G06Q20/30

SYSTEM AND METHOD FOR TRANSACTION SCORING USING DELIVERY RECEIPT HISTORY
20170330190 · 2017-11-16 ·

Embodiments of the disclosure enable one or more financial transactions to be processed based on a transaction score generated based at least in part on a delivery receipt history. A financial transaction processing computing device receives a request for authorization for a present financial transaction associated with a cardholder account, identifies a reference delivery receipt corresponding to a prior financial transaction associated with the cardholder account, analyzes the reference delivery receipt to generate a confidence metric indicative of a confidence in a legitimacy of the prior financial transaction, and generates a transaction score for the present financial transaction that is indicative of an expected risk associated with approving the request for authorization. Aspects of the disclosure provide for authorizing one or more financial transactions based on an authentication of a recipient associated with a prior financial transaction.

Secure service request processing methods and apparatuses

Disclosed herein are methods, systems, and media for processing service requests. One of the methods includes: receiving, from a client application and by a trusted application, a first service request for executing a first service by the trusted application, wherein the first service request comprises a first expression and an input parameter of the first expression, and the first expression specifies a plurality of target interfaces related to the first service and a sequence of the plurality of target interfaces; executing, by the trusted application and based on the input parameter, the plurality of target interfaces according to the sequence to obtain a target execution result; and returning, by the trusted application to the client application, the target execution result responsive to the first service request.

Blockchain-implemented method and system for access control on remote internet-enabled resources

The invention provides a blockchain-implemented control method and corresponding system(s). The invention may control access to an internet-enabled resource such as an IoT device that is provided with computing capabilities enabling it to communicate with other computer-based resources and interact with a distributed ledger. In one embodiment, the invention provides a method for controlling the use of an internet-enabled resource comprising providing a first blockchain transaction comprising at least one output which is redeemable only by provision of at least: i) a secret value selected by a user; and ii) a signature associated with a resource provider; sending use-related information to the resource; generating a second blockchain transaction requesting at least the secret value; and modifying the second blockchain transaction to include the secret value.

Electronic money system and electronic money terminal

An electronic money system terminates communication to a management center indistinguishably from a case in which the communication to the management center is completed within a predetermined period when it is impossible to complete the communication to the management center within the predetermined period. By switching an operation mode, a predetermined portable terminal is used instead of a communication line to upload and download data. When it is impossible to obtain data required for processing through the communication line, processing is performed based on data possessed up until that time.

System and method for customization of an eyewear

A system and method for customization of an eyewear is disclosed. The system includes a face scanning subsystem configured to scan a face of a user to capture one or more predefined details, an eyewear display subsystem configured to display one or more collections of the one or more components, an eyewear customization subsystem configured to receive a selection input representative of one or more components selected from the one or more collections, a first level eyewear customization subsystem configured to receive one or more customization input representative of one or more customization parameters, an eyewear assembling subsystem configured to assemble the eyewear associated with the user, a testing subsystem configured to test in real time, one or more customized eyewear, a second level eyewear frame eyewear customization subsystem configured to customize the one or more customization parameters in real time.

Systems and methods for contextual augmented reality sharing and performance

Methods, hardware, and software perform augmented reality created from a separate source in context with, such as synchronized and positioned in, captured media, so as to replicate a similar augmented reality at a different instance. A computer processor in a network of communications devices handles a combination of augmented reality information, anchor information that provides the context-matching, limitation information that controls if such information is transmitted or acted upon, and captured media information. The computer processor compares the anchor information with the media to identify triggering media and how augmented reality elements should appear in context with such media. If successful, the augmented reality is performed on a communications device based on the media. Augmented reality can thus be performed in strict reference to actually-captured media, in only desired or restricted conditions, and information transmission and processing to enable the same may be undertaken only at useful, resource-conserving instances.

PIPELINE MODELER SUPPORTING ATTRIBUTION ANALYSIS

Techniques are disclosed for attribution analysis in analytical workflows. A data processing system (DPS) obtains an overall model comprising one or more sub-models. The DPS selects an output variable of the overall model for which attribution of changes is to be performed, and a plurality of input variables against which changes are to be attributed to. The overall model is initially executed with respect to a data set of values for the plurality of input variables to generate a base result for the output variable. The overall model is iteratively executed based on a condition associated with the plurality of input variables to obtain a new result for the output variable. In each iteration, a value of an input variable is changed with respect to the data set of values and a change in the output variable with respect to the base result is attributed to the corresponding input variable.

Money transfer in a forum using a payment proxy

In particular embodiments, a method of transferring money by use of a payment proxy includes receiving a notification of an intent to initiate a monetary transaction in a message entered by a user of a communication platform, identified based on a determination of a particular context associated with content of the message. The method includes parsing the message to identify a unique payment proxy associated with a financial account having a syntax that includes a currency indicator and a string of characters. The method includes identifying a recipient financial account associated with the unique payment proxy. The method includes identifying a sender financial account based on the particular context associated with the content of the user message. The method includes initiating a transfer of a payment amount between the sender financial account and the recipient financial account associated with the unique payment proxy in accordance with the monetary transaction.

EMBEDDED ELECTRONIC PAYMENT SYSTEM AND INTEGRATED CIRCUIT
20170243210 · 2017-08-24 · ·

An embedded electronic payment (EEP) system allows various devices and appliances to act as a merchant to accept electronic payments. The EEP system can be formed on an integrated circuit or as a software applet to run on a virtual machine. The integrated chip can be a standard IC, an application specific integrated chip, programmable logic device, or a multiprocessor based microcontroller. The EEP system operates with a standard interface that can be adapted to many applications. As a result, the cost of payment integration is reduced. The reduced cost of inclusion allows electronic payment systems to be applied in systems and devices where cost margins previously prohibited custom electronic payment systems. When the EEP system is included as an integrated chip, the system has improved security and power consumption compared to software solutions.

Transaction Terminal Malware Detection and Prevention
20170243183 · 2017-08-24 ·

Transaction terminal malicious software is detected by monitoring calls of a first process to identify attempts by the first process to read memory used by a second process. The first and second processes are different from each other and are executed by at least one data processor forming part of a transaction terminal system having at least one transaction terminal. Thereafter, it is determined that the memory used by the second process comprises patterns indicative of sensitive financial or identification information. In response, at least one corrective action is initiated to prevent use of the financial or identification information. Related apparatus, systems, techniques and articles are also described.