G06Q20/4014

TWO-DIMENSIONAL CODE TRANSACTION PROCESSING COMMON GATEWAY

Embodiments of the invention may provide a technical solution by creating an interoperable or common transaction payment gateway with two-dimensional code so that legacy two-dimensional code payment platform may communicate with the more robust transaction payment platform. Aspects of the invention design a handle message, instead of the typical actual transaction message, encoded in the two-dimensional code such that merchants or consumers may transmit such handle to be further processed or decoded by the transaction handler. An advantage of embodiments of the invention may no longer need the consumer or merchant to upgrade its existing device to interpret the two-dimensional code to retrieve the handle and may no longer need to upgrade its payment processing network infrastructure. Embodiments of the invention bridge a gap between the legacy close loop two-dimensional code infrastructure and the robust and sophisticated payment transaction infrastructure.

CRYPTOCURRENCY TRANSACTION ANALYSIS METHOD AND SYSTEM
20220027900 · 2022-01-27 ·

The present invention relates to a method and system for analyzing cryptocurrency transactions, and more particularly, a method and system for analyzing and processing cryptocurrency data using attributes of cryptocurrency to analyze a transaction flow of cryptocurrency, which has been difficult to grasp in the past. The present invention is a method of analyzing a cryptocurrency transaction by an electronic device and is characterized by including a blockchain management step of collecting distributed ledger information of a blockchain corresponding to a specific cryptocurrency and standardizing blockchain data extracted from the distributed ledger information, a multi-type data management step of collecting and standardizing multi-type data related to the cryptocurrency transaction on a Web, a graph generation step of constructing a cryptocurrency network graph using the standardized blockchain data, constructing a knowledge graph using the standardized multi-type data, and mapping the cryptocurrency network graph and the knowledge graph to generate a multi-layer based transaction analysis knowledge graph, and a graph analysis step of searching for transaction information using a first cryptocurrency address for which a fund flow is to be tracked as an input address in the transaction analysis knowledge graph, generating a fund flow graph having the input address and an output address as nodes to track a fund flow, and identifying an attribute of each node included in the fund flow graph using the knowledge graph. According to the present invention, it is possible to analyze a transaction flow of cryptocurrency and identify a transaction subject.

ADDING A CREDIT ACCOUNT TO A MOBILE WALLET TO MAKE A TRANSACTION WHEN THE PHYSICAL CARD ASSOCIATED WITH THE CREDIT ACCOUNT IS UNAVAILABLE
20220027891 · 2022-01-27 · ·

A system and method for adding a virtual credit account to a mobile device is disclosed. The system receives a contact information for a customer at a store's electronic device, the contact information comprising: at least one of a device identifier (ID) and a user ID, the contact information being part of a request for a pre-existing credit account to be added to the customer's mobile device. An access to an account lookup/verification for the pre-existing credit account is provided to the customer's mobile device, the access generate an out-of-band verification. the request for the pre-existing credit account to be added to the customer's mobile device in conjunction with the out-of-band verification is provided by the customer's mobile device. The pre-existing credit account is then added to the customer's mobile device in a digital format allowing the customer to make a purchase.

Systems and methods for use in authenticating users to accounts in connection with network transactions

Systems and methods are provided for authenticating users to accounts in connection with network transactions. An exemplary method includes receiving an authentication request associated with a transaction where the authentication request includes a credential associated with the account, and transmitting an authentication assertion request to an entity associated with the account other than an access control server (ACS) associated with an issuer of the account. The method also includes providing an authentication confirmation, in response to the authentication request, when the entity provides an authentication assertion for the transaction based on a prior authentication of the user, whereby the transaction proceeds based on the authentication confirmation and without authentication specific to the transaction. The method further includes seeking authentication of the user, based on the authentication request, from the ACS, when the entity provides instruction to seek authentication of the user or fails to respond to the authentication assertion request.

NORMALIZATION GRID

A multi-lender architecture evaluates applicant data against lending rule sets of multiple lenders. Rule sets provided by different lenders may be expressed differently. The multi-lender architecture transforms the rules in each rule set and represents the rules in a normalization grid. The normalization grid allows a single algorithm to evaluate the rules of different lenders.

SYSTEMS AND METHODS FOR USE IN BINDING INTERNET OF THINGS DEVICES WITH IDENTITIES ASSOCIATED WITH USERS
20220029985 · 2022-01-27 ·

Systems and methods are provided for binding an IoT device with an identity of a user, whereby action by the IoT device may be attributed to the user. One example computer-implemented method includes verifying a user and, in response to the verification, compiling and storing identifying data for the user. The method also includes receiving an IoT device ID associated with an IoT device, from a communication device associated with the user, and appending the IoT device ID to the identifying data for the user. The method then includes receiving a request indicator from the IoT device, seeking authentication of the user at the communication device, and in response to the request indicator and the authentication of the user, provisioning, to the IoT device, at least a portion of the identifying data for the user.

Systems and methods for securely verifying a subset of personally identifiable information
11188913 · 2021-11-30 · ·

Disclosed are systems and methods for securely verifying a subset of personally identifiable information (PII) of a first user to a second user is disclosed. A computer-implemented method may include receiving a query request from the second user through a second user application to verify the subset of PII of the first user; prompting the first user, through a first user application, to authenticate the query request; in response to the first user authenticating the query request, processing the query request to identify, in a secured database, the subset of PII of the first user stored in the secured database, to generate an identified subset of PII; comparing the subset of PII to the identified subset of PII to determine if a condition is satisfied; based on the comparing, generating an answer to the query request; and transmitting the answer to the second user through the second user application.

Payment Processing Using Electronic Benefit Transfer (EBT) System

Systems and methods are described for incorporating electronic benefit transfer (EBT) systems into a secure, mobile, and electronic payment processing system. Existing EBT systems capture data regarding a purchase. This record keeping functionality can be harnessed to provide retailers and marketers with data regarding marketing efforts, coupon use, and more. A mobile device can be used to interact with a presence detection system. Coupons or payment information can be received at a mobile device, and payments can be carried out between a mobile device and a points of sale (POS).

METHODS AND SYSTEMS FOR DECONFLICTING DATA FROM MULTIPLE SOURCES IN COMPUTER SYSTEMS

Methods and systems are described for verifying an identity of a user through contextual knowledge-based authentication. The system described uses contextual knowledge-based authentication. By verifying an identity of a user through contextual knowledge-based authentication, the verification is both more secure and more intuitive to the user. For example, by relying on confidential and/or proprietary information, the system may generate verification questions, the answers to which are known only by the user.

SERVICE PROCESSING METHOD AND APPARATUS
20220027868 · 2022-01-27 ·

Implementations of the present specification provide a service processing method. The method is performed by a service platform, the service platform including multiple area sites corresponding to multiple service areas, and each area site including a corresponding buyer service site and seller service site. The method includes: splitting a whole-order service into a buyer service and a seller service; further, on one hand, routing the buyer service to a buyer service site in a service area that a corresponding buyer belongs to, for the buyer service site to process the buyer service through interconnection with the buyer based on an area user identifier, and to locally store processed data, where the area user identifier is determined based on multiple area identities associated with a domain-wide identity corresponding to the buyer; and on the other hand, routing the seller service to a seller service site in a service area that a corresponding seller belongs to, for the seller service site to process the seller service through interconnection with the seller, and to locally store processed data.