G06Q20/4014

SYSTEMS AND METHODS FOR AUTHENTICATING AN ELECTRONIC TRANSACTION USING HOSTED AUTHENTICATION SERVICE
20220086153 · 2022-03-17 · ·

Systems and methods for authenticating an electronic transaction using a hosted authentication service. The systems and methods determine whether an authentication is required based on a first electronic message received from a first data system. Upon determining the authentication is required, the systems and methods transmit a dummy authentication request and a hosted authentication service uniform resource locator to the first data system. The systems and methods further determine or receive an indication whether a user authentication challenge is required based on a transaction risk analysis by a second data system. Upon determining the user authentication challenge is required, the systems and methods provide, at a user interface, an electronic form including a challenge request. The systems and methods transmit, to the first data system, another electronic form including a dummy authentication response generated based on a challenge result.

SYSTEM FOR PATIENT REGISTRATION, CHECK-IN, AND SERVICE
20220108791 · 2022-04-07 ·

A system is provided for registration, check-in, and service tracking of patients. In an example arrangement, the system includes a front end system and a back end system. The front end system including one or more web servers that are configured to provide one or more web portals. The back end system is communicatively connected to the front end system. The back end system includes a data server and a processing server. The processing server configured to store patient data for scheduled appointments in the data server in a standardized format. The processing server is configured to provide access to the patient data to the one or more web portals. The one or more web portals are configured to communicate with the processing server to provide access permit the patient and staff remote access to the patient data to facilitate pre-registration, check-in, and service tracking of patients.

SYSTEMS AND METHODS FOR DRONES AS A SERVICE
20220108244 · 2022-04-07 ·

A technique is described for implementing drones as a service. As an example, a drone may receive instructions from one or more network elements, coordinate operations with the one or more network elements, and perform at least one task associated with the instructions. The drone may deliver a container to a first location and perform object recognition to validate an object of a subscriber being delivered to a second location. The drone may measure the weight and dimensions of the object to confirm the object is within operating guidelines. After verifying the object is within operating guidelines, the drone may transport the container containing the object to the second location.

Graphical User Interface and Operator Console Management System for Distributed Terminal Network
20220116398 · 2022-04-14 ·

A graphical user interface (GUI) and operator console management system for a distributed terminal network is described. In some embodiments, the terminals may be hardware terminals, kiosks, or clients. In some embodiments, a security analysis may be performed, and security scores may be determined, for visitors requesting operations at terminals based on an operator configuration. Security scores may be determined by a provider, in communication with the operator terminals, based on aggregation of a plurality of factors, wherein each factor may be weighted. The factors may incorporate operator settings or preferences. In one embodiment, the factors include one or more facial recognition factors. The one or more facial recognition factors may be used for biometric authentication. The provider may use the security scores to determine user privileges or permissions for the operations. The provider may deliver instructions or messages to the terminals based on the determinations.

SYSTEMS AND METHODS FOR CONDUCTING/DEFENDING DIGITAL WARFARE OR CONFLICT
20220116736 · 2022-04-14 ·

In exemplary embodiments, an AI (Artificial Intelligence) enabled system is developed, configured, and/or intended to facilitate the offensive, defensive, and logistical capabilities of a person engaged in warfare in some direct form. This encompasses scenarios ranging from the solo unit behind enemy lines, the operational deployment of forces and resources, to strategic theater. Exemplary embodiments include building or configuring a highly advanced and aware system, facilitated by AI, driven by cloud and edge computing, to allow decisions and tactical advantage be deployed and calculated at the level it needs first. Exemplary embodiments may be configured to address both the kinetic real world as well as digital cyberspace, incorporate offensive and defensive technology, and be primarily driven by the concept to augment forces to support and counter threats as well as malicious enemy AI.

PAY BY TEXT SYSTEMS AND METHODS
20220108292 · 2022-04-07 ·

A system and method for paying bills is disclosed that includes a bill from a payee. The bill includes text payee information that includes a due date, an account number, identification of the payee, an amount due, and payer information. The disclosed system also includes a statement disposed upon the paper bill that includes instructions for a payer to retrieve or take a photo of the bill and to send the picture to a billing text number on the statement. The bill can include one or more images and text. The one or more images can be processed by an image interpretive object and the text payee information can be processed by optical character recognition software for determining payment options that are the most likely to be paid, and the best prediction that the payee will receive payment due.

PAYMENT TOKEN
20220101317 · 2022-03-31 ·

Examples implementations relate to payment tokens. An example includes a customer computer creating a first data buffer, with a set of customer-specified parameters, signing the first data buffer with a customer private key, associating a customer public key to the signed first data buffer to create a first data record that is communicated to a service provider. The service provider computer creates a second data buffer with a set of service provider-specified parameters, signs the second data buffer with a first private key of the service provider, associates a first public key of the service provider to the signed second data buffer to create a second data record, combines the first and second data records, signs the combined data record with a second private key of the service provider, and associates a second public key of the service provider to the combined data record.

Methods and systems for enhanced endpoint identity validation in electronic transactions
11283621 · 2022-03-22 · ·

Methods and systems are disclosed for merchant system identity validation. One method comprises generating, by an access management system, a primary key associated with an integrator system and transmitting the primary key to the integrator system. The access management system may also generate a hash value associated with a merchant system, and may transmit the hash value to the merchant system. When a payment transaction is initiated at the merchant system, the access management system may receive an authorization request comprising a key-hash pair. The key-hash pair may be validated against a validation database. Upon successful validation, the access management system may transmit the authorization request to an acquirer processor.

Systems and methods for identifying devices as authorized

A system and method for authenticating a user's computing device that has submitted a request for the transfer of funds from the user's account at a financial institution. An authentication server at the financial institution compares currently received identifying data to previously stored identifying data, then makes a determination as to whether to approve the request for the transfer of funds. The identifying data may include a snapshot of apps or of lists of items installed on the user's computing device.

SYSTEM FOR HARNESSING A CONNECTED NETWORK TO SECURELY VERIFY A TRANSACTION

A method for harnessing a connected network to securely verify and execute a transaction is provided. The method may include requesting a PIN from a mobile device. The request may be transmitted via a USSD message. The method may also include receiving the PIN from the mobile device. The PIN may be received via a response to the USSD message. The method may also include authenticating the mobile device. The method may also include accessing a third-party network to verify an authentication status of the mobile device. The third-party network may include a plurality of IoT endpoints. Each IoT endpoint may include a stored verification usage process. The stored verification usage process may relate to a user associated with the mobile device. The method may also include executing the transaction upon receipt of an authentication signal from the third-party network.