G06Q20/4014

Sharing and using passes or accounts

The present disclosure generally relates to a computer system displaying user interfaces for accessing passes and transfer accounts. In some examples, passes are added to the computer system. In some examples, passes are accessed. In some examples, transfers relating to the passes and transfer accounts are displayed, such as in search user interfaces.

Self-service modular drop safes with deposit creation capability

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

SYSTEM AND METHOD FOR CONDITIONAL DATA TRANSFERS

A system comprises a communications module; a processor coupled to the communications module; and a memory coupled to the processor, the memory storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module, a transfer instruction for transfer of data from a first data record associated with a transferor to a second data record associated with a recipient, the transfer instruction including a transfer amount and a condition associated with the transfer; send, via the communications module, a notification of the transfer instruction to a computing device associated with the recipient and request permission to obtain contextual data therefrom; when permission is granted, obtain, via the communications module, contextual data from the computing device; determine, based on the contextual data, that the condition associated with the transfer has been satisfied; and in response to determining that the condition associated with the transfer has been satisfied, effect the transfer of data from the first data record to the second data record.

SYSTEMS AND METHODS FOR FACILITATING SPENDING DIGITAL CURRENCY WITHOUT OWNING DIGITAL CURRENCY
20220405764 · 2022-12-22 ·

Spending digital currency without owning digital currency may be facilitated. The user may use a software application running on the user's computing platform to scan a digital currency public address quick-response code (QR), or a near-field-communication (NFC) based public address. The user may be prompted to swipe-to-authenticate the transaction. The user may authenticate the transaction by fingerprint-swiping a biometric-enabled transitory password authentication device. The biometric-enabled transitory password authentication device may transmit an encrypted transitory password a server via the user's computing platform. Upon receiving and verifying the transaction, the server may send an amount of digital currency to the target address on behalf of the user. The server may charge the user's debit card an equivalent amount of sovereign currency.

Multi-factor authentication providing a credential via a contactless card for secure messaging
11540128 · 2022-12-27 · ·

Exemplary embodiments may use a contactless card as a secondary form of authentication in a multi-factor authentication for a secure messaging service. The recipient party of a request to initiate a messaging service session (such as a server computing device) may be programmed to use the phone number of the originating device to look up records regarding an identity of a party and their associated phone number as a primary credential and then may require an authentication credential originating from the contactless card as a secondary credential for the initiating party. In some instances, the credential originating from the contactless card is a onetime password that is valid only for a period of time. The recipient party determines whether the onetime password is valid. If both credentials are valid, a secure messaging session may be initiated with the initiating party.

SYSTEMS AND METHODS FOR EXECUTING ECOMMERCE GUEST CHECKOUT TRANSACTIONS

Systems and methods are disclosed for executing an electronic transaction using a digital wallet. One method includes receiving a guest checkout request and electronic transaction data from an electronic transaction browser. Whether a user is enrolled in the digital wallet system may be determined by the digital wallet system. The digital wallet system may authorize an electronic transaction based on the electronic transaction data upon determining the user is not enrolled in the digital wallet system. The digital wallet system may initiate a digital wallet enrollment upon authorizing the electronic transaction. The digital wallet system may store the user data in the digital wallet system and transmit a verification request to the electronic transaction browser. The digital wallet system may receive a verification response from the electronic transaction browser and may generate a digital wallet enrollment status message based on the verification response.

SYSTEMS AND METHODS FOR VERIFYING DIGITAL PAYMENTS

Embodiments of the disclosure provide systems and methods for verifying digital payments for a payment platform. The system includes a communication interface configured to receive service data associated with a transaction from a terminal device associated with a user of the payment platform. The system further includes at least one processor configured to automatically determine whether an authentication is waived for the transaction based on the received service data and a blacklist generated using a machine learning model. The blacklist includes a list of suspicious users and transaction behaviors. The at least one processor further configured to approve the transaction without requesting user authentication information from the terminal device when the authentication is waived. The at least one processor also configured to request the user authentication information from the terminal device and validate the user authentication information when the authentication is not waived.

Method and system for conversion of digital assets to fiat currency

A method for conversion of digital assets to fiat currency using a secondary blockchain and mirrored accounting includes: receiving transaction data corresponding to a first blockchain transaction processed using a first blockchain, the transaction data including a payer identifier, recipient identifier, and blockchain currency amount; validating an entity as an authorized entity associated with the payer identifier; determining a fiat currency amount based on the blockchain currency amount; generating a second blockchain transaction, the second blockchain transaction including an unspent transaction output, destination address associated with the authorized entity, and the blockchain currency amount and/or the fiat currency amount; confirming addition of the second blockchain transaction to a second blockchain; and initiating a transfer for the fiat currency amount from a first transaction account to a second transaction account, the second transaction account being associated with the authorized entity.

SYSTEMS AND METHODS FOR ELECTRONIC CERTIFICATION OF E-COMMERCE SECURITY BADGES
20220391894 · 2022-12-08 ·

A method for managing secure processing of electronic payment transactions includes receiving a request submitted by a merchant computing system for a security verifier. The security verifier is to be displayed on an electronic display associated with the merchant computing system. A set of security credentials received from a security service provider is measured against a security threshold. When the set of security credentials meets the security threshold, a uniform resource locator (“URL”) is transmitted to the merchant computing system. The URL identifies the security verifier to be retrieved and displayed at the electronic display associated with the merchant computing system.

SYSTEMS AND METHODS FOR PROVIDING EMBEDDED BANKING SERVICES
20220405732 · 2022-12-22 ·

Systems and methods for providing embedded banking services are disclosed. In one embodiment, a method for providing embedded banking services on an electronic device may include (1) a computer program executed by an electronic device comprising a computer processor generating a request to enable embedded banking services for a financial institution on the electronic device; (2) the computer program communicating the request to a host for the electronic device; (3) the computer program receiving a secure token and an encryption key from one of the host of the electronic device and the financial institution; (4) the computer program storing the secure token and encryption key in secure storage of the electronic device; and (5) the computer program enabling embedded banking services on the electronic device.