mark Allen Nelsen
-
Patent number: 11282082Abstract: A server computing device receives authentication request messages formatted according to a first message format from a party via a computing device of a user involved in a transaction, translates the messages into modified authentication request messages formatted according to a second message format, and transmits the modified authentication request messages to an authorization computer. The server computing device may augment the modified authentication request messages by including data gathered from the received authentication request messages describing the user, user's computing device, and/or network path between the server computing device and user's computing device, as well as risk scores generated based upon the received authentication request message.Type: GrantFiled: July 30, 2015Date of Patent: March 22, 2022Assignee: Visa International Service AssociationInventors: Mark Allen Nelsen, Craig O'Connell, Karl Newland, Douglas Fisher
-
Publication number: 20200279269Abstract: Embodiments of the invention involve using biometric templates to wirelessly authenticate individuals. In one embodiment, a mobile device may generate a first biometric template and a first public value from a first biometric sample of a user and generate a first cryptographic key by passing the first biometric template to a fuzzy extractors generate function. An access device may generate a second biometric template from a second biometric sample of the user, generate a second secret cryptographic key by passing the second biometric template and the first public value to the fuzzy extractors reproduce function, encrypt the second biometric template with the second secret cryptographic key, and broadcast the encrypted template to a plurality of nearby mobile devices including the mobile device. If the mobile device is able to decrypt the encrypted template with the first cryptographic key, the access device can associate the user with the mobile device.Type: ApplicationFiled: October 26, 2016Publication date: September 3, 2020Inventors: Kim R. Wagner, John F. Sheets, Mark Allen Nelsen
-
Publication number: 20160267466Abstract: A device stores multiple identifiers meant for specific uses. For example, multiple transaction tokens can reside on different parts of a user device. Each transaction token can be compatible for use with a transaction channel (e.g., contact, contactless, and card-not-present, telephone-order, mail-order, in-app, etc.). A transaction can be terminated based on a transaction token being utilized in an inappropriate transaction channel, which limits the chances that a compromised transaction token can be successfully utilized for fraud. In some cases, the user device may be a transaction card or a mobile phone.Type: ApplicationFiled: March 11, 2016Publication date: September 15, 2016Inventors: Phillip Kumnick, Mark Allen Nelsen, John F. Sheets
-
Publication number: 20160034900Abstract: A server computing device receives authentication request messages formatted according to a first message format from a party via a computing device of a user involved in a transaction, translates the messages into modified authentication request messages formatted according to a second message format, and transmits the modified authentication request messages to an authorization computer. The server computing device may augment the modified authentication request messages by including data gathered from the received authentication request messages describing the user, user's computing device, and/or network path between the server computing device and user's computing device, as well as risk scores generated based upon the received authentication request message.Type: ApplicationFiled: July 30, 2015Publication date: February 4, 2016Inventors: Mark Allen Nelsen, Craig O'Connell, Karl Newland, Douglas Fisher
-
Publication number: 20140310160Abstract: A user may receive an alert notification message on a mobile device for any high risk transaction along with a set of recent transactions conducted on an account associated with the user. The user may be able to respond back by either accepting or rejecting the transaction using an application on the mobile device. In one embodiment, for a rejected transaction, a plurality of options may be presented to the user's mobile device for the user to select a reason for rejecting a transaction. An issuer associated with the payment account used for the transaction may receive the user's response and accordingly take appropriate actions on the account.Type: ApplicationFiled: March 17, 2014Publication date: October 16, 2014Inventors: Pawan Kumar, Mark Allen Nelsen, Todd McGregor
-
Publication number: 20100005029Abstract: A system, method, and computer-readable storage medium configured to import fraud prevention rules from an issuer and implement them in real-time at a payment processor. Usually, a card issuing bank either approves or declines financial transaction; however, in embodiments of the present invention, the issuing bank creates fraud prevention rules, and the payment processor implements the created rules. A payment processor apparatus comprises a network interface, and a verification engine. The verification engine includes a transaction driver, and a real time decisioning processor. The network interface is configured to receive a fraud prevention rule from a payment card issuing bank, and to receive a proposed financial transaction from an acquiring bank. The transaction driver receives the fraud prevention rule.Type: ApplicationFiled: July 3, 2008Publication date: January 7, 2010Inventors: Mark Allen Nelsen, Nancy Therese Hilgers, Mitchell L. Wright, Pawan Kumar
-
Publication number: 20090106151Abstract: A system, method, and computer-readable storage medium configured to import fraud prevention rules from an issuer and implement them in real-time at a payment processor. Usually, a card issuing bank either approves or declines financial transaction; however, in embodiments of the present invention, the issuing bank creates fraud prevention rules, and the payment processor implements the created rules. A payment processor apparatus comprises a network interface, and a verification engine. The verification engine includes a transaction driver, and a real time decisioning processor. The network interface is configured to receive a fraud prevention rule from a payment card issuing bank, and to receive a proposed financial transaction from an acquiring bank. The transaction driver receives the fraud prevention rule.Type: ApplicationFiled: October 17, 2007Publication date: April 23, 2009Inventors: Mark Allen Nelsen, Nancy Therese Hilgers, Karl Newland, Frederick Liu, Roger Paul Morrison, Andrew Brendan Carpenter, Sivakumar Seshappan, Craig M. Kato, Alan Scott