G06Q20/4014

System and method for access using a circle of trust

A processor-implemented method includes (i) automatically defining a first Circle of Trust (CoT) by a first CoT administrator, in a CoT database, (ii) automatically receiving, at a digital identity management (DIM) server, a first digital identity wallet (DIW) application request from a first DIW application provider server, (iii) automatically adding the first DIW application to the CoT database if the first CoT administrator approves the first DIW application request, (iv) automatically receiving, at the DIM server, a relying party application request from the at least one relying party application associated with the relying party and (v) automatically adding, the at least one relying party application to the CoT database, if the first CoT administrator approves the relying party application request.

SYSTEMS, APPARATUS AND METHODS FOR SECURE ELECTRICAL COMMUNICATION OF BIOMETRIC PERSONAL IDENTIFICATION INFORMATION TO VALIDATE THE IDENTITY OF AN INDIVIDUAL
20220337419 · 2022-10-20 · ·

An apparatus for validating an identity of an individual based on biometrics includes a memory and a processor operatively coupled to a distributed database and the memory. The processor is configured to provide biometric data as an input to a predefined hash function to obtain a first biometric hash value. The processor is configured to obtain, using a first pointer to the distributed database, a signed second biometric hash value. The processor is configured to define a certification of the biometric data in response to verifying that a signature of the signed second biometric hash value is associated with the compute device and verifying that the first biometric hash value corresponds with the second biometric hash value. The processor is configured to digitally sign the certification using a private key associated with the processor to produce a signed biometric certification and store the signed biometric certification in the distributed database.

Method and device applying artificial intelligence to send money by using voice input

An example device includes a memory configured to store at least one program; a microphone configured to receive a voice; and at least one processor configured to execute the at least one program to control the device to perform operations for sending money to a recipient. The operations include determining a payment intention of a user based on analyzing the received voice input; retrieving contact information from a stored contact list based on the name of the recipient; transmitting the name and the contact information of the recipient to a bank server together with an amount of money specified in the voice input; receiving remittance details from the bank server; and approving the remittance details. The device may analyze the received voice input by using an artificial intelligence (AI) algorithm.

Method and apparatus for identifying identity information
11605087 · 2023-03-14 · ·

A method for identifying identity information includes: acquiring user data, the user data including identity information and account information of a user; establishing an association relationship between account information and identity information that are bound in the user data, and establishing an association relationship between two pieces of account information having common features in the user data; and determining a risk value of target identity information in the user data according to the established association relationships, and determining, according to the determined risk value, whether the target identity information has a risk of being used fraudulently.

Accessing information based on privileges

In some examples, a system is to receive, from a client device, a query comprising a representation of blockchain information of an entity associated with an electronic device that advertised the representation. The system is to further determine whether a client entity associated with the client device has a privilege to access response information that is responsive to the query, and in response to determining that the client entity has the privilege to access the response information, send, to a blockchain network, a request containing the blockchain information to obtain the response information.

PAYMENT METHOD, CLIENT, ELECTRONIC DEVICE, STORAGE MEDIUM, AND SERVER
20230127314 · 2023-04-27 ·

Embodiments of this application disclose a payment method, a client, an electronic device, a storage medium, and a server. The method includes: receiving a payment instruction of a user; generating, according to audio information in a voice input of the user, a voice feature vector of the audio information; performing matching between the voice feature vector and a user feature vector; and when the matching succeeds, sending personal information associated with the user feature vector to a server, so that the server performs a payment operation for a resource account associated with the personal information. The method can bring convenience to shopping by a consumer.

SYSTEMS FOR AUTHENTICATING USER PERMISSIONS AND METHODS OF USE THEREOF
20220335248 · 2022-10-20 ·

Systems and methods of the present disclosure physical object-based passwords by registering an object password including first object representations, first background scene representations, and a first presentation sequence from first image data. Receiving second image data and a second presentation sequence that is a second order in which the user has presented second physical objects to an image acquisition device, and detecting in the second image data second object representations of the second physical objects, and second background scene representations. Computing a probability that the user is a permissioned user by inputting the first image data and the second image data into a machine learning model configured to compute the probability based on comparing the object password and the second image data. Tagging the user as the permissioned user or non-permissioned user based on the probability.

COMMUNICATIONS SERVER APPARATUS, METHOD AND COMMUNICATIONS SYSTEM FOR MANAGING AUTHENTICATION OF A USER

A communications server apparatus for managing authentication of a user based on one or more authentication events in a session is provided, to, in one or more data records, generate, for each authentication event, data indicative of a trust score corresponding to the authentication event; and generate, data indicative of a security score based on the trust scores corresponding to the one or more authentication events in the session, and, in response to receiving request data indicative of an authentication request associated with the user corresponding to a transaction in the session, the transaction having a value indicator, authenticate the user if the security score satisfies a condition for authentication corresponding to the transaction according to the value indicator, wherein security scores for satisfying the condition are variable according to value indicators of transactions.

SYSTEMS AND METHODS FOR A CONTEXT-DRIVEN ELECTRONIC TRANSACTIONS FRAUD DETECTION
20230075970 · 2023-03-09 ·

Systems and methods are disclosed for establishing a multi-dimensional fraud detection system and payment analysis. One method includes: receiving transaction history of a user, the transaction history including a first payment vehicle and a second payment vehicle; determining, of the received transaction history, one or more instances of switching from one the first payment vehicle to the second payment vehicle; and determining a user-specific abandonment score for the user, based on the determined instances of switching from the first payment vehicle to the second payment vehicle.

Systems and methods for authenticating user identities in networked computer systems

The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.