G06Q20/4014

System and method for secure electronic payment

A payment system is described. The payment system includes a transaction system. The transaction system is configured to receive, from a merchant system, a request for a code to complete a sales transaction between the merchant system and a payment application installed on a client system, the request including information about the sales transaction. The payment system is also configured to, in response to the request for the code to complete the sales transaction, generate the code based on the information about the sales transaction. Further, the transaction system is configured to transmit the code to the merchant system. The merchant system is configured to provide the code to the client system.

Method, apparatus and electronic device for identifying risks pertaining to transactions to be processed

A method for identifying a risk pertaining to a transaction to be processed, includes: identifying a risk pertaining to a transaction to be processed via a fast identification layer in a risk control system, thereby obtaining a first identification result; identifying a risk of interference pertaining to the transaction to be processed via a model for identifying transactions susceptible to interference, thereby obtaining a second identification result; and determining a processing manner for the transaction to be processed based on the first identification result and the second identification result, the processing manner including releasing the transaction to be processed, or further identifying the risk pertaining to the transaction to be processed via the in-depth identification layer in the risk control system.

Automated store system and server
11367285 · 2022-06-21 · ·

A store management server configured to communicate with a first gate control device that controls a first gate installed in a store includes a network interface, and a processor configured to identify a customer entering the store, acquire customer information about the detected customer, detect that the customer is holding a commodity in the store, acquire sales restriction information about the commodity held by the customer, determine whether the customer is eligible to buy the commodity held by the customer based on the acquired customer information and sales restriction information, and control the network interface to transmit, when it is not determined that the customer is eligible to buy the commodity, a first command to the first gate control device. The first command causes the first gate control device to close the first gate.

SYSTEM ARCHITECTURE AND DATABASE FOR CONTEXT-BASED AUTHENTICATION
20220191198 · 2022-06-16 ·

An authentication correlation (AC) computing device is provided. The AC computing device includes a processor and a memory. The AC computing device receives a first authentication request from a requesting computer device including an account identifier, a first timestamp, and at least one authentication factor, and determines a first security level of the first authentication request. The AC computing device stores the first security level and the first timestamp. The AC computing device is also configured to receive a second authentication request including the account identifier and a second timestamp, determine that the second authentication satisfies an authentication rule based on the account identifier, the second timestamp, and the stored authentication data wherein the rule defines a timeframe and an authentication threshold, and generate an authentication response based on the determination and the authentication rule wherein the authentication response includes an approval indicator.

DISTRIBUTED LEDGER SYSTEMS, METHODS AND DEVICES

A distributed ledger system configured to create, update and maintain at least one blockchain indicative of transactions performed by a network of users of the system, the system comprising a network of computing devices including a network of user nodes in communication with one another to participate in transactions and subsequently write the transactions to an associated blockchain, each node being associated with at least one processor and at least one computer-readable medium having recorded thereon instructions to be executed by the processor(s) to carry out one or more blockchain-related tasks for creating, updating and/or maintaining at least one associated blockchain of the system based on the transactions; and wherein the network of computing devices is operable to enable at least one ephemeral user node to join the network of computing devices to carry out the blockchain-related tasks in association with at least one blockchain during an active session of the ephemeral user node.

SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR PERFORMING A TRANSACTION IN RELATION TO AN IDENTITY CENTRIC DATASET
20220188822 · 2022-06-16 ·

Disclosed is a method, system and computer readable medium for performing a transaction in relation to an identity centric dataset. In one aspect, the method comprises: establishing, by a consortium network, a set of permitted data operations for a service network using a plurality of privacy schemas; receiving, by the service network, a transaction request to perform the transaction in relation to the identity centric dataset associated with a data owner; identifying, by the service network from the plurality of schemas and based on the transaction request, a privacy schema from the plurality of privacy schemas for use in performing the transaction; performing the transaction by executing, in a trusted execution environment of the service network, one or more data operations from the set of permitted data operations upon the identity centric dataset of the data owner as permitted by the identified privacy schema thereby generating a manipulated dataset and transaction metadata; recording the transaction metadata to a distributed ledger of the service network; and transferring the manipulated dataset to a data receiver indicated by the transaction request.

REDUCING INFORMATION REQUIREMENTS IN DIGITAL ELECTRONIC TRANSFERS

Systems and methods for transferring between accounts in the absence of sensitive information needed to perform a direct transfer between accounts are described herein. In an embodiment, an intermediary system receives a request to perform a digital electronic transfer of an item from a first online account to a second online account through the intermediary system, wherein the intermediary system does not have access to the sensitive information for either the first online account or the second online account. Without requesting the sensitive information for either the first online account or the second online account, the intermediary system responds to the request by: performing a first digital electronic transfer of the item from the first online account to a system account, storing data assigning the item to an intermediary account for which the intermediary system has the sensitive information, and performing a second digital electronic transfer of the item from the system account to the second online account.

BLOCKCHAIN-BASED TRANSACTION KIOSK
20220188787 · 2022-06-16 ·

The systems and methods described herein provide for facilitating in-person payments at a transaction kiosk. First, the system provides an authentication interface for display at a network-enabled transaction kiosk. A user is authenticated at the kiosk via the authentication interface, and based on that authentication, the system detects a payment application and a payment request corresponding to the user, wherein the payment application is associated with a service provider and the payment request was created with the payment application. Next, the system identifies a user interface scheme associated with the payment application, and then updates the user interface for display at the transaction kiosk to match the user interface scheme, then initiates a blockchain payment based on the payment request.

SYSTEM FOR IMPLEMENTING CENTRALIZED RESOURCE DISTRIBUTION FRAMEWORK

Systems, computer program products, and methods are described herein for implementing centralized resource distribution framework. The present invention is configured to electronically receive, from a computing device associated with a client, an indication to initiate a resource transfer to a user; retrieve, from a resource repository, one or more resource transfer parameters associated with the user based on at least the information associated with the user; and execute the resource transfer to the user based on at least the one or more resource transfer parameters, wherein executing further comprises transferring the resource from a source repository to the one or more target repositories via the one or more resource routing channels.

TWO-DIMENSIONAL CODE COMPATIBILITY SYSTEM
20220188803 · 2022-06-16 ·

A method is disclosed. The method comprises receiving, in an interaction by a switch computer from a second device, data associated with a machine readable code generated by a first application on a first device and provided by a first device to a second application on the second device. The method also includes determining, by the switch computer, a first server computer associated with a first application, transmitting the data associated with the machine readable code and the interaction data to the first server computer, which processes the data associated with the machine readable code and the interaction data, determining, by the switch computer, a second server computer associated with the second application, and transmitting, by the switch computer, a communication to the second server computer. The communication informs the second server computer that the first server computer processed the data associated with the machine readable code and the interaction data.