Patent classifications
G06Q20/4014
PAYMENT SYSTEM AND METHOD
The present invention is a payment system and method, which provides a solution to the problem of providing secure and contactless payments. The core components of the invention are a server or other hardware system that communicates with point of sale terminals or other vendor hardware, user devices, and bank servers to generate invoices, communicate invoices to users, authorize payments with the user and the user's bank, and send confirmation messages.
CIRCULAR POLARIZATION ANTENNA FOR USE IN DETECTING PRESENCE WITHIN A STRICTLY DEFINED WIRELESS ZONE
A wireless proximity detection system employs short-range wireless communication implementing circular polarization to detect the proximity of a user device within a strictly defined wireless zone, regardless of its orientation and location on the user, and as a result trigger a desired action. The proximity detection system may utilize one or more patch antennas to define the wireless zone and the associated received signal strength(s) detected by the user's wireless device, as well as a distance-measuring device. A beacon may be utilized to prepare the user's mobile phone for detection as well as other antennas for coordination with the primary short-range antenna. The novel antenna structure allows a compact and low-cost fabrication method and the use of common printed circuit fabrication methods provide an integrated solution.
Data Storage and Management and Methods of Thereof
Described herein are various methods of sharing data across multiple computers. The method of sharing data permits the pruning of data from the shared data.
Secure authentication based on passport data stored in a contactless card
Systems, methods, articles of manufacture, and computer-readable media for secure authentication based on passport data stored in a contactless card associated with an account. An application may receive an indication to perform an operation. The application may receive encrypted data from the card. The application may receive an indication that the authentication server verified the encrypted data based on a private key. The application may receive encrypted passport data from the contactless card, the encrypted passport data for a passport associated with the account. The application may determine an attribute of the passport based at least in part on image data or text input. The application may decrypt the encrypted passport data based on the attribute of the passport. The application may initiate performance of the operation based on the received indication specifying that the authentication server verified the encrypted data and the decryption of the encrypted passport data.
Fraud prevention via beneficiary account validation
Disclosed are methods, systems, and devices for preventing payments to unintended beneficiaries. A service provider system may receive, from a user device of a user, a payment request to transfer funds from a source account to an identified destination account. A beneficiary system may be identified, and a validation request (e.g., an API call) may be transmitted to the beneficiary system. The service provider system may receive from the beneficiary system a transmission indicating whether the destination account is associated with the recipient identified in the payment request. The user may be alerted if the account number for the destination account is not validated.
Secure shipping interactions using blockchains
Technologies are shown for securing private information during shipping of an item storing shipping information at a blockchain address that includes a recipient geolocation address and generating a shipping label that includes a machine-readable pointer to the blockchain address. The label can be scanned to obtain the blockchain address and request the shipping information. In response to a request, the recipient geolocation address or a next intermediate shipper can be provided. The recipient can be notified to obtain authorization to release the recipient geolocation address or provide an alternative geolocation for delivery.
METHOD FOR THE SAFE TRANSFER OF DATA
The present invention relates to a method and a system for the safe transfer of data between at least two computer devices. In first aspect, the invention to this end provides a method for performing an electronic transaction between a mobile communication device of a buyer, a terminal of a merchant and a transaction server which is connected to the terminal, which mobile communication device, the terminal and the transaction server are comprised in a data network, the method comprising the following steps: the mobile communication device initiates a communication session with the transaction server via the terminal; the transaction server of the mobile communication device receives an identification code which is linked to the buyer; the transaction server initiates a communication session with a trusted third party; the transaction server retrieves buyer-identification information and transaction data from the trusted third party in order to perform the electronic transaction between the buyer and merchant; the transaction server authenticates the buyer on the basis of the received buyer-identification information; the transaction server processes the electronic transaction between the buyer and merchant; furthermore comprising the following steps: the mobile communication device transmits an expiration parameter to define a life span of the buyer-identification information on the transaction server together with the identification code to the transaction server; the transaction server automatically removes the buyer-identification information after the life span of the transaction server determined by the expiration parameter has expired.
METHODS, MODULE AND BLOCKCHAIN FOR DISTRIBUTED PUBLIC KEYSTORE
Disclosed is a universal plug-in Distributed Public Keystore (DPK) module provided on a user equipment. The DPK module approves its identifier with a Public Key Manager (PKM) and obtains cryptocurrency from the PKM. The APPs on the user equipment generate and transmit user public keys to the DPK module. The DPK module generated its own user public key as well. After a storage transaction requirement by the DPK module is approved by a blockchain, the DPK module sends obtained user public keys to the blockchain so that the user public keys are stored in the blockchain. The user public keys are never stored outside the blockchain or in a third part server. The stored user public keys are retrieved to the DPK module when necessary, such as when a P2P communication is performed by any of the APPs.
System, method, and computer program product for generating synthetic data
Provided are a system, method, and computer program product for generating synthetic data. The method includes receiving a plurality of data types associated with an environment to be evaluated and receiving a plurality of correlations of one data type to another data type. The method also includes generating a correlation graph of the plurality of data types based on the plurality of correlations and generating a directed acyclic graph of the plurality of data types based on the correlation graph. The method further includes generating a hierarchical graph of the plurality of data types by applying a path traversal technique to the directed acyclic graph and generating a synthetic dataset by repeatedly traversing the hierarchical graph to generate a plurality of records of data.
Controlled dispensing system and method
A controlled dispensing fixture including a display screen, a scanning device, and one or more processors is configured to: obtain via the display screen or remote scanner a selection of one or more controlled products; update a user interface on the display screen based on the selection; determine whether the one or more controlled products meet a purchase limit associated with the one or more controlled products for dispensing; obtain via the scanning device consumer identification information; determine whether the consumer identification information meets an age threshold and/or an identity requirement associated with the one or more controlled products; and in accordance with a determination that (i) the one or more controlled products meet the purchase limit for dispensing, and (ii) the consumer identification information meets the age threshold and/or the identity requirement, transmit a dispensing instruction to the dispensing fixture to dispense the one or more controlled products.