G06Q20/4014

SYSTEM AND METHOD FOR INTEGRATED APPLICATION AND PROVISIONING

The present disclosure involves systems, software, and computer implemented methods for generating new credit accounts for immediate availability for use in current online transaction. One example process includes identifying a request to perform a credit application process associated with a particular user via a client application. A first signal can be transmitted that includes a redirect instruction for the client application to a credit application site to perform a credit application process. A second signal can be transmitted that includes a merchant-specific identifier of the particular user and a request to perform the credit application process. A third signal can be received from the credit application site that includes an approval, a payment credential associated with a newly created credit account, and the merchant-specific identifier of the particular user. The payment credential can be associated with the user profile of the user corresponding to the merchant-specific identifier.

USING A CONTACTLESS CARD TO SECURELY SHARE PERSONAL DATA STORED IN A BLOCKCHAIN

Systems, methods, and articles of manufacture to securely share data stored in a blockchain. A contactless card may receive a request to provide a data element from a device. An applet of the contactless card may encrypt the data element and a wallet address. The applet may generate a signature for the request, and transmit, to a mobile device, the signature and the encrypted data. The mobile device may transmit, to a verification service, the signature and encrypted data. The verification service may verify the signature based on a public key. A node in a blockchain may generate a block in the blockchain, the block comprising indications of the verification of the signature, the requested data element, and the wallet address. An encrypted data element corresponding to the data element may be decrypted using a public key. The device may receive the decrypted data element from the wallet address.

SECURITY KEY INPUT SYSTEM AND METHOD USING ONE-TIME KEYPAD
20230334452 · 2023-10-19 ·

Provided is a security key input system using a one-time keypad. The security key input system may include: a keypad input unit configured to output a security keypad including one or more null keys each having no identification mark written thereon, and receive a security key from a user; a control unit comprising a one-time keypad generator configured to generate a one-time keypad; an input terminal comprising an NFC recognition unit configured to provide the one-time keypad generated by the one-time keypad generator to an output terminal through NFC with the output terminal contacted with the input terminal; a display module; an NFC recognition module configured to receive the one-time keypad from the input terminal through the NFC recognition unit; and the output terminal comprising a controller configured to output the one-time keypad received from the NFC recognition module through the display module.

SYSTEMS AND METHODS FOR EMPLOYING A CARD ROTATION SEQUENCE TO AUTHENTICATE A USER
20230334130 · 2023-10-19 ·

Systems and methods for authenticating identification information are disclosed. For example, an Automated Teller Machine (ATM) may comprise a user interface. The user interface may comprise a card reader. The card reader may be configured for card rotation about an axis of a bank card. The user interface may be configured to receive card rotation input from a user. The ATM may comprise at least one memory storing instructions. The ATM may comprise at least one processor configured to execute the instructions to perform operations. The operations may comprise receiving identification information from the user. The operations may comprise receiving the card rotation input. The operations may comprise extracting a card rotation sequence from the card rotation input. When the card rotation sequence is within a predetermined threshold from a stored card rotation sequence corresponding to the identification information, the operations may comprise authenticating the user for an ATM operation.

SYSTEMS AND METHODS FOR USE IN AUTHENTICATING CONSUMERS IN CONNECTION WITH PAYMENT ACCOUNT TRANSACTIONS
20230316277 · 2023-10-05 ·

Disclosed are exemplary embodiments of systems and methods for use in authenticating consumers and/or computing devices to payment accounts. In one exemplary embodiment, a method includes detecting an authorization request for a transaction by a user directed to a payment account of the user and, in response to the authorization request, transmitting, to a communication device of the user, an authentication request including an instruction to move the communication device in a defined manner. The method also includes receiving, from the communication device, an indication of movement of the communication device and comparing, based on one or more curve/pattern matching algorithms, the movement of the communication device, from the indication, to a motion signature. The method then includes, based on a match between the movement of the communication device and the motion signature, communicating an authentication success message for the user to an issuer of the payment account.

SYSTEM AND METHOD FOR PROVIDING API VERSION CONTROL

Described herein is a system for providing version control across APIs. In an embodiment, an application of a client device may transmit communications to a service application API that are in a format not accepted by the service application API, using the application API. A central (or public) API may receive the communication transmitted by the application's API. The central API may identify the versions of the application's API and the service application API. The central API may format the communication based on the mapped fields, to a format accepted by the service application API. The central API 106 may forward the formatted communication to the service application.

SYSTEMS AND METHODS FOR IMPOSING PHYSICAL ACTIONS, BY ENDPOINTS, BASED ON ACTIVITIES BY USERS
20230315125 · 2023-10-05 ·

Systems and methods are provided for imposing physical actions, by endpoints, based on activities by users. One such method includes storing multiple rules in a data structure, where each of the multiple rules indicates a physical action to be performed in response to an activity, and then receiving, by a computing device, an activity message including data indicative of an activity of a user. The method also includes retrieving, by the computing device, one of the multiple rules from the data structure based on the data indicative of the activity and identifying, by the computing device, the physical action included in the one of the multiple rules. The method then includes transmitting, by the computing device, an order for the identified physical action to an endpoint, whereby the endpoint commands a drone to perform the identified physical action as a response to the activity of the user.

RISK ASSESSMENT THROUGH DEVICE DATA USING MACHINE LEARNING-BASED NETWORK

There are provided systems and methods for a machine learning-based network trained to perform risk assessment through device data. A service provider server receives device data of a user device associated with a merchant account registered with a merchant server for a merchant service, and receives, from the merchant server, a request containing a unique token identifier for initiating a risk assessment operation to generate a device assessment score for the user device, where the device assessment score indicates a level of risk between the user device and the merchant account. The service provider server selects a risk assessment engine to perform the risk assessment operation and generates the device assessment score and a narrative for the device assessment score, and sends, to the merchant server through an application programming interface, a message containing a unique device identifier for the user device, the device assessment score and the narrative.

ENABLING USER TO USER INTERACTIONS IN MULTI-USER VIDEO CONFERENCE APPLICATIONS
20230316245 · 2023-10-05 ·

There are provided systems and methods for enabling user to user interactions in multi-user video conference applications. A user may utilize a computing device to interact with online service providers in order to initiate and/or join a video conference with one or more other users. During the video conference, the user may be provided with options to interact with other users, such as by engaging in electronic transaction processing. When performing such interactions, data for the video conference may be extracted and provided to a transaction processor server. The server may then utilize the data to determine accounts of users within the video conference that may be utilized for electronic transaction processing services. If no account exists, the server may initiate a process to onboard such users. When an account exists, the server may further populate graphical icons that may be used for electronic transaction processing services.

TRUST-BASED APPLICATION TO APPLICATION CONNECTIVITY

The innovation discloses systems, methods and computer program products that reduce complexity and associated measures that are taken to ensure trust in secured transactions as necessitated by requirements present only in an ecommerce environment that do not have a parallel with traditional bricks and mortar commercial transactions. The innovation enables a multitude of mobile wallet applications to engage and obtain services from ecommerce applications wherein backend processing by a mobile wallet server obtains and delivers funds to ecommerce applications without sharing a subset of sensitive data, associated with a mobile wallet application user for the secured transactions. The innovation further provides for a wallet network to be initiated and engaged in which the secured transactions can take place, adopting and adapting social network application connectivity.