Patent classifications
G06Q20/4014
Third Party Data Processing for Improvement of Authentication Questions
Methods, systems, and apparatuses are described herein for improving the accuracy of synthetic authentication questions by analyzing third party account data. A request for access to a first account associated with a user may be received. The first account may be managed by a first organization. A transactions database might be queried for first account data. Second account data corresponding to a second account associated with the user might be received. That second account may be managed by a second organization different from the first organization. One or more second transactions, unique to the second account, may be identified. A synthetic transaction, configured to be different from transactions in the first account and the one or more second transactions, may be generated. An authentication question may be generated based on the synthetic transaction. Access to the first account might be provided based on a response to the authentication question.
SYSTEMS AND METHODS FOR PROVIDING IN-PERSON STATUS TO A USER DEVICE
Disclosed embodiments may include a method that includes scanning a machine-readable element, by a second user device, generated by a first user device and embedded with a tracking identifier and a product identifier and recognizing the link embedded in the machine-readable element. Responsive to recognizing the link, the method may include transmitting, by the second user device, a verification request to acquire the product to a server, wherein the verification request comprises the tracking identifier and product identifier. Responsive to receiving in-person status credentials at the second user device, the method may include rendering a description of the product on a display of the second user device, receiving a second user input confirming intent to acquire the product, and transmitting, to a server, instructions to acquire the product in response to receiving the first user input.
TAXI SYSTEM
A taxi system includes: a plurality of unmanned taxi vehicles; a medium reader that is mounted on the unmanned taxi vehicle, and outputs a result obtained by reading a certificate medium presented by the occupant, as read data; and a system controller that acquires, by analyzing the read data, ticket information including at least one of a destination and payment information, and executes, based on the acquired ticket information, at least one of setting of the destination of the unmanned taxi vehicle and execution of a payment, in which the certificate medium is a medium issued to the occupant in order to authenticate the occupant in a situation other than taxi use.
ENCRYPTING A PORTION OF A BLOCK OF AN EXCHANGE ITEM TRANSACTIONS CHAIN
A method for execution by one or more computing devices of an exchange item marketplace network includes generating, by an exchange item origination entity, an origination block of an exchange item transactions chain associated with an exchange item, where a portion of the origination block is encrypted. The method further includes receiving, from a computing device of the exchange item marketplace network, an acquisition request regarding the exchange item. The method further includes generating a first block of the exchange item transactions chain, where the first block includes information regarding the exchange item, the computing device, and the acquisition request, where a first portion of the first block is encrypted, and where the first block is chained to the origination block in accordance with a security approach.
Enclave Interactions
Aspects of the disclosure provide various methods relating to enclaves. For instance, a method of authentication for an enclave entity with a second entity may include receiving, by one or more processors of a host computing device of the enclave entity, a request and an assertion of identity for the second entity, the assertion including identity information for the second identity; using an assertion verifier of the enclave entity to determine whether the assertion is valid; when the assertion is valid, extracting the identity information; authenticating the second entity using an access control list for the enclave entity to determine whether the identity information meets expectations of the access control list; when the identity information meets the expectations of the access control list, completing the request.
MODULAR DATA PROCESSING AND STORAGE SYSTEM
A system enables entities to access a single platform in order to utilize electronic data storage for storing different types of information. One or more computers may operate an electronic data storage processing network that entities can access when updating information in electronic data storage. The electronic data storage processing network may operate a plurality of electronic data storage processing modules, which can include an aggregator module, a formatter module, an operator signer module, and a validator module. Based on the specific use case for which electronic data storage is utilized, recordable data that is to be added to the electronic data storage can be processed by the appropriate aggregating, formatting, signing, and validating functions provided by the electronic data storage processing modules.
USER INTERFACES FOR TRANSFER ACCOUNTS
The present disclosure generally relates to managing the use of transfer accounts using an electronic device. In accordance with some embodiments, user interfaces for inputting information about a secure credential to an electronic device are described. In accordance with some embodiments, user interfaces for managing the use of a credential provisioned on an electronic device that operates on stored power are described. In accordance with some embodiments, user interfaces for managing the use of a transfer account associated with different credentials on an electronic device are described.
Methods for locating an antenna within an electronic device
A method of determining a proximity of an antenna located in a payment instrument to an antenna located within an electronic device may include receiving, at the antenna located within the electronic device, a first signal from the antenna located in the payment instrument, the first signal received at a first time, receiving, at the antenna located within an electronic device, a second signal from the antenna located in the payment instrument, the second signal received at a second time, the second time being later than the first time, determining a difference in a signal strength between the first and second signals, and displaying, on a display of the electronic device, an indication based on the determination.
SYSTEMS AND METHODS FOR CONTROLLED ACCESS TO BLOCKCHAIN DATA
Methods and systems for managing and/or processing a blockchain to maintain data security for confidential and/or personal data are provided. According to certain aspects, the disclosed data security techniques may enable access sharing functionality utilizing the blockchain. For example, access sharing may be utilized to file documents, share policy information, and/or comply with an audit. The data security techniques disclosed herein also enable the use of smart contracts to transfer funds associated with payment obligations and/or other forms of blockchain based payments, comply with anti-money laundering requirements, report industry data, validate interest payments and/or maintain agent sales data. Data security may be achieved through the use of public key/private key encryption techniques.
SHARING AND USING PASSES OR ACCOUNTS
The present disclosure generally relates to a computer system displaying user interfaces for accessing passes and transfer accounts. In some examples, passes are added to the computer system. In some examples, passes are accessed. In some examples, transfers relating to the passes and transfer accounts are displayed, such as in search user interfaces.