Patent classifications
G06Q20/4014
METHODS AND SYSTEMS FOR ENHANCED ENDPOINT IDENTITY VALIDATION IN ELECTRONIC TRANSACTIONS
Methods and systems are disclosed for merchant system identity validation. One method comprises generating, by an access management system, a primary key associated with an integrator system and transmitting the primary key to the integrator system. The access management system may also generate a hash value associated with a merchant system, and may transmit the hash value to the merchant system. When a payment transaction is initiated at the merchant system, the access management system may receive an authorization request comprising a key-hash pair. The key-hash pair may be validated against a validation database. Upon successful validation, the access management system may transmit the authorization request to an acquirer processor.
SYSTEMS AND METHODS FOR ELECTRONIC CERTIFICATION OF E-COMMERCE SECURITY BADGES
A method for managing secure processing of electronic payment transactions includes receiving a request submitted by a merchant computing system for a security verifier. The security verifier is to be displayed on an electronic display associated with the merchant computing system. A set of security credentials received from a security service provider is measured against a security threshold. When the set of security credentials meets the security threshold, a uniform resource locator (“URL”) is transmitted to the merchant computing system. The URL identifies the security verifier to be retrieved and displayed at the electronic display associated with the merchant computing system.
Cryptocurrency storage distribution
A computing platform having at least one processor, a memory, and a communication interface may receive, via the communication interface, a transaction request from a participant. The computing platform may identify a user and one or more linked digital wallets associated with the transaction request. The computing platform then may execute an algorithm for comparing the transaction request to predetermined criteria associated with the one or more linked digital wallets. The computing platform may establish, via the communication interface, a first connection with a user computing device and, while the first connection is established, transmit to the user computing device transaction information which, when executed by the user computing device, causes a notification to be displayed on the user computing device.
Electronic system and computerized method for controlling operation of service devices
The present disclosure generally relates to controlling operation of service devices. A payment network server receives, from a merchant aggregator, an operation request from a user for operation of one or more service of the devices associated with the merchant aggregator, the operation request comprising identification data of each service device, an operation mode selected by the user for each service device, and a payment token of the user; identifies, based on the identification data of each service device, a device server communicatively connected with the service device; communicates, to the respective device servers, operation instructions for controlling access to the service devices, the instructions comprising activating the service devices, thereby permitting the user to access the service devices; determining a payment amount for operation of the service devices requested in the operation request based at least on the selected operation modes; and processing a payment transaction for paying the payment amount to the merchant aggregator using the payment token.
Systems and methods for providing multi-factor authentication for vehicle transactions
Methods and systems are employed for completing a transaction via an internet-connected vehicle by leveraging a multi-factor authentication to compare vehicle identification information and user identification information based on stored information. In addition, methods and systems are provided for completing a transaction via an internet-connected vehicle by automatic enforcement of business rules (e.g., parental control spending tools, or employee spending tracking tools).
BLOCKCHAIN-BASED DATA PROCESSING METHOD AND APPARATUS, DEVICE, STORAGE MEDIUM, AND PROGRAM PRODUCT
This application discloses a blockchain-based data processing method performed by a computer device. The method includes: determining a token identification in response to a resource reception request; calling a general callback function in a smart contract of a blockchain and determining M virtual resources having the token identification issued by an issuing object in the blockchain; acquiring a resource attribute of the M virtual resources and determining a token attribute corresponding to the token identification based on the resource attribute of the M virtual resources, the issuing object holding a target virtual resource in the M virtual resources, and the M being a positive integer; and determining a resource identification of the target virtual resource transferred to a receiving object based on the token attribute of the token identification, the resource identifications corresponding to different token attributes being different.
SYSTEMS AND METHODS TO PROCESS PAYMENTS FOR SUBSCRIBERSHIP WITHIN A MEMBERSHIP PLATFORM
Systems and methods are provided to process payments for subscribership within a membership platform. Exemplary implementations may: obtain benefit information for content creators of a membership platform; obtain payment processor information characterizing payment processing entities; obtain transaction information characterizing requested transactions between the content creators and the subscribers; determine which of the payment processing entities should process the requested transactions; execute the requested transactions using the payment processing entities; and/or perform other operations.
INFORMATION SHARING METHODS, APPARATUSES, AND DEVICES
Examples in this application disclose information sharing computer-implemented methods, media, and systems. One example computer-implemented method includes receiving, from a blockchain network by a trusted execution environment (TEE), a trigger instruction based on timed starting logic, where the timed starting logic is used to determine a starting moment of a smart contract, and the timed starting logic is defined in a chain code of the blockchain network. The example method further includes combining, by the TEE, first anti-money laundering (AML) risk information and second AML risk information based on the trigger instruction to obtain a combination result, where the first AML risk information is sent by a first institution for a first user ID of a user, the second AML risk information is sent by a second institution for the user. The example method yet further includes sending, by the TEE, the combination result to the first institution.
SYSTEMS AND METHODS FOR ANTI-MONEY LAUNDERING COMPLIANCE VIA BLOCKCHAIN
Methods and systems for managing and/or processing a blockchain to maintain data security for confidential and/or personal data are provided. According to certain aspects, the disclosed data security techniques may enable access sharing functionality utilizing the blockchain. The data security techniques disclosed herein also enable the use of smart contracts to support compliance with anti-money laundering requirements. A node may receive a new account transaction that includes documents identifying an account holder. The node may compare the identity to a government list of identities. In some embodiments, the node may detect any discrepancies between the documents and modify the new account transaction. The new account transaction may be compiled into a block of the blockchain.
Using an always on listening device skill to relay answers to transaction-based knowledge-based authentications
Aspects discussed herein may relate to techniques for authenticating a user using transaction-based authentication questions. The transaction-based authentication questions may be provided to the user. The user may provide audible responses to the transaction-based authentication questions that may be captured by a smart device, such as an always on listening device. Authentication of the user may be based on voice analysis of the audible responses to the transaction-based authentication questions and/or based on the answers to the transaction-based authentication questions.