G06Q20/4014

SYSTEMS AND METHODS FOR PROVIDING A VIRTUAL SAFETY DEPOSIT BOX FOR REMOTE ACCESS TO STORED DIGITAL AND VIRTUAL CONTENT

Described are systems and methods for providing virtual and remote access to virtual content in a virtual safebox. A computer system includes a virtual vault database for storing a plurality of virtual safeboxes storing digital/virtual content provided by a user. The stored content includes image content representing personal identification documents of the user. The computing device includes at least one processor configured to receive an access request message from a first safebox access computing device and, in response retrieve, from the virtual vault database, the first virtual safebox. The processor is further configured to generate an inventory list identifying each content item and transmit an inventory message to the first safebox access computing device. The processor is further configured to receive a content retrieval message from the first safebox access computing device and transmit a content message to the first safebox access computing device.

Access Control System
20230059546 · 2023-02-23 ·

Various implementations described herein are directed to a method for providing access control via an access server. In one implementation, a card or token onboarding request is received from a merchant server. Onboarding is initiated based on the received card or token onboarding request. An access initiation request is received from an access terminal. The access initiation request includes at least a card or token of a consumer. A mapping is created based on the access initiation request. Access is provided via the access terminal, in response to an access request, based on the mapping.

METHODS AND SYSTEMS FOR SHARING A CONSENT TOKEN ASSOCIATED WITH A USER CONSENT AMONG APPLICATIONS
20230060068 · 2023-02-23 ·

Embodiments provide methods and systems for sharing a user consent associated with user consent among applications. Method performed by server system includes storing consent token associated with user in a database based upon receiving consent from the user on the first application to utilize user credential data for subsequent transactions in connection with interaction between a user device and a first application service provider. The method includes receiving a request to access the consent token associated from a second application service provider associated with a second application accessible on the user device, determining whether the second application service provider is able to access the consent token associated with the first application based on access level data set by the first application service provider of the first application for accessing the consent token and allowing access of the consent token to the second application based on the determining step.

SYSTEMS AND METHODS FOR INTERACTIVE CHATBOT AUTHENTICATION OF USERS
20230053675 · 2023-02-23 ·

A computing system for authenticating users utilizing an interactive chatbot is provided. The computing system includes a processor in communication with a memory, and the processor programmed to: (i) receive an authorization request message for a transaction initiated by a user, wherein the authorization request message includes transaction data, (ii) retrieve user data associated with the user, (iii) determine, based upon the transaction data and the user data, a risk associated with the transaction, (iv) generate, based upon the risk associated with the transaction, one or more prompts for the user, (v) transmit, via the interactive chatbot, the one or more prompts to the user, (vi) receive user input in response to the one or more prompts, and (vii) embed an authentication indicator into the authorization request message, wherein the authentication indicator indicates whether the user is authenticated based upon the user input.

Method and Apparatus for Verification

A device may verify the authorization of the payee by a payee identification server. A device may create a record in a database on the payee identification server, the record including, either directly or indirectly, payee identification information, payee address, payee phone number, payee tax information, one or more methods of payment accepted by the payee comprising a type of payment, institution information, and account information. A device may verify said record with one or more verification sources. A device may record the results of the verification in the record. A device may create a d-token to point to the record. A device may send the d-token to the payee. A device may receive, by the payee identification server, the d-token from a third party. A device may retrieve the one or more of the methods of the payment accepted by the payee.

METHOD OF PROVIDING REAL ESTATE TRANSACTION PLATFORM THAT SUPPORTS DIRECT TRANSACTIONS BETWEEN SELLERS AND BUYERS
20220366519 · 2022-11-17 ·

The operation of the real estate platform in the present invention comprises of: the transmission of the seller's and the buyer's personal information from their terminals to the main server; the uploading of the information of the real estate for sale from the seller's terminal onto the main server; the request of the buyer's terminal to the main server for the information of the real estate for sale and the receipt such information; the selection of the information of specific real estate for sale from the buyer's terminal from the list of the real estate for sale; the generation of chatting room by the main server for the seller's and the buyer's terminals; the transmission of the agreement information from the seller's and the buyer's terminals to the main server and the request of the contract process; the processing of the seller's and the buyer's personal information and the information of the specific real estate for sale by the main server and the provision of a modifiable electronic agreement to the seller's and the buyer's terminals; and the receipt of the credential information by the main server from the seller's and the buyer's terminals, the credential process, and the conclusion of the contract after the seller's and the buyer's signatures are affixed by their respective terminals.

SYSTEMS AND TECHNIQUES TO UTILIZE AN ACTIVE LINK IN A UNIFORM RESOURCE LOCATOR TO PERFORM A MONEY EXCHANGE

Embodiments are generally directed to systems, device, and techniques to utilize a uniform resource locator to exchange money.

ATM customer messaging systems and methods

A method including receiving identification information for a first account holder at a financial institution, authenticating the first account holder via an automated teller machine (ATM) based on the identification information, identifying an event associated with the first account holder, including determining date information for the event, configuring a message relating to the event to be displayed to the first account holder based on the event, storing trigger configuration information comprising a time window including the date information for the event, and displaying the message to the first account holder via the ATM, the message being displayed when the first account holder accesses the ATM at a time occurring within the time window.

ACCESS CONTROL USING STAND-ALONE PARAMETERS FOR WIRELESS DEVICES
20220366418 · 2022-11-17 ·

Aspects of a system and apparatus for accessing online services subject to limitations and restrictions are disclosed. An operator, also referenced herein as a vendor or subscriber, access a third party host server. The operator provides a plurality of data parameters describing a scope and extent of user privileges with respect to one or more services available to the server via a network or internet connection. A user may download an application and use the services, including providing funds through an account funded by the user where applicable. The user's access to the service at issue may be subject to the data parameters at the server, which may provide limitations or restriction on the use of the service by the server, or which, in appropriate cases, may deny service.

METHOD AND SYSTEM FOR PRIVACY ORIENTED PROVENANCE AT THE POINT OF SALE

The present disclosure provides a description of systems and methods for verifying product authenticity at a point of sale through transaction messages. A point of sale may collect product identifiers from products that a consumer is interested in purchase as part of a traditional checkout process. Product identifiers can be included in special data elements in a transaction message that is submitted to a merchant's acquiring bank through for the payment transaction. As part of the processing of the transaction by the acquirer, the acquirer can consult a processor to check the authenticity of the products being purchased by examining a provenance blockchain for the product identifiers included in the transaction message. If the products are determined to be authentic, the transaction can proceed as normal. If the products are not authentic, then the acquirer can deny the transaction and stop the consumer from purchasing a counterfeit or fraudulent good.