Patent classifications
G06Q20/36
Mobile wallet systems and methods using trace identifier using card networks
A mobile wallet computer server receives a fund access request from a user device. The fund access request is made in connection with a payment transaction. The mobile wallet server generates a tokenized card number, transmits the tokenized card number to the user device, and receives receive the tokenized card number from a card network computer system after having been routed from the user device via a merchant computer system and via an acquirer processor computer system. The mobile wallet computer server converts the tokenized card number to the actual credit card account number of the user and transmits the actual credit card account number to the card network computer system to process the payment transaction.
Mobile wallet systems and methods using trace identifier using card networks
A mobile wallet computer server receives a fund access request from a user device. The fund access request is made in connection with a payment transaction. The mobile wallet server generates a tokenized card number, transmits the tokenized card number to the user device, and receives receive the tokenized card number from a card network computer system after having been routed from the user device via a merchant computer system and via an acquirer processor computer system. The mobile wallet computer server converts the tokenized card number to the actual credit card account number of the user and transmits the actual credit card account number to the card network computer system to process the payment transaction.
Distributed database methods and systems
Data representing ownership of a traditional asset of a first party having a predefined monetary value stored at a first party network node is replicated to a plurality of other party network nodes, including a second party network node, communicably coupled to the first party network node and to one another. Entry of data is received at the first party network node that represents a partition by the first party of the asset of the first party on a non-value axis into at least two non-overlapping assets and a transfer of ownership of one of those two assets to the second party. The data representing the partition of the non-value axis and transfer of ownership of one of the two non-overlapping assets to the second party is replicated to the plurality of other party nodes, including the second party network node.
Mobile wallet account provisioning systems and methods
A mobile device includes a display device; a processor; and a memory device configured to store instructions that, when executed by the processor, cause the processor to: present, by the display device, a user interface to a user of the mobile device for accessing a mobile online banking application; upon accessing the mobile online banking application, provide, by the display device, an option to a create a mobile wallet; responsive to receiving an indication to create the mobile wallet, provide, by the display device, a list of accounts held by the user; and receive a selection of at least one account from the list accounts to provision the at least one account to the mobile wallet for use in future mobile wallet transactions such that the at least one account from the list of accounts is auto-provisioned to the mobile wallet.
Mobile wallet account provisioning systems and methods
A mobile device includes a display device; a processor; and a memory device configured to store instructions that, when executed by the processor, cause the processor to: present, by the display device, a user interface to a user of the mobile device for accessing a mobile online banking application; upon accessing the mobile online banking application, provide, by the display device, an option to a create a mobile wallet; responsive to receiving an indication to create the mobile wallet, provide, by the display device, a list of accounts held by the user; and receive a selection of at least one account from the list accounts to provision the at least one account to the mobile wallet for use in future mobile wallet transactions such that the at least one account from the list of accounts is auto-provisioned to the mobile wallet.
Voice recognition to authenticate a mobile payment
Systems and methods are provided for authenticating mobile payments from a customer account to a merchant. The systems and methods may include a financial service provider receiving a request to authorize an electronic transaction at a point-of-sale. A financial service provider server computer may verify that the customer is present at the point-of-sale using received location data. An image having distorted text such as a captcha may be transmitted to a device at the point-of-sale, and the customer may read the captcha aloud. A voice sample of the customer may be sent to the financial service provider for comparison to stored voice recordings, to verify that the customer's voice sample is authentic if the voice matches a previously generated voice recording for the account. If the voice sample is authentic, the financial service provider may authorize the mobile payment.
Voice recognition to authenticate a mobile payment
Systems and methods are provided for authenticating mobile payments from a customer account to a merchant. The systems and methods may include a financial service provider receiving a request to authorize an electronic transaction at a point-of-sale. A financial service provider server computer may verify that the customer is present at the point-of-sale using received location data. An image having distorted text such as a captcha may be transmitted to a device at the point-of-sale, and the customer may read the captcha aloud. A voice sample of the customer may be sent to the financial service provider for comparison to stored voice recordings, to verify that the customer's voice sample is authentic if the voice matches a previously generated voice recording for the account. If the voice sample is authentic, the financial service provider may authorize the mobile payment.
3D printer and inventory control and distribution system for 3D designs
A digital platform enables 3D printing where the designs are protected from piracy/redistribution. A single board computer (SBC) communicates with a first server and a second server. The SBC requests a unique hardware ID from the first server, which assigns and sends the ID to the SBC. The SBC submits the ID and a secret key to the second server to request registration of a user and a printer, and the second server sends private certs, a client ID, and a unique public identifier to the SBC. The second server also receives and stores 3D print designs through a designer portal, and on-demand displays the designs in a GUI screen. The SBC user may purchase a 3D print design, and the second server, in response, sends an access token to the SBC. The SBC redeems the access token for a selected 3D print, and the second server adjusts geode for the selected 3D design for the particular printer, and streams the adjusted geode to the printer through the SBC, thereby protecting the code from unauthorized user/replication.
Systems and methods for hybrid blockchain control
Various embodiments of the present application are directed towards systems and methods for hybrid blockchain control. According to some embodiments a method for hybrid blockchain control, an update to a distributed blockchain is received from a blockchain system. The blockchain system includes multiple nodes individually storing copies of the distributed blockchain and individually updating the copies by a consensus process. A determination is made as to whether the distributed blockchain has been fraudulently modified based on the received update. In response to determining the distributed blockchain has been fraudulently modified: 1) a corrective block is disseminated to the blockchain system to trigger the consensus process on the nodes; and 2) a predefined override in the consensus process is invoked to update the copies of the distributed blockchain in a manner that bypasses an illegitimate block. Further, the predefined override is invoked while the consensus process processes the corrective block.
Secure token distribution
A method for utilizing a registration authority to facilitate a certificate signing request is disclosed. In at least one embodiment, a registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions.