G06Q20/4014

SYSTEMS AND METHODS FOR REAL TIME SYSTEM ONBOARDING USING IDENTIFIER POOLING
20220122138 · 2022-04-21 ·

A method and apparatus for real time onboarding using identifier pooling are described. The method may include receiving, from a merchant system, a transaction request using a merchant system identifier and merchant system authentication credentials associated with the merchant identifier, the transaction request specifying a payments partner system to process at least a part of the transaction. The method may also include determining whether the merchant system is onboarded for use of the payments platform system. When the merchant system is determined not to be onboarded for use of the payments platform system, the method may also include selecting a commerce platform system payments partner identifier from a pool of available commerce platform system payment partner identifiers provisioned by the payments partner system for the commerce platform system, and updating a merchant accounts data store by associating the selected commerce platform system payments partner identifier with the merchant identifier. The method may also include processing the transaction using the selected payments partner identifier associated by the commerce platform system with the merchant ID for performing the transaction.

SYSTEMS AND METHODS FOR AUTHENTICATING ONLINE USERS AND PROVIDING GRAPHIC VISUALIZATIONS OF AN AUTHENTICATION PROCESS

A computer-implemented method for authenticating an online user includes steps including receiving, from a requestor server in communication with a merchant website, an authentication request message including authentication data collected from a user computing device during an online interaction with the merchant website. The steps also include extracting the authentication data from the authentication request message, and applying a risk-based authentication (RBA) engine to the authentication data to obtain RBA result data including a reason code that includes no more than three bytes of data. The steps further include causing the reason code to be embedded in an authorization request message generated during the online interaction and routed to a decisioning server via a payment network. The authorization request message is formatted according to a set of proprietary communications standards promulgated by the payment network for exchange of data between institutions that are members of the payment network.

SYSTEMS AND METHODS FOR SECURE REDEMPTION OF ELECTRONIC TICKETS USING BLOCKCHAIN PROTOCOLS
20220122072 · 2022-04-21 ·

Various embodiments of the present disclosure relate generally to systems and methods for secure redemption of electronic tickets. In an exemplary embodiment, secure redemption of electronic tickets may be achieved using a unique dynamic QR barcode that is encoded with information identifying a specific customer. In an exemplary embodiment, secure redemption of electronic tickets may be achieved using a distributed system with blockchain protocols and smart contracts. More specifically, particular embodiments of the present disclosure relate to systems and methods for creating a blockchain-based online ticketing platform that is fully decentralized, completely public, and may be entirely transparent to a buyer and/or a seller of live event tickets (e.g., sporting events, concerts, theatrical productions, and other live entertainment events).

SYSTEMS AND METHODS FOR AUTOMATICALLY GENERATING FRAUD STRATEGIES
20230245122 · 2023-08-03 ·

This application relates to systems and methods for automatically generating fraud strategies. A system may comprise customer computing devices, a database, and retailer computing device(s). The retailer computing device(s) are configured to receive data related to customer transactions, calculate a negative reaction score, negative resolution score, anomaly score, and impact score for at least one value of the received data, determine whether the calculated scores are greater than or equal to respective thresholds, identify a value of the received data as a potentially fraudulent data value when one or more of the calculated scores is greater than or equal to its respective threshold, generate an output comprising a list of potentially fraudulent data value(s) and impact scores, identify area(s) of high impact leaks based on the output, and determine which customer computing devices are executing fraudulent transactions based on the identification of areas of high impact leaks.

SYSTEMS AND METHODS FOR DIGITALLY ISSUED LOYALTY ENROLLMENT
20230245123 · 2023-08-03 ·

Systems and methods for implementing an auto-pause functionality for recurring payment transactions that continue to be charged, despite being associated with an unavailable merchant service as mandated by a public closure restriction. One operational aspect of the disclosed system/method is active detection of a possible closure condition based on monitoring a ratio of on-line (Card Not Present) to in-person (Card Present) transactions, internally computed over several time windows. The outcome of the ratio test falling below a predefined value is indicative of a possible public closure condition. There is an external verification step based on externally provided information associated with a published closure notification. Disclosed process further involves an indexing operation for parsing and tracking of recurring transaction string data to facilitate the identification of invalid recurring transaction strings, once a public closure condition is verified.

AUGMENTED USER AUTHENTICATION

A computer-implemented method includes: setting up, by a computing device, an identification profile by capturing a first image using a camera of the computing device; requesting, by the computing device, an authentication action by an authentication device; comparing, by the computing device, recognized elements of the first image and a second image, the recognized elements of the first image and the second image including at least one of ephemeral features and transient features; determining, by the computing device, whether a confidence level is above a predetermined threshold based on a comparison of the recognized elements of the first image and the second image; and completing, by the computing device, authentication of the computing device with the authentication device in response to a determination that the confidence level is above the predetermined threshold.

DIRECT TRANSACTION DATA ENTRY CODING AND INTEGRATION

A system for annotating transactions includes a computing server configured to retrieve annotation requirements for transaction accounts of an organization client, where the annotation requirements specify a data field of a third-party platform's schema that is used to organize transaction data. The organization client may further specify which transactions need to be annotated using selection criteria. The computing server processes transactions incurred using the transaction accounts and identifies unannotated transactions using the selection criteria. End users who are responsible for annotating the unannotated transactions are provided direct links to annotate the unannotated transactions. Upon receiving annotations from the responsible end users, the computing server can display annotated transaction data for an administrator of the organization client.

IDENTITY VERIFICATION USING A VIRTUAL CREDENTIAL
20230245125 · 2023-08-03 ·

In some implementations, an identity verification device may receive a request to verify an identity associated with a user accessing a social media account to share information on a social media platform. The identity verification device may generate, based on the request, a virtual credential linked to a primary credential associated with a financial account belonging to a holder of the social media account. The virtual credential may be used in an identity verification transaction to prove that the user accessing the social media account has access to the financial account associated with the social media account holder. The identity verification device may store a record indicating that the virtual credential was used to conduct the identity verification transaction and may provide, to the social media platform, information to verify the identity associated with the user accessing the social media account based on the record.

Systems, Methods, and Devices for Generating and Trading Environmental Credits
20220122172 · 2022-04-21 ·

Systems and methods of the present disclosure may collect data associated with a user activity. The data may be transmitted from an app running on a computing device with a user account authenticated by the computer-based system. The system may calculate a carbon footprint of the user activity based on the data associated with the user activity. An amount of carbon credits may be assigned to a user account authenticated with the computer-based system based on the calculated carbon footprint of the user activity. A transaction may be written to a blockchain retiring the amount of carbon credits in response to a request to offset a carbon footprint.

MANAGEMENT PLATFORM FOR COMMUNITY ASSOCIATION MGCOne Online Platform and Marketplace
20230245189 · 2023-08-03 ·

A system for a community association management platform and marketplace including: a processing component of a management server node connected to a plurality of entities over a blockchain network of an association management platform and marketplace and a memory component on which are stored machine-readable instructions that when executed by the processing component, cause the processing component to: receive an onboarding request from an entity off chain; parse the onboarding request to derive a role of the entity; broadcast the onboarding request and the role to a plurality of minimum required entities on the blockchain network; responsive to receiving an onboarding consensus from the plurality of minimum required entities, onboard the entity onto the association management platform and/or marketplace; establish digital identity and login credentials for the entity; determine a role of the entity based on the credentials; and enable a UI portal for the entity based on the role.