Patent classifications
G06Q20/38215
COMPANION DEVICE AUTHENTICATION
The subject disclosure provides systems and methods for companion device authentication. A user of a first device may not have access to a service that can be provided by the first device. The service may be a streaming service, a cloud-based service, or the like. Companion device authentication can allow the user, or another user, to authorize access to the service at the first device, using a companion device to the first device. The first device and the companion device may exchange communications to nominate the companion device prior to notifying a user of the companion device of a companion device authentication request for the first device.
ELECTRONIC PAYMENT PROCESSING USING ADJUSTED INTERCHANGE RATE
An encrypted payment message is received from a buyer relating to a transaction with a merchant. The payment message is parsed using a first parsing algorithm to obtain merchant identifying information. The merchant identifying information is associated with at least a second parsing algorithm or at least one settlement algorithm. The payment message is parsed using the second parsing algorithm to obtain payment information for the transaction. A first settlement algorithm is applied to the payment information to determine an adjusted interchange rate. The payment information including the adjusted interchange rate is submitted to a third party settlement processor on behalf of the merchant, using a payment algorithm. A second settlement algorithm applied to the payment information determines a buyer rebate which can be submitted to the settlement processor. A transaction result is reported to at least one of the merchant or the buyer.
AUGMENTED REALITY CARD ACTIVATION EXPERIENCE
Various embodiments are generally directed to enhancing a card activation experience for an authorized card user when activating a new card by at least displaying various types of information related to the new card in augmented reality (AR) and allowing the user to perform the activation itself or experience other aspects of the activation process in AR. Information pertaining the successful activation of the card may also be provided to the user in AR.
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.
DATABASE SYSTEM PUBLIC TRUST LEDGER MULTI-OWNER TOKEN ARCHITECTURE
A request to perform an action related to a smart contract recorded on a public trust ledger external to the database system may be received via a communication interface at a database system. The request may authenticate a designated database system account. A determination may be made as to whether the designated database system account is authorized to perform the action by accessing definition information for a public trust ledger synthetic party identifying a plurality of database system accounts authorized to perform one or more actions related to the smart contract. The database system may communicate with a token exchange to perform the action by executing the smart contract when it is determined that the designated database system account is authorized to perform the action.
DATABASE SYSTEM PUBLIC TRUST LEDGER TOKEN CREATION AND EXCHANGE
A request to exchange of a first quantity of a first fungible digital token type stored within a smart contract instance recorded in a public trust ledger and owned by a first party within the public trust ledger may be received via a communication interface at a database system. The request may authenticate a first account in the database system. The first account may be linked with the first party within the public trust ledger. The smart contract instance may be executed to determine whether the requested exchange is permissible based on one or more transaction rules included within the smart contract instance. The database system may be updated to reflect a transaction recorded within the public trust ledger when it is determined that the requested exchange is permissible.
Cloud-based electronic payment processing
A payment processing server generates an asymmetric cryptographic key pair, over one secure communications channel providing a mobile device with one cryptographic key of the cryptographic key pair, and saves another cryptographic key of the cryptographic key pair in a pending transaction database in unique association with a single-use payment number and a financial account. The server encrypts the payment number, which does not identify the financial account, with the another cryptographic key and provides the mobile device with the encrypted payment number over another secure communications channel distinct from the one secure communications channel. The server receives from a payment terminal a payment completion request that includes the encrypted payment number decrypted with the one cryptographic key. The payment processing server queries the pending transaction database with the decrypted payment number to identify the associated financial account, and effects completion of the transaction using the identified financial account.
TRANSACTION AUTHENTICATION AND VERIFICATION USING TEXT MESSAGES AND A DISTRIBUTED LEDGER
Systems, methods, and computer media for authenticating transactions, storing transaction information, communicating with users, and providing proof of transactions using text messages (e.g., text messaging on a feature phone) and a distributed ledger are described herein. A text-messaging communication session can be established between a user's mobile device and a distributed ledger. In the communication session, transaction information for a transaction associated with the user can be transmitted from the mobile device to the distributed ledger via text message. A geolocation of the mobile device can be extracted from the text message(s). The transaction information can be encrypted and stored, along with the geolocation of the mobile device, directly in the distributed ledger in association with the user. Upon receiving a request for proof of the transaction, the encrypted transaction information stored directly in the distributed ledger can be decrypted and provided and as proof of the transaction.
MULTI-BLOCKCHAIN TOKEN REBALANCER
Certain aspects of the present disclosure provide techniques for multi-blockchain token rebalancing. According to certain embodiments, a target ratio defining a first quantitative relationship between an amount of a token present is determined for each of a plurality of blockchains. A current amount of the token is received for a first blockchain, and in some embodiments, a first ratio is generated for the token present on each of the plurality of blockchains, based on the current amount. The current amount is compared to the target ratio to generate a ratio difference. Based on the ratio difference, a rebalancing transaction is executed on the first blockchain to bring the amount of the first token closer to the target ratio for the first blockchain.
Systems and methods for authenticating user identities in networked computer systems
The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.