G06Q20/4014

Method and system for remote transaction processing using a non-browser based application
11599865 · 2023-03-07 · ·

A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.

VERIFYING EXTERNAL ACCOUNTS IN REAL-TIME USING DYNAMIC SMART CONTRACTS

Aspects of the disclosure relate to verifying external accounts in real-time using dynamic smart contracts. A computing platform may receive a consumer request to initiate a transaction, at an enterprise organization, with an entity associated with an account. The computing platform may use the received consumer request to generate a smart contract profile associated with the entity. The computing platform may use the smart contract profile associated with the entity to determine a trust score associated with the entity. The computing platform may gather data indicating external accounts associated with the entity. The computing platform may use the data indicating the external accounts associated with the entity to determine a confidence threshold value. The computing platform may compare the trust score associated with the entity to the confidence threshold value to verify the legitimacy of the account associated with the entity.

SYSTEM FOR IMPLEMENTING LAYERED AUTHORIZATION PLATFORM USING NON-FUNGIBLE TOKENS
20230126386 · 2023-04-27 · ·

Systems, computer program products, and methods are described herein for implementing layered authorization platform using non-fungible tokens. The present invention is configured to electronically receive, via a user input device, a document designated for notarization and an identification credential from a user; crawl through a distributed ledger to determine a non-fungible token (NFT) for the identification credential; retrieve, from the distributed ledger, the NFT for the identification credential; capture, via the user input device, a signature of the user on the document designated for notarization to create a signed document; generate, using an NFT generator, an NFT for the signed document; link the NFT for the signed document with the NFT for the identification credential; and record the NFT for the signed document in the distributed ledger.

System and methods for shopping in a physical store
11599932 · 2023-03-07 · ·

A method and system for assisting in shopping at a physical store (104) is described. The method includes receiving image data of the inside of a shopping cart (108) and processing the image data to detect one or more events. An event is the addition of an item (114) to the shopping cart (108) or the removal of an item (114) from the shopping cart (108). Responsive to detecting an event, the method processes the image data to identify an item associated with the event, and generates cart information based on the identified item. The cart information includes a record of items currently in the shopping cart (108). The method also communicates the cart information with respect to the identified item to a customer device (118).

Secure authentication system with token service

An enhanced authentication system is described. One embodiment of the invention is directed to a method comprising: receiving, by a token service computer and from an initiating computer, a first authentication request message including verification method data and a token; transmitting, by the token service computer, a second authentication request message comprising the token and the verification method data to an access control server; receiving, by the token service computer from the access control server, an authentication response message comprising the token and a user authentication verification value; and transmitting, by the token service computer to the initiating computer, the authentication response message comprising the token, the user authentication verification value, and a token authentication verification value.

System, methods and computer program products for identity authentication for electronic payment transactions

The disclosure comprises systems, methods and computer program products for identity authentication in connection with payment account information submitted for the purpose of network based electronic payment transaction(s). The disclosure comprises (i) receiving from a merchant server, (a) a name associated with a purchaser, and (b) a payment card number, (ii) retrieving a data record comprising a payment card holder name associated with the received payment card number, (iii) comparing the payment card holder name extracted from the retrieved data record with the name associated with the purchaser that has been received at the merchant server, and (d) responsive to a match between the payment card holder name extracted from the retrieved data record with the name associated with the purchaser that has been received at the merchant server, generating a positive identity authentication decision and transmit said identity authentication decision to the merchant server.

Key-value map commitments system and method

A method includes a validation computer receiving an authorization request message comprising a user state and a user proof from a user device. The user state comprises first and second user state elements. The user proof comprises first, second, and third user proof elements. The validation computer computes a first verification value by multiplying the first user proof element raised to the power of the second user state element, and the second user proof element raised to the power of the first user state element. The computer computes a second verification value by raising the second user proof element to the power of the second user state element. The computer compares the first verification value to a first accumulated state element of an accumulated state. The compares the second verification value to a second accumulated state element. The validation computer authorizes the authorization request message based on the comparison steps.

Systems and methods for controlled access to policy data on blockchain

Methods and systems for managing and/or processing a blockchain to maintain data security for confidential and/or personal data are provided. According to certain aspects, the disclosed data security techniques may enable access sharing functionality utilizing the blockchain. For example, access sharing may be utilized to share policy information. The policy information may be associated with a smart contract. Accordingly, the policy information may be encrypted using a public key for the smart contract and compiled into a block of the blockchain. In response to a request to provide access to the information to a particular node, the private key for the smart contract may be encrypted using the public key for the particular node and compiled into a block of the blockchain.

Intelligent cash handling

Aspects of the disclosure relate to cash handling devices that provide intelligent monitoring and management of cash cycles. A cash handling device having at least one processor, a communication interface, and memory may receive, from a mobile device, a request to process a pre-staged transaction. Subsequently, the cash handling device may generate and present a graphical identifier based on the mobile device requesting access to the cash handling device. Next, the cash handling device may verify that the mobile device is authorized to perform the pre-staged transaction based on the graphical identifier being scanned by the mobile device and cause a connection to be established between the cash handling device and the mobile device. Thereafter, the cash handling device may identify and process the pre-staged transaction associated with the mobile device. Then, the cash handling device may generate a notification indicating completed processing of the identified pre-staged transaction.

Systems and methods for payment authentication

Methods and systems are disclosed for payment authentication. For example, a method may include: the method comprising: storing a first device fingerprint in association with a token representing a primary account number, the first device fingerprint being derived from a device attribute of a user device and behavioral biometric data derived from a behavioral pattern of a user in using the user device; receiving an authentication request indicative of the token and a second device fingerprint generated by a customer device associated with a customer of a merchant, the authentication request being associated with a transaction between the merchant and a customer using the token; identifying the stored first device fingerprint based on the token indicated by the authentication request; and determining whether the second device fingerprint matches the stored first device fingerprint.