Patent classifications
G06Q20/4014
Systems and methods for identity verification of math-based currency account holders
Math-based currency (“MBC”) transactions are inherently quasi-anonymous. Systems and methods of registering customers with a financial institution for the purposes of opening a MBC account are described. During the registration process, the financial institution gathers and stores certain information relating to the customers having MBC accounts. This information may later be used to provide verification of MBC transactions to other parties involved in the MBC transactions.
MSISDN request handling for identity fraud management
Techniques are described for delivering subscriber information of a subscriber of a wireless carrier network to an authorized partner. The techniques include receiving, from a requesting entity device, a request for subscriber information of a subscriber, the request comprising a public Internet Protocol (IP) address of a user device associated with the subscriber, determining whether the requesting entity device is associated with an authorized partner based at least on one or more credentials associated with the requesting entity device, in response to determining that the requesting entity device is associated with the authorized partner, routing the request to at least one subscriber database of a plurality of subscriber databases to obtain the subscriber information using the public IP address of the user device, and transmitting the subscriber information of the subscriber to the requesting entity device.
Systems and methods for providing card interactions
A method including receiving a first application user credential associated with a user profile; comparing, for a first match, the first application user credential with a stored second application user credential, wherein the stored second application user credential is associated with a user identity; and responsive to finding a first match, verifying the user identity by performing the following: communicating with a card using near field communication; receiving a public key of a key pair of the card and cardholder identification information of an account holder of the card; instructing the card to generate a digital signature; receiving the digital signature from the card; verifying the digital signature using the public key; and comparing, for a second match, at least a portion of the user identity with at least a portion of the cardholder identification information.
BLAZE DIGITAL STORE REMOTE MANAGEMENT SERVER
A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.
System and Method for Identity Management
Some implementations may provide a machine-assisted method for determining trustworthiness of a requested transaction, the method including: receiving, from a relying party, a request to determine a trustworthiness of a particular transaction request, the transaction request initially submitted by a user to access data managed by the relying party; based on the transaction request, summarizing the particular transaction request into transactional characteristics, the transactional characteristics devoid of source assets of the transaction, the source assets including credential information of the user, the credential information of the relying party, or information content of the requested transaction; generating first machine readable data encoding transactional characteristics of the underlying transaction as requested, the transactional characteristics unique to the particular transaction request; submitting a first inquiry at a first engine to determine an access eligibility of the user submitting the transaction request, the first inquiry including the credential information of the submitting user, as well as the summarized transactional characteristics that is applicable only once to the underlying transaction request; and receiving the access eligibility determination from the first engine.
INFORMATION GENERATION, ACQUISITION, AND PROCESSING TO IMPROVE SERVICE EFFICIENCY
An instruction to generate target information is received by a server and from a first user. The instruction includes two or more pieces of user identity information associated with two or more different users. The two or more pieces of user identity information are combined, by the server and in a predetermined method, into continuous text information. The two or more pieces of user identity information in the continuous text information are separated by one or more separation strings. The target information is generated, by the server, based on at least a predetermined algorithm and the continuous text information.
METHOD AND SYSTEM FOR DEFINING CONSUMER INTERACTIONS FOR INITIATING EXECUTION OF COMMANDS
Embodiments provide a computer-executed method, a computer system and computer program product for initiating a command. The method includes causing a consumer input definition interface to be displayed on a visual display of a computing device associated with a consumer, wherein the consumer input definition interface includes an indication of a command. The method also includes, while the consumer input definition interface is displayed, receiving input definition data defining a consumer interaction by the consumer. The method also includes generating a compound consumer input based on the input definition data, and associating the compound consumer input with the command and the consumer. The method further includes storing the association between the compound consumer input and the command on a non-transitory storage device so that receipt of the compound consumer input from the consumer automatically initiates the command.
Secure card not present transactions using chip-enabled cards
Techniques are described for performing secure card not present (CNP) transactions using integrated circuit chip-enabled cards. The techniques include continually or periodically tracking a location of a user's card by a user computing device, e.g., a “smart” phone, and storing a log of datasets relating to the location of the user's card at a server device. Based on the tracking, the user computing device may alert the user via a push notification or other message when the user's card is not within a preset range of the user computing device. In addition, an authentication server determines a location of a purchaser computing device attempting to perform a CNP transaction using the user's card information, and compares the location of the purchaser computing device with a most recent location of the user's card retrieved from the log of datasets to determine whether to approve the CNP transaction.
Bioptical barcode reader
A workstation captures images of illuminated symbols with a solid-state imager. In an embodiment, the workstation includes a removable camera module in the workstation away from the imager. The camera module captures a secondary image through a window. The captured image of the illuminated symbol and the captured secondary image are independently processed.
Transaction system architecture and methods
A method of performing a transaction between a merchant and a customer is described. The method involves a customer computing device (11), a merchant computing device (12) and a payment facilitator computing system (19). Firstly, there is agreement upon a transaction between the customer computing device (11) and the merchant computing device (12), wherein a first one of said computing devices produces a code image representing elements of the transaction.