Patent classifications
G06Q20/4014
Database with dimensional balances updating
In an example embodiment, a method for updating a database with dimensional balancing comprises receiving a transaction request to transfer a portion of a first balance from the first balance to a second balance; determining a subset of the first balance less than or equal to the portion in the first balance compliant with dimensional rules based on one or more attributes of the subset and an identifier of an account holding the second balance; moving the determined subset from the first balance to the second balance; and updating attributes of the moved subset in the second balance.
SYSTEM FOR VERIFICATION AND MANAGEMENT FOR DIGITALLY PAIRED COLLECTABLES AND MEMORABILIA
This system if directed to verifiably pairing an asset with a digital representation and can include a computer system disposed at a use location and in communication with a persistent storage and a set of non-transitory computer readable instructions included in the computer system adapted for: creating an asset record, creating a significance record, associating the significant record with the virtual representation, storing the asset record and the associated significance record on the persistence storage, creating a transaction record representing a transfer of the asset from a first entity to a second entity wherein the transaction record includes a transaction verification, transmitting a payment request according the transaction verification to a second entity account representing payment for the asset from the second entity to the first entity, and, storing the asset record and the associated significance record of provenance of the item and owner identification on the persistence storage.
Use of mobile identification credential in know your customer assessment
A method for verifying an identity of an individual as a first party via a first party system by a second party system comprises: sending a request for identification information of the first party; receiving first party information associated with a mobile identification credential (MIC) which the first party system received from an authorizing party system (APS) before the second party system sends the request for identification information of the first party to the first party system, the first party having consented to release the first party information to the second party system, and the first party information having been verified by the APS before the APS sends the MIC to the first party system; using the verified first party information associated with the MIC to verify or not verify an identity of the first party; verifying the identity of the first party before providing services to the first party.
CONTEXT-BASED AUTHENTICATION OF A USER
In some implementations, a device may receive a notification to authenticate a user associated with a user account of an application server. The device may send, to the user device, an authentication request that prompts the user to provide a contextual description of an operation associated with the user account. The device may receive, from the user device, an authentication response that includes a described characteristic of the operation that is associated with a parameter of the operation. The device may determine whether the authentication response is valid based on a comparison of the described characteristic of the operation and the parameter of the operation. The device may cause, based on a determination that the authentication response is valid, performance of the operation based on the parameter.
Product information distribution and confirmation of receipt of same
Systems and methodologies are disclosed that enable the distribution of production information and confirmation of the receipt of such information. The system and methodologies of the innovation require an access code to complete a transaction or application process. Use of the system and methodologies of the innovation enable customers to review accurate product information prior to purchasing a product and also provides greater protections against fraudulent purchases.
Systems and methods for automated integration between payment facilitators and submerchants
Systems and methods are disclosed for automated integration between payment facilitators and submerchants. One method includes receiving and storing an identifier and financial information of a payment facilitator, registering the payment facilitator as a user of a user interface, receiving a command from the payment facilitator, the command being one of: register a legal entity or a submerchant, wherein the registering associates the legal entity or the submerchant with the payment facilitator, validates financial and identifying information pertaining to the legal entity or the submerchant, and is based on an acceptance after a background check of the legal entity or the submerchant, view or edit details of the legal entity or the submerchant, perform a search of legal entities or submerchants associated with the payment facilitator, using one or more search criteria, and add, view, edit, and assign fee profiles.
Systems and methods for generating and transmitting electronic transaction account information messages
Systems and methods are disclosed for secure transmission of account information messages. One method comprises receiving account information; providing a notification to a third party regarding the account information; receiving a first request for information regarding the notification from the third party; providing a response to the third party regarding the first request; receiving data from the third party; using the data to generate a message including details about the account, wherein at least some of the details about the account are encrypted; receiving a second request for information regarding the notification from the third party; and providing the message to the third party.
Distributed ledger for device management
Techniques are described for managing devices, such as Internet of Things (IoT) devices, using smart contract(s) on a distributed ledger (e.g., blockchain). Smart contract(s) executing on a distributed ledger may control access to one or more devices in a home or other environment. The smart contract(s) may employ information stored on the distributed ledger and information in a transaction sent to the smart contract(s) to determine whether particular user(s) and/or process(es) may access the device(s), issue commands to the device(s), access data generated by the device(s), and/or control the device(s). The smart contract(s) may provide a secure portal through which user(s) and/or service(s) may access device(s) for command and control of such device(s), and secure access may be based on permission information that is specified or provided by an owner or operator of the device(s) and that is stored on the distributed ledger.
Systems and methods for hindering malicious computing actions
The disclosed computer-implemented method for hindering malicious computing actions may include (i) identifying an attempt by an agent to perform an action on a computing resource that is vulnerable to attempted actions performed by unauthorized agents, (ii) requesting from the agent, in response to identifying the attempt to perform the action on the computing resource, a payment to an owner of the computing resource equal to a monetary value assigned to performing the action on the computing resource, (iii) receiving, by the owner of the computing resource, the payment of the monetary value from the agent, and (iv) allowing, in response to receiving the payment of the monetary value from the agent, the attempt by the agent to perform the action on the computing resource. Various other methods, systems, and computer-readable media are also disclosed.
SMART-GLASSES BASED CONTACTLESS AUTOMATED TELLER MACHINE ("ATM") TRANSACTION PROCESSING
A method for touchless communication between an ATM and a smartglasses device worn by a user is provided. The method may be executed at the smartglasses device. The method may include identifying a current global positioning system (“GPS”) location of the ATM. The method may include communicating with an external database to determine an ATM identifier associated with the ATM. The ATM identifier may include ATM communication data. The method may include transmitting an external smartglasses identifier to the ATM via the ATM communication data. The method may include receiving a communication from the ATM. The communication may include an interactive payment interface. The method may include displaying the interactive payment interface on the smartglasses. The method may include receiving one or more commands from the user. The method may include transmitting the one or more commands from the smartglasses to the ATM.