G06Q20/3823

OFFICE OF FOREIGN ASSETS CONTROL (OFAC) COMPLIANCE SYSTEM
20230019588 · 2023-01-19 ·

A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.

Identity protection system

A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.

Method and System for Asynchronous Mobile Payments for Multiple In-Person Transactions Conducted in Parallel

A mobile consumer device with a display, processor(s), and memory: identifies a merchant device in proximity to the consumer device based on broadcasted information transmitted by the first merchant device, the broadcasted information including a first identifier corresponding to the first merchant device; transmits the first identifier to a server and receives from the server an electronic communication including identification and transaction information associated with the merchant; displays the identification information, receives user selection of the merchant identification information; and in response, displays the merchant transaction information, receives supplemental user information, and transmits the supplemental transaction information to the server for completion of the transaction.

INTERMEDIARY COMMUNICATIONS OVER NON-PERSISTENT NETWORK CONNECTIONS
20230222506 · 2023-07-13 ·

A mobile device with a first transceiver, a second transceiver, one or more processors, and memory bridges communications between an offline retail machine with a short-range communication capability and a remote server by obtaining via the first transceiver a single-use request code from an information packet broadcast by the offline retail machine; transmitting via the second transceiver the single-use request code to a remote server; obtaining via the second transceiver from the remote server a grant token including the single-use request code; detecting a trigger condition for initiating provision of a product or service by the offline retail machine; and in response to detecting the trigger condition, initiating performance of the provision of the product or service by transmitting the grant token to the offline retail machine via the first transceiver.

Systems and methods for device and user authorization

Systems and methods are described for authorizing users and/or devices. An example method may comprise receiving, from a user device, a request to access a function associated with a service account. The request may comprise an identifier of the user device. The example method may comprise determining, based on the identifier, a primary authority holder of the service account. The example method may comprise determining that a first record on a first distributed ledger associated with the primary authority holder indicates that the user device is associated with the primary authority holder. The example method may comprise determining that a second record on a second distributed ledger associated with the user device indicates that the user device is associated with the primary authority holder. The example method may comprise granting, based on the request, the first record, and the second record, the user device access to the function.

STEGANOGRAPHIC IMAGE ENCODING OF BIOMETRIC TEMPLATE INFORMATION ON A CARD

Various embodiments are generally directed to utilizing a steganographically encoded image with an offline and/or online verification or authentication protocol. A method for using the steganographic image can include: receiving or utilizing a steganographic image associated with a user at a third-party device, the steganographically encoded image including an identification of a user steganographically encoded with a fingerprint template of the user, and authenticating the user using the steganographically encoded image.

Systems and methods for point-to-point encryption compliance
11551208 · 2023-01-10 · ·

Systems and methods for point-to-point encryption compliance are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for point-to-point encryption compliance may include: (1) a payment application receiving, from a data source, payment data encrypted using a first encryption method; (2) the payment application identifying a second encryption method for the payment data; (3) the payment application requesting, from the data source, the payment data encrypted using the second encryption method; and (4) the payment application receiving from the data source, the payment data encrypted using the second encryption method.

Method for the encryption of payment means data, corresponding payment means, server and programs

A method for encrypting a piece of payment means data is disclosed. This method is implemented by a payment means having a data processor. Such a method has at least one iteration of the following steps: obtaining a current piece of payment means data from a memory of the payment means; generating a following piece of payment means data as a function of the current piece of payment means data and as a function of an encryption key of the payment means; replacing the current piece of payment means data by the following piece of payment means data within the memory of the payment means.

Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods

Systems, methods, and software are disclosed for provisioning tokens in a networked computing environment including merchants participating in payment networks. The method includes receiving, by a merchant processor, card account data of a purchase card from a cardholder. The method includes determining, by the merchant processor, that the card account data includes a multi-token enabled BIN. The method includes, in response to determining that the card account data includes the multi-token enabled BIN, receiving and storing, by the merchant processor and in a memory of the merchant, respectively, a primary token associated with a front-of-card brand of the purchase card. The method includes, in response to receiving the primary token, transmitting, by the merchant processor, a request for a secondary token. The method includes receiving and storing, by the merchant processor and in the merchant memory, respectively, the secondary token simultaneously with storing the primary token.

Secure communication protocols for proximity-based validation in distributed multi-device frameworks

Various systems, apparatuses, and methods are described herein for enabling secure communication protocols for proximity-based validation in distributed multi-device frameworks. Distributed multi-device frameworks present unique challenges when it comes to ensuring that user communications between various devices and over variable-security communication mediums remain secure. To address the noted challenges, some embodiments of the present invention provide for an apparatus configured to establish secure communications with a central system using wallet identifying data that is configured to secure data transfers between the apparatus and the central system. In accordance with some embodiments, devices communicating on proposed networks are arranged in a manner and using a network architecture that is configured to optimize overall network security and system integrity.