Patent classifications
G06Q20/382
Data protection method, authentication server, data protection system, and data structure
Provided is a data protection method which includes: receiving transaction data which includes a first hash value obtained from history information of a home; obtaining, from a data server, a second hash value computed by the data server performing computation processing on encrypted history information without decrypting the encrypted history information, the encrypted history information being history information of the home encrypted using a secure computation method which enables computation without decrypting the encrypted history information, the encrypted history information being obtained from the home; verifying the transaction data, and determining whether the first hash value and the second hash value match; and when a validity of the transaction data is verified and the first hash value and the second hash value match, recording the transaction data in a distributed ledger.
ELECTRONIC PROFILE AND DATA SECURITY ENFORCEMENT WITH USER DEVICE DATA AND METHODS OF USE THEREOF
Systems and methods of the present disclosure include computer systems for improving data security. To do so, an authorization request associated with a user profile is received, including a time-stamp for a profile activity, a profile identifier, and a value. Application analytics data for a software application on a user device associated with the user profile is accessed, including an open event indicator indicating a time of a loading, and a close event indicator indicating a time of a termination. An open period of the software application at the time-stamp is determined based on the application open event indicator and the application close event indicator. A reduced set of fraud checks is selected and executed when the time-stamp associated with the profile activity is within the open period of the software application. A fraud determination is generated, and an authorization notification is generated based on the fraud determination.
Systems and methods for secure wireless payment transactions when a wireless network is unavailable
Systems, methods, and devices are disclosed which allow a mobile device user to complete financial transactions even when the mobile device is not connected to a wireless network. The systems, methods, and devices of the present disclosure may utilize a combination of an encrypted lockbox containing out of network payment codes on the mobile device and a matching set of out of network payment codes stored on a server of a payment authority.
Resource transferring monitoring method and device
Methods and apparatus, including computer programs encoded on computer storage media, for monitoring resource transfer are provided. One of the methods includes: by a server, receiving a resource deposit request from a resource deposit initiator; performing, using a first risk identification model, a first risk identification on the target account according to the resource deposit request to obtain a first risk identification result; receiving a resource withdrawal request from a resource withdrawal initiator, and the resource withdrawal request requesting a resource withdrawal from the target account to the recipient account; performing, using a second risk identification model, a second risk identification on the target account according to the resource withdrawal request to obtain a second risk identification result; and determining, using a third risk identification model, a resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.
System for event detection, data integration, and data visualization
A system includes one or more data sources. Each data source is configured to collect and store event data. An event bus is configured to monitor the event data of the one or more data sources. The event bus determines that a first portion of the monitored event data satisfies a first task criteria. The first portion of the monitored event data is associated with a first tag that corresponds to the first task. The event bus determines that a second portion of the monitored event data satisfies a second task criteria. The second portion of the monitored event data is associated with a second tag corresponding to the second task. The first portion of the monitored event data with the first tag and the second portion of the monitored event data with the second tag are provided for storage in a data lake.
Authentication of Users Using Historical Tipping Information to Generate Authentication Questions
Methods, systems, and apparatuses are described herein for improving computer authentication processes by generating authentication questions based on tipping trends. A computing device may receive a request for access to an account. Transactions data conducted by a user may be received. A tipping trend may be determined based on the one or more transactions conducted by the user. Based on the tipping trend, an authentication question may be generated. The authentication question may be provided, and a response to the authentication question may be received. A user device may be provided access to the account based on the response to the authentication question.
Electronic payment method and electronic device for supporting the same
An electronic device is provided. The electronic device includes a memory configured to store at least one first information provided from an external server in connection with operating electronic payment, a display configured to output a user interface (UI) accompanied with the electronic payment, and a processor configured to be electrically connected with the memory and the display. The processor is configured to detect at least one second information associated with an environment where the electronic device is operated, determine a product to perform the electronic payment, based on the first information and the second information, and include and output information about the product and payment information associated with payment of the product on a specified region of the UI.
Distributed computing and storage network implementing high integrity, high bandwidth, low latency, secure processing
An example operation may include one or more of constructing a transaction proposal and sending the constructed transaction proposal to a plurality of endorsing nodes, by a client application of a computing system, wherein inputs to the transaction proposal are named using a blockchain naming system (BNS), receiving a set of transaction responses from the plurality of endorsing nodes, by the client application of the computing system, the transaction responses each comprising a transaction validation function, assembling the received transaction responses into a transaction, by the client application of the computing system, and sending the transaction to an orderer node for distribution, by the client application of the computing system.
Distributed private ledger systems and methods
A distributed private ledger function of a server of a first consortium member receives data representing an alias for one of its customers from the customer and also receives data that represents an alias for a customer of a second member replicated by a distributed private ledger function of a server of the second member to all members of the consortium. Thereafter, the distributed private ledger function of the first member's server identifies a recipient account of the second member's customer based on an account pointer associated with the alias of the second member's customer and initiates a transfer of funds from a source account of the first member's customer corresponding to an account pointer associated with the alias for the first member's customer to the identified recipient account of the second member's customer.
PAYMENT TRANSACTION PROCESSING SYSTEM, AND PAYMENT TRANSACTION PROCESSING METHOD AND APPARATUS
A payment transaction processing system and a payment transaction processing method and apparatus are disclosed. The system includes: an acquiring institution configured for initiating a payment transaction request; a clearing institution configured for receiving the payment transaction request, and sending the payment transaction request to the account institution; an account institution configured for processing the payment transaction request, generating a transaction result according to a processing result, and feeding back the transaction result to the clearing institution; if the transaction result is a payment processing result indicating that a third-party account opening institution performs payment, a clearing institution sends the payment transaction request to the third-party account opening institution, and receiving a first payment transaction result returned by the third-party account opening institution, and feeding back the first payment transaction result to the acquiring institution; and the third-party account opening institution is configured for, according to the payment transaction request, performing deduction, and after the deduction has been completed, generating the first payment transaction result, and feeding back the first payment transaction result to the clearing institution. The present application can improve the safety of the transaction payment, ensure the authenticity of the transaction information, and reduce the capital clearing risk.