G06Q20/4014

SYSTEMS AND METHODS TO PROVIDE USER VERIFICATION IN A SHARED USER ENVIRONMENT VIA A DEVICE-SPECIFIC DISPLAY
20230297996 · 2023-09-21 ·

A method of generating a shared augmented reality payment authentication entry interface includes detecting a first consumer device and a second consumer device; prompting a display of a first augmented reality payment authentication interface at the first consumer device; and prompting a display of a second augmented reality payment authentication interface at the second consumer device.

Pay with points virtual card

Systems and methods for applying reward points from a rewards account to a transaction are disclosed. A method can include receiving a payment request from a merchant computer system for a transaction. The method can include authenticating the payment request by acquiring and using an encryption key transmitted by a financial institution computing system from a database that is associated with a payment account. The method may include determining the number of rewards points in the rewards account is not enough to cover the transaction. The method may include transmitting a partial authorization message to the merchant computer system including an approval amount. The method may include receiving a second payment request comprising a remaining balance of the transaction. The method may include identifying a secondary payment source to cover the remaining balance of the transaction.

Integration for performing actions without additional authorization requests

Techniques, devices, and systems for performing actions, within an application provided by a service provider, without additional authorization requests are described. An example process includes receiving an access request to access an application on a user device, and presenting an interactive element via a user interface of the application, wherein the interactive element, when selected, causes a website of a merchant to load to an in-app browser within the application. The example process further includes receiving, via the in-app browser, a payment request to initiate a payment to the merchant from an account associated with the application, determining, based at least in part on the payment request, that the payment request originated from within the application, and based at least in part on the determining, causing the payment to be authorized without additional input from a user associated with the user device.

Systems, apparatus and methods for improved authentication

A cardholder authentication method includes receiving, at an authentication network, an authentication request involving an account. The method further includes determining, based at least in part on a portion of an account identifier associated with said account, an authentication service. In addition, the method includes determining, based at least on said authentication service and a portion of said account identifier, an authentication response. The method also includes transmitting, to a merchant associated with a transaction involving said account, said authentication response.

Identity services systems and methods
11823192 · 2023-11-21 · ·

Systems, methods, and apparatuses for storing verified identification information in a distributed database and for verifying entities to requestors are provided herein. Identity information relating to an entity is verified by a generally recognized identity provider (GRIP). Once verified, the GRIP populates a distributed database with an entry corresponding to the verified identity information. The distributed database is publically accessible such that identity requestors can see the entries in the distributed database. In some arrangements, the distributed database is write-protected such that only an authorized GRIP can modify the distributed database. An entity can provide information to a requestor to verify an identity attribute of the entity to the requestor. The requestor uses information provided by the entity to retrieve verified entity identification information from the distributed database and to confirm that the identity attribute was verified by an authorized GRIP.

System, method, and computer program product for conducting a payment transaction involving payment on delivery

Provided is a system for conducting a payment transaction involving payment on delivery in real-time. The system may include at least one processor programmed or configured to receive transaction data associated with a payment transaction involving a merchant and a customer at a location that is independent of a merchant location, determine a financial institution of a plurality of financial institutions based on the transaction data associated with the payment transaction, communicate data associated with a request for authorization of the payment transaction involving the merchant and the customer, receive an indication of authorization of the payment transaction involving the merchant and the customer, and communicate data associated with authorization of the payment transaction involving the merchant and the customer. A method and computer program product are also provided.

Local cache-based identification system
11756364 · 2023-09-12 · ·

An identification system uses a local cache for performing identifications. An identity system device may store identity information and identification information. An electronic device stores a cache of a portion of the identity information and a part of the identification information. The electronic device receives user input, determines an identity by comparing the user input to the cached identification information (such as by comparing a received digital representation of a biometric with cached biometric identification information), and performs an action using information in the cached identity information that is associated with the identity. The electronic device may update the identity information stored by the identity system device based on the action.

SYSTEMS AND METHODS FOR VERIFIED COMMUNICATION BETWEEN MOBILE APPLICATIONS
20230376953 · 2023-11-23 ·

Systems and methods for establishing trust between a conventional mobile application and a micro application are disclosed. In accordance with aspects, a method may include authenticating user credentials with a backend processing infrastructure of a provider of a mobile application, wherein the authenticating generates session information; receiving, at the mobile application, a uniform resource identifier (URI), wherein the URI includes the session information as a parameter of the URI; receiving, at the mobile application, a user-activation of the URI; receiving, at the backend processing infrastructure of the provider of the mobile application and from a backend processing infrastructure of a third party, the session information; verifying, by the backend processing infrastructure of the provider of the mobile application the session information; and sending, by the backend processing infrastructure of the provider of the mobile application and to the backend processing infrastructure of the third party, requested user information.

REINFORCEMENT LEARNING AGENT SIMULATION TO MEASURE MONITORING SYSTEM STRENGTH

Systems, methods, and other embodiments associated with reinforcement learning agent simulation for measurement of monitoring system strength are described. In one embodiment, a method includes training a reinforcement learning agent to learn a policy that evades one or more scenarios of a monitoring system while completing a task. The policy is then sampled to simulate an episode of steps taken by the reinforcement learning agent. The steps taken in the episode are then analyzed to measure a strength of monitoring in the monitoring system. The strength of monitoring is then presented in a user interface.

SINGLE SIGN-ON THROUGH CUSTOMER AUTHENTICATION SYSTEMS
20230267414 · 2023-08-24 · ·

Described herein is a system, method, and non-transitory computer readable medium related to a service provider using a third party identity provider to authenticate a user with improved security. An authentication token is received from the identity provider, and can be verified against internal configuration information. The internal configuration information includes data that is not included in the authentication token, and therefore, is not vulnerable to some security attacks, such as a man-in-the-middle attack. After the authentication token is verified, the internal configuration information and authentication token may be used to create a custom identifier, referred to as an identity ID. The identity ID may be used by the service provider to verify user access to resources.