Patent classifications
G06Q20/4014
System and method of performing secured transactions in a communication network
A system and a method of data communication between a first computing device, associated with a first user, and at least one second computing device associated with a second user may include: receiving, by the first computing device, one or more data elements pertaining to details of a transaction request from the second computing device, via a voice channel; extracting said transaction request details by the first computing device; transmitting, by the first computing device, one or more authentication data elements of an electronic wallet module, comprised in the first computing device, to the second computing device, via the voice channel; and carrying out the requested transaction by the first computing device, based on the extracted transaction request details and the electronic wallet authentication data.
Systems and methods to provide user verification in a shared user environment via a device-specific display
A method of generating a shared augmented reality payment authentication entry interface includes detecting a first consumer device and a second consumer device; prompting a display of a first augmented reality payment authentication interface at the first consumer device; and prompting a display of a second augmented reality payment authentication interface at the second consumer device.
Dynamic generation of digital messages with unique links for direct-to-merchant payments
A payer initiates a payment transaction of a certain dollar amount through a user interface provided by their bank. The bank generates a hyperlink associated with the payment transaction. By managing a state of the transaction, the hyperlink can be given an expiration time and/or a counter of visits. The hyperlink is sent to a payment recipient in a text message or email, either by the payer or by the bank. Upon following the hyperlink, the recipient can enter their own debit card information to receive the money transfer to their debit account, without the need to set up an account login or account. A notification mechanism, such as a broadcast stream of payments, can be employed to inform different entities (such as those recording property payments or utilities payments) that a payment was made to the payment recipient.
KEY-VALUE MAP COMMITMENTS SYSTEM AND METHOD
A method includes a validation computer receiving an authorization request message comprising a user state and a user proof from a user device. The user state comprises first and second user state elements. The user proof comprises first, second, and third user proof elements. The validation computer computes a first verification value by multiplying the first user proof element raised to the power of the second user state element, and the second user proof element raised to the power of the first user state element. The computer computes a second verification value by raising the second user proof element to the power of the second user state element. The computer compares the first verification value to a first accumulated state element of an accumulated state. The compares the second verification value to a second accumulated state element. The validation computer authorizes the authorization request message based on the comparison steps.
SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING AND VERIFYING PURCHASE OFFERS
The present invention relates to systems, methods and computer program products for providing in-store purchase offers. A control system is configured to receive event data from a mobile device and provide purchase offers based on obtained event data. An optically readable code for verifying that the customer is authorized to take advantage of a purchase offer is displayed on the customer's mobile device in response to an identified event. The consumer is provided with a purchase offer including at least a second product different from the first product associated with an image acquired by the mobile device.
IDENTITY SERVICES SYSTEMS AND METHODS
Systems, methods, and apparatuses for storing verified identification information in a distributed database and for verifying entities to requestors are provided herein. Identity information relating to an entity is verified by a generally recognized identity provider (GRIP). Once verified, the GRIP populates a distributed database with an entry corresponding to the verified identity information. The distributed database is publically accessible such that identity requestors can see the entries in the distributed database. In some arrangements, the distributed database is write-protected such that only an authorized GRIP can modify the distributed database. An entity can provide information to a requestor to verify an identity attribute of the entity to the requestor. The requestor uses information provided by the entity to retrieve verified entity identification information from the distributed database and to confirm that the identity attribute was verified by an authorized GRIP.
Method for processing transaction data, corresponding communications terminal, card reader and program
A method for processing transaction data, implemented by a communications terminal having a touch screen. The method includes: detecting a necessity of entering a piece of personal identification data; transmitting to a card reader connected to the communications terminal a request for supporting a display of a virtual keypad, the request comprising a piece of data representing a passage of the communications terminal from a “master” mode to a “slave” mode of operation, the slave mode leading to implementation of the method for processing transaction data under the exclusive control of the card reader; of entry, by the user on the virtual keypad, of the piece of personal identification data; and receiving, from the card reader, the piece of personal identification data.
DISPENSING OF CONTROLLED/RESTRICTED ITEMS
In one aspect, a system (5) for facilitating procurement of a controlled or restricted item requested by a consumer via a dispensing event is disclosed. In one embodiment, the system is configured operable for enabling an authentication event in respect of the consumer's request, the authentication event involving an identifier and a characteristic associated with the identifier which provides an indication of successful verification of the consumer's eligibility to procure the controlled or restricted item. The system (5) is further configured operable for authorising dispensing of the controlled or restricted item by way of the dispensing event on a determination of the characteristic indicating successful verification of the consumer's eligibility to procure the item following acknowledgment of the identifier on presentation of same at the dispensing event.
Payment method, client, electronic device, storage medium, and server
Embodiments of this application disclose a payment method, a client, an electronic device, a storage medium, and a server. The method includes: receiving a payment instruction of a user; generating, according to audio information in a voice input of the user, a voice feature vector of the audio information; performing matching between the voice feature vector and a user feature vector; and when the matching succeeds, sending personal information associated with the user feature vector to a server, so that the server performs a payment operation for a resource account associated with the personal information. The method can bring convenience to shopping by a consumer.
Systems and methods for dynamic identity decisioning
Example systems and methods for dynamic identity decisioning include: receiving a request, from a third-party server, to confirm an identity of a user attempting a transaction through a third-party website displayed in a first application window on a user device of the user; causing the user device to display a second application window for presenting an identity decisioning application and at least partially overlapping the first window; assessing a risk level associated with the transaction based on identity verification data retrieved from the user device; and if the risk level exceeds a predetermined threshold, selecting at least one identity authentication exam for presentation to the user via the second window, determining an outcome of the at least one identity authentication exam based on a user response thereto, and determining an identity decisioning result based on the outcome; and presenting the result to the user via the second application window.