Patent classifications
G06Q20/4014
INTERACTIVE VIRTUAL REALITY SYSTEM
Provided herein are method, apparatus, and computer program products for generating a first and second three dimensional interactive environment. The first three dimensional interactive environment may contain one or more engageable virtual interfaces that correspond to one or more items. Upon engagement with a virtual interface the second three dimensional interactive environment is produced to virtual simulation related to the one or more items.
BLOCKCHAIN BASED ALIAS INTERACTION PROCESSING
A blockchain based alias directory may be utilized. Encrypted lists of aliases may be stored on the blockchain and may be accessible to network computers and secure gateways. Embodiments are directed to secure gateways and user devices for accessing the alias directory stored in the blockchain during a financial transaction. The user device may be provided with a list of aliases from which a user may select a payment account. Upon selection the user may be redirected to an identity verification system of the associated payment network.
IDENTITY VERIFICATION SYSTEM
A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.
Locations platform for managing and providing of user experiences
A method for using location-based services for service management is discussed. The method includes receiving, at a server, a user request from a user device at a geographical location. The method includes accessing a store search to determine a store reference based on the user request and a user location corresponding to the geographical location, the store reference indicating tenant(s) accessible to the user via a user interface (UI) of the user device. The method includes accessing location data for the user device based on the store reference and a user account associated with the user, the location data indicating a service accessible via the UI and associated with a certain tenant. The method includes providing, to the user device and based on the location data, a user experience for accessing the service via the UI.
System and method for detecting signature forgeries
Two models are first trained and then test images are applied to the two trained models in an effort to detect signature forgeries. The first model is trained with pairs of signature images and the resultant trained model is capable of detecting blind forgeries. The second model is trained with triplets of signature images and is capable of detecting skilled signature forgeries. After the two models are trained, test images are applied to the models and determinations are made as to whether a blind or skilled forgery is present.
Secure element having multiple users
Techniques are disclosed relating to secure data storage. In various embodiments, a mobile device includes a wireless interface, a secure element, and a secure circuit. The secure element is configured to store confidential information associated with a plurality of users and to receive a request to communicate the confidential information associated with a particular one of the plurality of users. The secure element is further configured to communicate, via the wireless interface, the confidential information associated with the particular user in response to an authentication of the particular user. The secure circuit is configured to perform the authentication of the particular user. In some embodiments, the mobile device also includes a biosensor configured to collect biometric information from a user of the mobile device. In such an embodiment, the secure circuit is configured to store biometric information collected from the plurality of users by the biosensor.
CONTACTLESS CARD EMULATION SYSTEM AND METHOD
A system and method are described that enables mobile devices (e.g. including but not limited to a mobile phone or the like), to intercept and respond to contactless card authentication requests, allowing mobile devices to be used in place of contactless cards. Enabling mobile phone devices to emulate contactless cards decreases issues related to lost or damaged cards, enabling a single device to be used to provide tokens related to multiple different contactless cards, and leverages functionality of the mobile device to provide dual-factor authentication.
Decentralized identity storage for tobacco products
Identity information can be stored in a decentralized structure. The identity information may include age verification information for the purchase or operation of certain tobacco products, such as an electronic nicotine delivery systems (“ENDS”) device, which may include aerosol delivery devices. The tobacco products or devices may have an age verification requirement or other identity requirements needed to authenticate a user and that information must be stored. A decentralized structure for storing the identity information may improve the security of that identity information while also providing a mechanism for accessing the information for verification or authentication purposes.
FUNDS TRANSFER AUTHENTICATION
The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of funds transfer authentication. The authentication can include receiving a transfer request to transfer funds from a payer to a payee, the transfer request identifies the payer, the payee, and an amount to transfer. Customer information associated respectively with the payer and the payee is identified. The payer and the payee are authenticated. A communication session is opened between the payer and payee. A time-limited payee OTP is generated and sent to the payee. The payee OTP is received within a first time limit. The funds are transferred from the payer to the payee based on receiving a matching payee OTP.
Systems and method for expediting math-based currency transactions
Systems and methods for expediting math-based currency (“MBC”) transactions are described. A financial institution facilitates the expedited MBC transactions. The expedited MBC transactions are achieved by guaranteeing merchants that a pending MBC transaction between the merchant and a customer will be verified by the MBC verification nodes. A provided guarantee can be collected on by the merchant in the event that a guaranteed MBC transaction is not verified by the MBC verification nodes.