G06Q20/4014

METHODS AND SYSTEMS FOR DECONFLICTING DATA FROM MULTIPLE SOURCES IN COMPUTER SYSTEMS

Methods and systems are described for verifying an identity of a user through contextual knowledge-based authentication. The system described uses contextual knowledge-based authentication. By verifying an identity of a user through contextual knowledge-based authentication, the verification is both more secure and more intuitive to the user. For example, by relying on confidential and/or proprietary information, the system may generate verification questions, the answers to which are known only by the user.

USER PROFILING BASED ON TRANSACTION DATA ASSOCIATED WITH A USER
20230099864 · 2023-03-30 ·

A user profile scoring platform may analyze a transaction log of a transaction account of a user to determine, based on transactions of the transaction log, a qualification status of the user, wherein the qualification status indicates that a characteristic of the user satisfies a threshold qualification metric. The user profile scoring platform may determine, based on the qualification status, a transaction-based score associated with the user, wherein the transaction-based score is determined using a transaction log analysis model. The user profile scoring platform may obtain, based on receiving the access information, a user score associated with a user transaction history that is associated with a plurality of transaction accounts that are associated with the user and different from the transaction account. The user profile scoring platform may perform an action based on the transaction-based score and the user score.

Parking guidance system of parking lot provided with charging device for vehicle and parking guidance method using the same

A parking guidance system of a parking lot includes: a first license plate number recognizing device recognizing a license plate number of a vehicle entering or exiting from a parking lot; and a server classifying a priority of the vehicle and distinguishing whether the vehicle is a parking or charging use vehicle based on the license plate number, assigning a parking or charging spot based on at least one of the classified priority, information on whether the vehicle is the parking use vehicle or the charging use vehicle, or information on remaining parking spots and remaining charging spots, providing a guidance on a position of the assigned parking spot or charging spot to the vehicle until the vehicle arrives at the position, and determining a parking fee or a charging fee of the vehicle and providing a guidance on the fee when the vehicle exits the parking lot.

Decentralized computer systems and methods for using a debit network as an intermediary between distributed ledgers
11574333 · 2023-02-07 · ·

Decentralized computer systems and methods are disclosed for using a debit network as an intermediary between distributed ledgers. One method includes: receiving, at a first blockchain network from a merchant, transaction information comprising a consumer identification, an issuer identification from a payment vehicle presented for a transaction, and a transaction amount in resources of a first type, wherein the merchant and/or its acquirer are participants of the first blockchain network but the consumer and/or issuer are not participants of the first blockchain network; sending the transaction information to a debit network; identifying, using the debit network, a second blockchain network having the consumer and/or the issuer as participants, using the received consumer identification or issuer identification; and if participants of the second blockchain network accept the transaction, generating a new immutable entry to the second blockchain network indicating a change in the resources of a second type.

METHOD AND SYSTEM FOR PERFORMING AN OPERATION

A server comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module and from a computing device, a signal representing a request to perform an operation from a user; determine that the user does not have a persistent account; and when it is determined that the user does not have a persistent account: obtain, via the communications module and from a digital identity network, a signal including verified identity data of the user; generate a temporary data record and associate the temporary data record with the verified identity data of the user; receive a value transfer based on the requested operation and store the received value in the temporary data record; and perform the operation using the stored value in the temporary data record.

SYSTEMS AND METHODS FOR FACILITATING PACKAGE DELIVERY OR PICKUP
20230034646 · 2023-02-02 ·

A system for facilitating package delivery or pickup at premises of senders or recipients has a package door that is used for receipt and collection of packages. The package door includes an input device for entering package information and an image capture device for visually recording the arrival of a courier. Based on the package information entered via the input device, the system determines whether the package information matches a predetermined value, such as a package tracking number. The system may automatically unlock the package door if the package information matches such predetermined value. In other embodiments, a user may remotely monitor the package information and/or information from the image capture device to determine whether to provide inputs for unlocking the package door. The system logs the package information received from the input device and the image capture device.

METHODS AND SYSTEMS FOR CROSS-WEB HEADLESS TRANSACTIONS
20230097083 · 2023-03-30 ·

Disclosed herein are methods and systems for cross-web headless transactions. One method comprises in response to an interaction with a commerce object of a media element, retrieving a user identifier and metadata associated with a product depicted within the media element, the metadata indicating at least an attribute of the product, the media element displaying a graphical element indicating at least one attribute of the product retrieved from the metadata; retrieving payment data and a purchase preference based on the retrieved user identifier and metadata, the purchase preference being extracted from at least one previously completed purchase associated with the user identifier; generating a message containing transaction attributes corresponding to the payment data and the purchase preference; and transmitting the message to a server hosting the media element, wherein the message initiates a checkout process using at least one of the transaction attributes.

SYSTEMS AND METHODS FOR MATH-BASED CURRENCY ESCROW TRANSACTIONS
20230034907 · 2023-02-02 ·

Systems and methods for verifying a digital title of an asset transferred via a math-based currency transaction. The method includes receiving a digital title request regarding an asset, creating a digital title for the asset in a digital title database, receiving, from a financial institution computing system, an asset transfer request regarding the asset that is the subject of the math-based currency transaction, verifying that an identity of a seller in the math-based currency transaction matches the identity of the owner of the asset. Then, responsive to the verification that the identity of the seller in the math-based currency transaction matches the identity of the owner of the asset, the method includes transmitting, to the financial institution computing system, a positive title verification and updating the identity of the asset of the digital title for the asset to match an identity of a buyer in the math-based currency transaction.

DIGITAL INFRASTRUCTURE TO PERFORM MULTI-NETWORK CONNECTIONS

The current document discloses systems and methods that implement digital management of multi-network connections. When the digital infrastructure manager receives a client request for access to a service or service provider, the digital infrastructure manager issues a signed access token to the client, and the access token utilized in various ways when service requests are processed. The digital infrastructure manager then processes, transmits, and manages the request, response, and any additional actions required to satisfy the request including multiple and/or additional requests by the same or other clients.

SYSTEMS AND METHODS FOR AUTHENTICATION USING EXISTING CREDENTIAL
20220351156 · 2022-11-03 ·

Disclosed herein are methods and systems for electronic authentication including receiving a purchase request from a browser application executing on a first electronic device; determining a user identifier associated with the purchase request; responsive to determining that the browser application does not satisfy a security threshold, identifying an active authenticated session for the user identifier, wherein the active authenticated session was generated using a second electronic device of a set of pre-authorized devices associated with the user identifier; generating a token for the purchase request before an expiration of the active authenticated session; and authorizing the purchase request using the token.