G06Q20/382

ABNORMAL BEHAVIOR DETECTION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM
20230004979 · 2023-01-05 ·

This application provides an abnormal online operational behavior detection method performed by an electronic device. The method includes: obtaining a first target sub-model corresponding to a first target object from a first preset object model; determining an abnormal data volume from the first target sub-model based on a preset model parameter and a first detection result by comparing a target data volume and the abnormal data volume; obtaining a second target sub-model corresponding to a second target object and having a highest similarity with the first target sub-model from a second preset object model; obtaining a target maximum data volume corresponding to the second target sub-model, and determining a second detection result by comparing the target data volume and the target maximum data volume; and determining a target detection result of the online operation behavior information in accordance with the first detection result and the second detection result.

Trusted service manager (TSM) architectures and methods
11521194 · 2022-12-06 · ·

A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key.

Control method, controller, data structure, and electric power transaction system

A control method including: receiving first transaction data including a first electronic signature from the a home of a first user; verifying whether the received first electronic signature included in the first transaction data is valid; verifying validity of the received first transaction data; when the first electronic signature and the validity of the first transaction data are verified successfully, executing a first consensus algorithm for the first transaction data; and when the validity of the first transaction data is verified according to the first consensus algorithm, recording a block including the first transaction data in a distributed ledger. The first electronic signature is a group signature assigned to a group to which the first user belongs.

Facilitating telecommunication network access via mobile device peer to peer sharing
11570848 · 2023-01-31 · ·

Systems and methods are described herein for facilitating access to a telecommunications network by a third-party device via one or more available subscriber devices. The network-based systems enable devices associated with subscribers of the telecommunications networks to establish connections with other mobile devices (e.g., third-party mobile devices of users that are not subscribers) over peer to peer (P2P) communication protocols. For example, a subscriber device can, over a P2P connection, act as a Hotspot, Wi-Fi tether, or bridge for a third-party or other device requesting access to the networks.

Online transaction verification based on merchant-independent user geolocation

In certain embodiments, an online transaction is verified based on merchant-independent user geolocation. A geolocation of a user associated with the online transaction is obtained from a mobile device of the user by a transaction verifying entity separate and independent from a merchant entity with which the online transaction is initiated. A server associated with the transaction verifying entity determines a proximity of the geolocation of the user to a delivery address for verifying the online transaction. The server generates a verification message including an approval message based on the proximity of the geolocation to the delivery address being within a specified threshold. The server generates a verification message including a rejection message based on the proximity of the geolocation to a delivery address exceeding the specified threshold. The server sends the verification message to another server associated with the merchant entity to carry out the online transaction accordingly.

Native-feature silent coercion alarm

Apparatus and methods for providing protection from economic exploitation. The apparatus and methods may include a platform for tagging a social security number and/or other suitable identification number. The system may allow a person associated with a social security number to automatically flag and deny any product or service request associated with the social security number. The alarms are “silent,” because the alarm may initiate an institution internal process in which the customer interaction with the institution follows a normal diligence process until an intervention can be effectively executed on behalf of the customer. This reduces the likelihood of a reaction from the customer's associate prior to completing the diligence process. A system may provide the customer with an opportunity to electronically activate an alarm by typing keystrokes on a card reader keypad or interacting with a physical sensor on the reader, on the card, or the like.

Voice Payment Method and Electronic Device
20230021413 · 2023-01-26 ·

A voice payment method and an electronic device are provided. The method includes: A first electronic device receives voice information of a user, where the voice information is used to indicate a payment operation performed by the user; when a voiceprint feature of the voice information meets a preset condition, the first electronic device requests a second electronic device to authenticate the user; the second electronic device prompts the user to perform an authentication process, where the authentication process includes one or more of fingerprint authentication, facial recognition, password authentication, verification code authentication, and near field communication NFC authentication; when authentication performed by the second electronic device on the user succeeds, the second electronic device indicates to the first electronic device that authentication performed by the second electronic device on the user succeeds; and the first electronic device completes the payment operation with a payment platform.

PURCHASE APPROVAL BROKERING
20230237497 · 2023-07-27 ·

The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of purchase approval brokering. The innovation can receive a request from a first user device to purchase a product. The request can include product information such as an image of the product or a unique identifier. The product may be identified from the request to purchase of the product. An approver may be determined from a set of approvers based on the identification of the product and information in the request. An approval for the purchase of the product may be requested and received from the approver. Upon receiving an approval to purchase the product, a virtual card number for purchasing may be generated. The purchase of the product may be completed by the user via the virtual card number.

METHODS AND SYSTEM FOR OPERATING A MOBILE POINT-OF-SALES APPLICATION USING A SIM
20230024227 · 2023-01-26 ·

A method for operating a mobile Point-of-Sales (mPOS) application for executing a transaction includes: a Universal Integrated Circuit Card (UICC) card connected to a terminal device executes in interaction with the terminal device an application frontend of the mPOS application that provides, upon launch, an I/O interface with a human machine interface displayed by a touchscreen of the terminal device and a machine-to-machine interface; and the application frontend, for starting a transaction, captures transaction data associated with the transaction to be started via the human machine interface, reads further transaction data via the machine-to-machine interface from a transaction device separate from the terminal device and arranged close to the terminal device, generates a transaction authorization authorizing the requested transaction, and transmits the transaction authorization, the transaction data and the further transaction data via a connection to a remote backend server for completing the transaction.

PRIVATE INFORMATION WITH A SHARED SINGLE SOURCE OF TRUTH
20230028702 · 2023-01-26 · ·

A method uses private information with a shared single source of truth. A message is received responsive to adding a first shared block to a shared object ledger of a shared object. The message includes message data. A private block is added to a private object ledger to update a private object. The private block includes private data from the message data. A second shared block is added to the shared object ledger to update the shared object. The second shared block includes shared data from the message data.