Patent classifications
G06Q20/386
SYSTEMS, METHODS, AND NON-TRANSITORY COMPUTER-READABLE MEDIA FOR AUTHENTICATION AND AUTHORIZATION OF PAYMENT REQUEST
Systems, methods, and non-transitory computer-readable media for authentication and authorizing a payment request. In one embodiment, the system includes a server including a first memory and a first electronic processor communicatively connected to the first memory. The first electronic processor is configured to receive the payment request, three-domain secure (3DS) data, and fast ID online (FIDO) data, output an authentication request that includes a portion of the 3DS data and a portion of the FIDO data, receive an authentication response based on the 3DS data and the FIDO data, the authentication response including one or more authentications, output the payment request based on the authentication response, and receive an authorization or a denial of the payment request.
REAL-TIME PROVISIONING OF TARGETED DIGITAL CONTENT BASED ON DECOMPOSED STRUCTURED MESSAGING DATA AND PEER DATA
Computer-implemented systems and processes may provision, in real-time, targeted, event-specific digital content based on decomposed, structured message data and peer data. For examples, an apparatus may receive a message associated with an exchange of data involving a first counterparty and a second counterparty. The message may include elements of message data that characterize a real-time payment from the second counterparty to the first counterparty, and based on the elements of message data, the apparatus may determine a value of at least one parameter that characterizes the first counterparty and may obtain elements of peer data that are consistent with at least one parameter value. The apparatus may transmit notification data that includes digital content associated with at least one of the elements of peer data or the at least one parameter value to a device operable by the first counterparty, which may present the digital content within a digital interface.
Payment via messaging application
Technology is disclosed for a convenient money transfer without requiring any account login and/or creation activities. The disclosed technology enables a sender to transfer a specified amount of currency to one or more recipients through a payment application while executing an instant message application. The payment application can act as a background process associated with or incorporated in the instant message application, so as to provide the user with a “seamless” user experience. In response to detection of a specified identifier, the technology can provide a user interface to collect a numerical value corresponding to the specified amount of currency, access a list of contacts in a database of the sender's mobile device, and provide the list of contacts to the sender. The technology enables the sender to manually select recipients from the provided list of contacts and can accordingly initiate a payment process based on statuses of selected recipients.
Performing authenticated actions without internet connectivity
Disclosed are various embodiments for performing authenticated actions when Internet connectivity is not available. An application executed in a first computing device determines that an authenticated action is requested to be performed. The application determines that Internet connectivity is unavailable to the first computing device. The application initiates the authenticated action using a communication channel that connects the first computing device to a second computing device. The Internet is inaccessible through the communication channel.
Intelligent automation of self service product identification and delivery
Embodiments for implementing intelligent automation of opportunity transaction workflows by a processor. One or more tasks identified in an existing transaction opportunity workflow suitable for automation may be automated in a current transaction opportunity workflow. The automated tasks may be scheduled and executed in the current transaction opportunity workflow. The automated tasks in the current transaction opportunity workflow may be monitored.
Systems and methods for real time data rich cross border payment transactions
A cross border payment (CBP) computing device for transmitting cross border data rich payments in real-time is provided. The CBP computing device receives, from an originating bank associated with a payor, a payment request message to transfer funds in real-time. The payment request message includes payment instructions and transaction information associated with a transfer amount. The CBP computing device determines that the payment request message is a cross border payment transfer from a first payment network for processing real-time payments within a first country to a second payment network for processing real-time payments within a second country, and retrieves, from a database, a set of rules based on a payment messaging standard and protocol associated with the second payment network. The CBP computing device reformats the payment request messaged based on the retrieved set of rules, and transmits the reformatted payment message to a receiving bank associated with a payee.
PROVIDING IRREVOCABLE EVIDENCE OF PHYSICAL PRESENCE USING PROXIMITY TECHNOLOGY AND A DISTRIBUTED LEDGER
Aspects described herein include using proximity technology such as beacon devices or geofences to detect physical presence at a physical location. Presence information may be generated and included in a non-fungible token (NFT). The NFT may be provided to a digital wallet. The identity of an individual associated with the digital wallet may be authenticated. A distributed ledger may record the transaction that provides the NFT to the digital wallet.
SYSTEMS AND METHODS FOR DISTRIBUTING EVENT DRIVEN NETWORK SERVICES
Systems and methods herein provide event-drive network services. One exemplary method includes providing event-driven services in a network, where the network includes an edge messaging platform, a communication manager coupled to the edge message platform and associated with a first customer, a messaging platform different that the edge message platform, a first computing device coupled to the edge message platform, and a second computing device coupled to the messaging platform. The method includes subscribing, by the first computing device, to a first event topic on the edge message platform; consuming, by the first computing device, a first event published to the first event topic by the communication manager; and publishing a second event to the messaging platform where the second computing device is then permitted to consume the second event from the messaging platform to communicate data included in the second event to a second consumer.
EFFICIENT AND SECURE COMMUNICATION USING WIRELESS SERVICE IDENTIFIERS
Systems and methods are provided for reducing communications between servers and a mobile device and providing enhanced security and privacy to wireless beacon services. This can involve a broadcast device transmitting a beacon transmission using a short range wireless radio, such a Bluetooth or WiFi, and including a MAC address, a first unique identifier, and a beacon service identifier. The mobile device then selects one or more unique identifiers from received beacon transmissions, by filtering (that is, selecting) those beacon transmissions which include the beacon service identifier. The wireless device then takes further action, if the first unique identifier is present among the selected one or more unique identifiers, using stored information from the server. The stored information may be delivered to the wireless device in response to the wireless device sending the first unique identifier to a server, or the stored information may have been previously downloaded.
Systems for alerting user to undesired components in purchase items
A system for alerting a user of undesired components in purchase items is provided. The system comprises receiving a list of undesired components of purchased items, and defining an alert to a user of an undesired component in a purchased item, the alert comprising an alert timing configuration and an undesired component identification. The system further comprises receiving a notice that the user purchased an item, determining whether a listing of the purchased item has been automatically collected, and generating a list of components of the purchased item when the purchased item listing has been automatically collected, and obtaining from the user the list of components of the purchased item when the purchased item listing has not been automatically collected. The system further determines whether the purchased item contains an undesired component, and upon determining that the purchased item contains art undesired component, sends the alert to the user.