G06Q20/027

CONTENT SHARING METHOD FOR RELAY SERVER
20230237550 · 2023-07-27 ·

A content sharing method by which a relay server shares content between application management servers. According to the method: the relay server receives, from a first application management server for operating a first application, first content information that can be used through the first application; the relay server transmits the first content information to remaining application management servers; the relay server receives content purchase information including a purchase request and payment information, which is inputted through a second application, from a second application management server for operating the second application; the relay server provides the purchase request for the first content information to the first application management server; the relay server receives a purchase confirmation of the first content information from the first application management server; and the relay server transmits the purchase confirmation of the first content information to the second application management server.

System, Method, and Apparatus for Securely Transmitting Data via a Third-Party Webpage

Provided is a computer-implemented method for securely receiving data via a third-party webpage, including: generating configuration data in response to a request from a first system, the configuration data including a public key of a first key pair; digitally signing the configuration data based on a private key of a second key pair; transmitting the configuration data to the first system, the configuration data including code configured to facilitate the first system to embed a plurality of frames in a webpage, wherein the plurality of frames loads content from a domain that is independent from a domain that hosts the webpage; and verifying the configuration data based on a public key of the second key pair. The computer-implemented method may also include receiving, from a master frame of the plurality of frames, encrypted data. Systems and computer program products are also provided.

Re-using e-commerce payment instruments for in-store use systems and methods

Provided are a re-using e-commerce payment instruments for in-store purchasing systems and methods. A customer enters a check out and a transaction at the point of sale is started. The system receives a pairing request at a wallet processor from a customer mobile device operating a mobile application. This pairing request is created and sent in response to scanning of a code having a transaction identification. The system associates a customer payment profile with the transaction identification and sends associated information to the point of sale. The point of sale sends an amount of sale to authorize to the wallet processor after completing scanning of items. The system creates an authorization for payment and sending the authorization for payment to an authorizer. The transaction may then be completed by processing payment.

TRANSACTION SECURITY TECHNIQUES

Aspects of the present disclosure relate to transaction security techniques. In examples, a resource platform causes a set of executable verification instructions associated with an authorization processor to be executed by a user computing device. The verification instructions may be encrypted by the authorization processor for decryption by the user computing device. The verification instructions may generate verification information associated with the user computing device. In some instances, the verification information may be encrypted for decryption by the authorization processor. The encrypted verification instructions may be provided to the authorization processor (e.g., via the resource platform), such that the authorization processor may provide an indication to the resource platform as to whether the verification is verified. Accordingly, if the verification information is verified a transaction associated with the resource platform may proceed or, as another example, the user computing device may be granted access to information.

System and method for transaction settlement

Cryptocurrencies may be used within the current Four Party Model to settle transactions between a merchant and a consumer who may use or accept fiat and/or cryptocurrency. An intermediary wallet entity may assume the risk of cryptocurrency transactions. For example, a fiat-fiat transaction may follow the usual settlement process of the Four Party Model. In a crypto-crypto transaction, settlement may occur in real time. But in a fiat merchant/crypto customer transaction, settlement may be made from the customer's crypto wallet to an intermediary wallet. Fiat settlement would then occur between the intermediary and merchant following the Four Party Model. In a crypto merchant/fiat customer transaction, a transfer may be made from the intermediary wallet to the merchant's crypto wallet. Fiat settlement between the customer's bank (issuer) and intermediary can happen in the usual settlement process.

ENABLING USER TO USER INTERACTIONS IN MULTI-USER VIDEO CONFERENCE APPLICATIONS
20230025638 · 2023-01-26 ·

There are provided systems and methods for enabling user to user interactions in multi-user video conference applications. A user may utilize a computing device to interact with online service providers in order to initiate and/or join a video conference with one or more other users. During the video conference, the user may be provided with options to interact with other users, such as by engaging in electronic transaction processing. When performing such interactions, data for the video conference may be extracted and provided to a transaction processor server. The server may then utilize the data to determine accounts of users within the video conference that may be utilized for electronic transaction processing services. If no account exists, the server may initiate a process to onboard such users. When an account exists, the server may further populate graphical icons that may be used for electronic transaction processing services.

Systems and methods for database management of transaction information and payment instruction data
11562450 · 2023-01-24 · ·

A system for storing data related to a transaction and for facilitating the transaction, the system comprising: an application server coupled with a database and configured to store information associated with a plurality of transactions, the information including account information related to a user account maintained by a first financial institution, a recipient identifier, and account information related to a recipient account maintained with a second financial institution, the application server further configured to: receive transaction data associated with a payment of the transaction, the transaction data comprising an identifier and user account information; identify the recipient account information based on a comparison of the received identifier against the stored recipient identifier; generate transfer instructions data based on the transaction data and recipient account information; and forward the transfer instructions data to the first financial institution based on the user account information to cause a deposit into the recipient account.

PARALLEL PROCESSING IN A NETWORK

A network management system includes: a memory configured to store instructions; and a parallel processor configured to execute the instructions to: (a) receive a request for a transaction; (b) determine a first authorization decision for the request; (c) determine a second authorization decision for the request; and (d) perform a first procedure when the first authorization decision is different from the second authorization decision. The request corresponds to use of electronic payment for the transaction and wherein the first authorization decision is generated in parallel with generation of the second authorization decision.

SYSTEMS AND METHODS FOR MATCHING TOKENIZED ACCOUNTS BETWEEN ANONYMOUS PARTIES
20230230061 · 2023-07-20 ·

Systems and methods that allow fulfilment of a transaction wherein a first party initiates the transaction, for example, at a point-of-sale device, and a tokenized account of an anonymous second party is identified as an account optimal for completing the transaction. The tokenized account of the anonymous second party is identified based on the transaction information. The tokenized account of the anonymous second party is matched to complete the transaction for reasons including a financial advantage or incentive associated with the tokenized account of the anonymous second party and not available to the first party at the time of the transaction. This financial advantage may be shared between both parties. The tokenized account of the anonymous second party may receive a financial benefit or other valuable consideration for completing the transaction. The tokenized account of the anonymous second party is reimbursed for costs associated with completing the transaction.

SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS
20230231820 · 2023-07-20 · ·

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.