Patent classifications
G06Q20/4014
METHOD AND SYSTEM FOR USE OF BIOMETRIC INFORMATION ASSOCIATED WITH CONSUMER INTERACTIONS
Embodiments provide a computer-executed method, a computer system and computer program product for facilitating a commercial transaction. The method includes transmitting computer-executable instructions to cause a representation of an item to be displayed on a consumer interface rendered on a visual display of a computing device associated with a consumer. The method also includes receiving, from the computing device, an indication of consumer input performed using the consumer interface, the consumer input associated with the representation of the item available for a commercial transaction. The method also includes receiving, from the computing device, biometric information associated with the consumer. The method also includes determining an identity of the consumer based on the biometric information and, based on the identity of the consumer, associating the consumer input with a predetermined command defined for the consumer. The method further includes transmitting computer-executable instructions to facilitate a transaction associated with the command with respect to the item.
Security key input system and method using one-time keypad
Provided is a security key input system using a one-time keypad. The security key input system may include: a keypad input unit configured to output a security keypad including one or more null keys each having no identification mark written thereon, and receive a security key from a user; a control unit comprising a one-time keypad generator configured to generate a one-time keypad; an input terminal comprising an NFC recognition unit configured to provide the one-time keypad generated by the one-time keypad generator to an output terminal through NFC with the output terminal contacted with the input terminal; a display module; an NFC recognition module configured to receive the one-time keypad from the input terminal through the NFC recognition unit; and the output terminal comprising a controller configured to output the one-time keypad received from the NFC recognition module through the display module.
SECURING TRANSACTIONS VIA MULTI-DEVICE AUTHENTICATION
Systems and methods are disclosed for securing transactions via multi-device authentication. In one implementation, a transaction initiation request is received. The transaction initiation request is processed to generate a first transaction segment and a second transaction segment. A first authentication input is received, via a first device, with respect to the first transaction segment. In The first authentication input is validated. A second authentication input is received via a second device with respect to the second transaction segment. The second authentication input is validated. Based on a validation of the first authentication input with respect to the first transaction segment and a validation of the second authentication input with respect to the second transaction segment, execution of a transaction corresponding to the transaction initiation request is initiated.
SYSTEMS AND METHODS FOR BLOCKCHAIN-BASED PAYMENTS
Methods and systems for processing a blockchain comprising a plurality of immutable insurance policy payment records corresponding to insurance policies are provided. According to certain aspects, a transaction request indicating a policy payment for an insurance policy may be received at a first node. A block including an insurance policy payment record indicating the policy payment may be added to a blockchain and transmitted to another node for validation. The first node may add the block to a copy of the blockchain, where the block may be identified by a hash value that references a previous block in the blockchain that includes at least one additional insurance policy payment record.
BLOCKCHAIN BASED BANKING IDENTITY AUTHENTICATION
Systems and methods are disclosed for interacting with a blockchain and users of the blockchain to perform banking identity authentication services. For example, a method may include receiving a bank transaction from a participant; verifying the bank transaction; generating and communicating a confirmation that the bank transaction is valid to the participant; adding the bank transaction to a block of bank transactions; generating a cryptographic hash for the block of bank transactions; solving a cryptographic puzzle involving the hash of the block of bank transactions; adding the block to the blockchain; and/or transmitting the solution to the cryptographic puzzle, and the block of bank transactions to another participant. Otherwise, if the identity data is not valid, generating and communicating the confirmation that the bank transaction is not valid to the participant.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROCESSING A PAYMENT TRANSACTION VIA A PROXY GUARANTOR
A method for processing a payment transaction via a proxy guarantor includes receiving a transaction request associated with a payment transaction for a transaction amount. The payment transaction is associated with a user, and the transaction request includes: payment device data associated with a payment device of the user, the payment device associated with a debit account, and guarantor data identifying a guarantor associated with a credit account. The method further includes communicating a hold request to an issuer system associated with the credit account to cause the issuer system associated with the credit account to place a hold on the credit account for at least a portion of the transaction amount, and communicating an authorization request to an issuer system associated with the debit account.
ELECTRONIC CASH-BASED OFFLINE TRANSACTION METHOD AND SYSTEM
Provided is an electronic cash-based offline transaction method and system. The method includes: receiving, by a back-end server from a smart card, an anti-replay factor generated by the smart card; determining, by the back-end server in accordance with a predetermined algorithm, whether an abnormal transaction occurs on the smart card, generating, by the back-end server when no abnormal transaction occurs, a security information signature by signing security information with a private key of the back-end server, and transmitting, by the back-end server, the security information and the security information signature to the smart card (S2).
Transaction Methods for Mobile Wallet Operations in a Gaming Environment
Disclosed herein are systems, methods, and devices for transaction methods for mobile wallet operations in a casino. Various embodiments are directed to applying funds to a user's mobile wallet by transactions at a kiosk, cage, Peripheral System, or other system of the casino. Embodiments are also directed to applying credit to an electronic gaming machine of the casino. Embodiments are also directed to returning or redeeming credit from an electronic gaming machine of the casino to the user. Embodiments are also directed to transferring credit from a mobile wallet to external funds.
SYSTEM AND METHOD FOR GENERATING A RECOMMENDATION
A method of generating recommendations for a collective profile, the collective profile being linked to a first profile and a second profile. The method may include authenticating a login request from an end user device in association with the collective profile based on credentials associated with the first profile, identifying a query from among a plurality of queries and transmit the query to the end user device, receiving a response to the query, determining that the response is not inconsistent with one or more earlier responses received in association with the second profile and, in response, refining at least one attribute or goal in the collective profile based on the response to generate and store a refined collective profile, and determining whether the refined collective profile results in a new recommendation and, if so, outputting the new recommendation.
Method for proving digital assets of transaction platform
Example embodiments relate to methods of proving digital assets. The method includes identifying users on an asset transaction platform. The method includes generating a snapshot for each identified user at a first time. Each snapshot includes a user identity and user assets amount for the user at the first time. The user assets amount is a total amount of digital assets held by the user on the asset transaction platform at the first time. The method includes transforming each snapshot into a string combined hash value. Each string combined hash value is generated by hashing one of the snapshots of the user identity and the user assets amount for the first time. The method includes generating a merkle tree. The merkle tree includes a leaf node for each of the string combined hash values. The method includes performing an audit process of the asset transaction platform for the first time.