G06Q20/4014

System and method for generating notifications based on digital wallet pass data

A server computer system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module and from a computing device, a signal including digital wallet pass data; store the digital wallet pass data in association with an account; monitor location data and data associated with a value card account to identify a notification event; responsive to identifying the notification event, generate a notification based on the digital wallet pass data; and send, via the communication module and to the computing device, a signal causing the computing device to display the notification.

Enhanced certificate authority
11316704 · 2022-04-26 ·

An enhanced certificate authority system and method allows for the enhanced security, validation and Multi-Factor Authentication of user's within a digital signature and transaction system through the creation and management of a user's Digital Identity certificate so that through an enhanced certificate authority a user's identity and bona fides may be both protected and established across a diversity of electronic devices and transactions.

Apparatuses, computer-implemented methods, and computer program products for proximate financial transactions
11720896 · 2023-08-08 · ·

Computer-implemented methods, apparatuses, and computer program products are disclosed for proximate financial transactions. An example method includes receiving a request for participation in a proximate financial transaction by a first user device associated with a first user and a first user profile where the proximate financial transaction is associated with a transfer of physical currency notes. The method further includes determining at least a second user device associated with a second user and second user profile proximate the first user for participation in the proximate financial transaction. The method also includes causing presentation of identification data of the second user via the first user device and detecting the transfer of physical currency notes between the first user and the second user. The method further includes effectuating an electronic financial transaction between a first user account of the first user and a second user account of the second user.

Blockchain-based data processing system, method, computing device and storage medium
11315115 · 2022-04-26 · ·

A blockchain-based data processing system may comprise: a transaction-side blockchain node and a server-side blockchain node on a blockchain network maintaining a blockchain. The transaction-side blockchain node may be configured to: create a transaction data structure based on an Unspent Transaction Output (UTXO) model, consolidate transaction data of a transaction according to the transaction data structure to generate shared transaction data, execute a smart contract of the transaction-side blockchain node to automatically determine a to-be-settled commission amount, update the shared transaction data according to the to-be-settled commission amount, collect the updated shared transaction data according to a preset condition, and send a to-be-settled transaction processing request comprising the updated shared transaction data to the server-side blockchain node. The server-side blockchain node may be configured to: receive the to-be-settled transaction processing request, and calculate a sum of the to-be-settled commission amount in the updated shared transaction data.

METHOD AND SYSTEM FOR ENABLING MERCHANTS TO SHARE TOKENS

One embodiment of the present disclosure provides a system and associated processes for sharing cardholder data (CHD) between a merchant that utilizes tokenization and a second merchant that may or may not utilize tokenization. In one embodiment, the merchant, or an employee of the merchant, can use the system and associated processes to reacquire CHD from a tokenization provider system. In one embodiment, the merchant identifies to the tokenization provider system a desire to share CHD, which is associated with a token, with a second merchant. The merchant and/or the tokenization provider system can then invite the second merchant to register with the tokenization provider system. Once registered with the tokenization provider system, the second merchant can access any CHD that the merchant associated with the second merchant.

Authentication method for e-wallet carrier
11315122 · 2022-04-26 · ·

The present disclosure provides an authentication method for e-wallet carrier, wherein the e-wallet carrier is stored with an authentication program, and the method comprises: an escrow institution constructs user information and a user database, and the user database has private and public key information; the escrow institution generates authentication information through the authentication program, and transmits the private key information as well as authentication program to the carrier to make the carrier in a restricted mode; when receiving verification information and confirming that its user information is correct, the escrow institution provides the authentication information to the user; after electronic receives the authentication information, the carrier is switched to be in a unlocked mode, thus to make transactions in currency. Through this, the information content of the private key information is in the custody of the escrow institution reduce the risk of man-caused loss in the private key information.

TERMINAL FOR CONDUCTING ELECTRONIC TRANSACTIONS
20230245092 · 2023-08-03 ·

The present disclosure is drawn to, among other things, a method of providing a payment terminal application on an electronic device, the electronic device comprising a volatile storage module, a user input module and a network interface module. In some aspects the method includes receiving user credentials from the user input module, transmitting an authentication request message to a remote data center via the network interface module, the authentication request message including the user credentials, receiving an authentication response message from the remote data center, the authentication response message including an indication as to whether authentication was successful, and if the authentication was successful, receiving at least one encryption key from the remote data center; and storing the at least one encryption key in the volatile storage module.

Smart platform for programming remote keyless devices

A platform for a programmable remote transmitter, designed, and programmed to perform single or multiple operations, optionally incorporated into a custom-made base that attaches to a smart phone case or other mobile devices. The remote transmitter is designed and activated via secured programming provided by an application on the user's mobile device, without the intervention of car dealers, locksmiths or using difficult manual processes. The remote transmitter can be attached to smart phones, mobile devices, or other suitable surfaces (e.g. a briefcase or a vehicle's dashboard) for safekeeping and accessibility.

System for dynamically appending and transforming static activity data transmitted to a user device application

Embodiments of the invention are directed to a system, method, and computer program product for dynamically appending and transforming static activity data transmitted to a user device application. In particular, the invention provides a secure platform for dynamic restructuring and inter-connection of inline activity data. The system first determines that a first user, via a first networked device, has initiated a first electronic activity. The system then constructs and transmits a first static activity data set to a second resource application of the second networked device associated with the second user. The system then alters the transmitted first static activity data set of the first electronic activity, in response to the second user modifying an activity parameter item of the first electronic activity, in situ, prior to finalization authorization processing of the first electronic activity by a recipient system, without requiring initialization of an additional electronic activity.

USE OF IDENTITY AND ACCESS MANAGEMENT FOR SERVICE PROVISIONING

Described is a system for monitoring provisions of services. The system includes a work order system for producing one or more work orders, an identity and access management system to verify information regarding a service provider and a system that receives a produced work order associated with a service provider upon receipt of a service request. The system requests information regarding service provider attributes from the identity and access management system, and receives from the identity and access management system information regarding at least some of the attributes of the service provider. The system determines a requisite level of expertise required for the service and determines whether the attributes received from the identity and access management system indicate that the service provider has the requisite level of attributes.