G06Q20/4014

Touchless virtual card payment automation

A system to process virtual credit card (VCC) payments automatically is provided. Electronic delivery of VCC payment information may be transferred as electronic data representing a VCC payment to the seller (e.g., an email). Data exchange methods for VCC payments include application programming interfaces (APIs), email, files, etc. Secure processing is provided via an environment that meets rigorous security standards (e.g., Payment Card Industry (PCI) data security standards). Credentials of the sending entity establish the context that allows the system to associate the data received with the correct buyer and seller. Authentication may be provided within the context of the data transferred. Authentication may also use the sender's email address to validate the sender using a digital signature of the email contents. The system may combine digital signature validation of an email with a validation of a sending entity using the DomainKeys Identified Mail (DKIM) email authentication protocol.

Computerized methods and computer systems for verification of transactions

When a payment transaction made by a user, a reminder data file is created including reminder items associated with the payment transaction. At least one of the reminder items is an image. Subsequently, a transaction statement listing one or more payment transactions is provided to the user, in a form in which each listed payment transaction is associated with an embedded link to the corresponding reminder data file, which permits the user to access the reminder data file. Thus, a user who is unable to recognize a payment transaction on the transaction statement, can use the statement to access the corresponding reminder items, to provide the user with a reminder of the details of the transaction.

Method and system for obfuscating sensitive personal data in processes requiring personal identification in unregulated platforms

Disclosed is a method and system, in FIG. 1, for verifying authenticity of specific personal data responsive to a unique wallet address (70) on a public ledger (66) of an unregulated platform (60). The wallet contains one or more non-transferable NFTs each locked to the wallet and related to specific personal data. The non-transferable NFT was minted from a regulated platform (27) to which there is a record (76) in the public ledger. Supplying the unique address of the wallet to a service supplier affects a log-in of a client (18) to the service supplier (90), whereafter message interactions over a network (12) between the service supplier and the unregulated platform (60) permits searching for a relevant (72) non-transferable NFTs (74) stored in the wallet and related to the specific personal data. Return of any relevant non-transferable NFT related to the personal data thus verifies authenticity of the specific personal data by association with a regulated platform.

Transaction Based Authentication with Item-Level Data

Aspects described herein may provide techniques for authenticating a user using transaction-based authentication questions that are generated based on item-level purchase data. The item-level purchase data of a transaction may include specific details of a transaction such as identification of each item purchased and corresponding prices paid for each item. Transaction-based authentication questions for a financial account may be generated based on the item-level purchase data that an authorized user of the financial account is likely to remember and that a malicious actor is unlikely to correctly guess. As a result, the authorized user of the account is likely to be correctly authenticated while the malicious actor is likely to answer the transaction-based authentication question incorrectly. Authentication can therefore effectively block malicious actors without overly burdening actual authorized users during the authentication process.

System, method, and computer program product for conducting a payment transaction involving payment on delivery

Provided is a system for conducting a payment transaction involving payment on delivery in real-time. The system may include at least one processor programmed or configured to receive transaction data associated with a payment transaction involving a merchant and a customer at a location that is independent of a merchant location, determine a financial institution of a plurality of financial institutions based on the transaction data associated with the payment transaction, communicate data associated with a request for authorization of the payment transaction involving the merchant and the customer, receive an indication of authorization of the payment transaction involving the merchant and the customer, communicate data associated with authorization of the payment transaction involving the merchant and the customer. A method and computer program product are also provided.

Mobile wallet authentication systems and methods

A computer system receives an indication from a user that the user wishes to perform a mobile wallet transaction to transfer funds to a recipient using a mobile device. The transaction is authenticated by the computer system. The authentication includes receiving login credentials manually entered by the user and determining that the login credentials match stored login credentials for the user. The authentication further includes determining that the mobile device has a device token stored thereon that matches a device token stored in a database of the computer system. The device token uniquely identifies the mobile device in the computer system. The authentication further includes determining that the mobile device has a customer token stored thereon that matches the customer token stored in the database. The customer token uniquely identifying the customer in the computer system. The computer system transmits the funds to the recipient responsive to the authenticating step.

Systems and methods for using captured time series of secured representations of distributed ledger addresses and smart contract deployed on distributed ledger network to prove compliance

Systems and methods described herein are directed to using a smart contract deployed on a distributed ledger network to prove compliance for handling of an asset over time and space. In some implementations, a system includes: one or more servers operating as nodes on a distributed ledger network; and a storage to store an instance of a smart contract. The one or more servers may be to: deploy the smart contract to the distributed ledger network; verify time series data captured by a device, where the verified time series data includes for each time a secured representation of a distributed ledger address; and send at least some of the verified time series data as an input to the smart contract. The smart contract, in response to receiving the at least some of the verified time series data, may execute to determine if one or more conditions have been satisfied.

SYSTEM AND METHOD FOR DETECTING SIGNATURE FORGERIES
20220351199 · 2022-11-03 ·

Two models are first trained and then test images are applied to the two trained models in an effort to detect signature forgeries. The first model is trained with pairs of signature images and the resultant trained model is capable of detecting blind forgeries. The second model is trained with triplets of signature images and is capable of detecting skilled signature forgeries. After the two models are trained, test images are applied to the models and determinations are made as to whether a blind or skilled forgery is present.

SYSTEM AND METHOD OF IDENTITY VERIFICATION

A system and method of verifying the identity of a user or registrant. The user or registrant provides identification information and registration information. The identification information may be a visual representation of an identifying item associated with location information. In some embodiments, the identification information may be a visual representation of a government issued identity. An identification module verifies the identification information and compares the verified identification information to the registration information.

IN ONLINE TRANSACTIONS A PAYMENT SYSTEM OR A PAYMENT METHOD USING A CREDIT CARD THAT CAN LINK WITH A URL
20220351184 · 2022-11-03 ·

In online payment using the URL&CC, the routes of the payment request process and the user confirmation process are different and the order of these can be changed. (Payment method 1) Payment method 1 first requests payment by using the URL&CC's CCI path, and confirms the user by using the URL&CC's URL path and the user's URL PWD path. (Payment method 2) Payment method 2 confirms the user by using the URL&CC's URL path and the user's URL PWD path, and requests the payment by using the URL&CC's CCI path.