Patent classifications
G06Q20/403
SECURED AUTHENTICATION AND TRANSACTION AUTHORIZATION FOR MOBILE AND INTERNET-OF-THINGS DEVICES
Highly secured transactions for mobile or Internet-of-Things (IoT) devices can be conducted using a one-time seed technology (OTST). For example, registration of a user and authentication of a user device is based on a one-time seed (OTS) which is generated by an authentication server and sent to the user device. The user device employs the OTS to generate a one-time password (OTP). After registration and authentication, the OTS is deleted. As such, the OTS and OTP is used only one time. No seed is stored on the user device. As for securing the transactions, it may be signed by a one-time hash (OTH) or a one-time signing key (OTSK). Like the OTS, the OTH or OTSK is deleted from the user device after the transaction. Since the user device does not contain a seed, OTH or OTSK, there is no risk of the user device being hacked by unwanted third parties.
DATA INTERACTION METHOD AND DEVICE, AND OFFLINE CREDIT PAYMENT METHOD AND DEVICE
Implementations of the present application provide data interaction methods and devices. In one example implementation, authorization data for a current interaction are received from a remote server, wherein the authorization data comprises signature information, time information of current authorization, a random number of the current authorization, and a threshold. The authorization data are verified by performing at least one of: comparing the time information comprised in the authorization data with a current time; determining whether the random number comprises in the authorization data exists in a previous data interaction; or determining whether the data of the current interaction exceeds the threshold comprised in the authorization data. Whether to cancel the current interaction is determined based on the verification of the authorization data.
SYSTEMS AND METHODS FOR REAL-TIME PROCESSING
A method for real-time data processing is described. The method being implemented on a computer system having one or more physical processors programmed with computer program instructions which, when executed, perform the method. The method comprising allocating a real-time dataset associated with a real-time data interaction to a node in a chain of nodes, wherein each node is representative of a user in the real-time data interaction; setting a node status of the node for the real-time dataset to pending; and independently of (i) a node status of the one or more upstream nodes and (ii) a node status of the one or more downstream nodes: periodically determining, by the computer system, an availability status of the node; and in response to the availability status satisfying the criterion, setting the node status for the real-time dataset as settled.
SYSTEM AND METHOD PROVIDING AN ELECTRONIC CENTRALIZED GATEWAY SWITCH TO A PLURALITY OF NETWORK DEVICES
Systems, methods, and computer program products are provided for providing an electronic centralized gateway switch to a plurality of network devices. The method includes assigning a resource value to a resource received from a sending user. The resource value corresponds to a value of the resource received. The method also includes receiving a resource transfer information. The resource transfer information includes intended transfer target information corresponding to an intended transfer target account associated with an intended transfer target. The intended transfer target account is associated with one of a plurality of resource entities. The method further includes connecting to the resource entity associated with the intended transfer target account based on the resource entity associated with the intended transfer target account. The method still further includes causing a transmission of the resource value to the intended transfer target account at the resource entity associated with the intended transfer target account.
BANK BALANCE FUNDS CHECK AND NEGATIVE BALANCE CONTROLS FOR ENTERPRISE RESOURCE PLANNING SYSTEMS
A system and a computer-implemented method to control transactions processed by an enterprise resource planning (ERP) system. A bank balance funds check controller checks existing bank balance funds available (BBFA), and validates transactions on detecting adequate BBFA, or prevents validation on detecting inadequate BBFA, thereby preventing negative funds resulting out of outgoing payment, by way of a restriction on a standard functionality of the BBFA fluctuating between positive and negative amounts. A negative balance controller accepts and processes incoming positive and negative receipts, and manages a situation arising there out of, irrespective of availability of adequate BBFA, resulting in negative bank funds or an increase in the existing negative bank funds available, by way of context-sensitive exceptions to the restriction. The controllers communicate with a standard functionality of the ERP system and with each other only via a central data store within a program server associated with the ERP system.
Method and apparatus for detecting suspicious activity using video analysis
A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.
Apparatus and method of a distributed capital system
A method conducting financial transactions over a computerized network, which includes conducting awareness propagation such that capital movement over a participant system-network is optimized.
METHODS AND SYSTEMS FOR VERIFYING CUSTOMER SUPPLIED FINANCIAL ACCOUNT INFORMATION USING DEBIT AND CREDIT TRANSACTIONS
Embodiment of the invention describe methods and systems for verifying customer supplied financial account information verification using debit and credit transactions. In some embodiments, these methods include electronically transmitting an electronic debit and credit transaction to the customer financial account, based on the customer supplied financial account information. The method also includes electronically transmitting a first statement descriptor, as part of at least one of the electronic debit transaction and the electronic credit transaction, that includes a first verification code. The method also includes electronically receiving, from the customer, a second verification code, and comparing, by the computer system, the transmitted first verification code with the received second verification code with respect to each other. The method also includes verifying, by the computer system, the customer supplied financial account information based on the comparison of the verification codes.
Information processing method, information processing apparatus, and program
An information processing method executed by one or more processors included in an information processing apparatus. The method includes obtaining a notice indicating that a deferred payment has been selected for a settlement of a price of a product on a website; identifying a seller to which the settlement is to be made; receiving a request for settlement on an amount of money determined based on information including information on delivery of the product and information on the price of the product; and advancing the settlement in a case where the amount of money is less than or equal to an upper limit of an amount of settlement using the deferred payment allowed for a user.
SYSTEMS AND METHODS FOR DISTRIBUTED RESOURCE ALLOCATION
Resource allocation systems (aka distributed ledgers) can overcome scalability issues while still ensuring both that system resource amounts are not corrupted and that resource recipients can trust in resources delivered to them by requiring distributed nodes maintaining account histories—in return, for instance, for transaction fees—to probabilistically verify transaction history and maintain reserve resources in their own accounts for the repair of transactions impaired by invalid previous transactions. Even in a permissionless environment, such systems can maintain eventual consistency of transaction history without impairment of the accounts of non-maintaining users.