G06Q20/4014

METHOD AND SYSTEM FOR RESOLVING A TARGET
20230206207 · 2023-06-29 ·

Disclosed are a method and a system for resolving a target, which employ two-stage target resolution. A local resolving peer resolves the target at a first-stage target resolution. If the first-stage target resolution fails, the first resolving peer sends target-related information to at least one remote resolving peer for second-stage target resolution in return of a resolvable result indicating that the target is resolvable to corresponding type of identifier. To avoid congested traffic arising from broadcasting target-related information without discrimination to the at least one remote resolving peer, a scheme caching approach and a hint service approach are adopted. Transmission of target-related information can be conducted either concurrently or sequentially in response to traffic condition. Accordingly, the method and the system of the present invention reliably resolve a target with known or unknown format at two stages without compromising the efficiency for target resolution.

SECURELY MODIFYING EXCHANGE ITEMS IN AN EXCHANGE ITEM MARKETPLACE NETWORK

A method begins with a server in a data communication system establishing an initial validity of an exchange item that includes data regarding a quantifiable value, a serial number, and issuance information, where the initial validity authenticates the exchange item and the data. The method continues with the server executing a secure custody protocol to establish that a first computing device has secure custody of the exchange item and to maintain validity of the exchange item. The method continues with the server transferring the secure custody of the exchange item from the first computing device to the server or to a second computing device. When the exchange item is in the secure custody of the server the method continues with the server modifying the data of the exchange item to produce a modified exchange item and transferring secure custody of the modified exchange item to the first computing device.

NEURAL NETWORK SYSTEMS AND METHODS FOR GENERATING DISTRIBUTED REPRESENTATIONS OF ELECTRONIC TRANSACTION INFORMATION

Computer-implemented methods and systems are provided for generating a distributed representation of electronic transaction data. Consistent with disclosed embodiments, generation may include receiving electronic transaction data including first and second entity identifiers. Generation may also include generating an output distributed representation by iteratively updating a distributed representation using the electronic transaction data. The distributed representation may include rows corresponding to first entity identifiers and rows corresponding to second entity identifiers. An iterative update may include generating a training sample and an embedding vector using the components and the distributed representation; determining, by a neural network, a predicted category from the embedding vector; and updating the distributed representation using the predicted category and the training sample. The embodiments may also include outputting the output distributed representation to determine authorization of electronic transactions. Disclosed embodiments may also receive an electronic transaction and determine whether to authorize the electronic transaction based on a distributed representation of electronic transaction data.

Mobile Wallet Object System and Method
20170372302 · 2017-12-28 ·

A system and method for providing information utilizing hyper-location to determine what types of or the content of relevant information to display to one or more end users. In various embodiments, the hyper-location is determined from or transmitted by beacons that communicate with portable electronic devices carried by the end users. The hyper-location information may be specific geographic locations of the beacons and or end users or may be specific locations relative to other locations, such as a position within a store or venue.

SECURE KEY BASED TRUST CHAIN AMONG USER DEVICES

Systems and methods for providing a secure key based trust chain among several user devices are disclosed. An example method includes, obtaining a first request to authenticate a user on a first user device based on a user identifier; in response to the obtaining, transmitting to, a second user device, a second request to authenticate the user on the first user device. The second user device is a trusted user device on which the user has been authenticated. The method further includes, obtaining an indication that the user has approved the second request on the second user device without providing a password corresponding to the user identifier; and in response to obtaining the indication, authenticating the user on the first user device without requiring, from the user, the password corresponding to the user identifier.

IDENTIFYING SECURITY THREATS VIA USER-INPUT METRCS

Techniques described herein are directed to, in part, receiving input data from a computing device that includes a data capturing component; receiving, from the computing device, sensor data representing one or more characteristics associated with an interaction between a user and the data capturing component while the input data is being captured; authenticating an account associated with the user based at least in part on the input data and the one or more characteristics; and sending, to the computing device, an indication that the account of the user has been authenticated.

METHODS AND SYSTEMS FOR SHARED RESOURCE ACCESS
20230206234 · 2023-06-29 ·

Systems and method are provided for sharing access to a resource. A computing device may receive a request to share access to a resource that includes a user identifier. The computing device may generate a sharetoken that is linked to the resource and provides a limited access credential to access to the resource. The computing device may facilitate transmission of a provisioning link to a device associated with the user identifier. In response to the provisioning link being executed by the device associated with the user identifier, the computing device may transmit the sharetoken. The sharetoken may be stored in an application configured to access the resource using the sharetoken.

Payment Systems and Methods
20230206235 · 2023-06-29 ·

Payment systems and methods that facilitate electronic payer-payee financial transactions, using one or more universal payment identifiers, are disclosed. One method includes a payer computing device receiving a payment credential associated with a payee. The payment credential may be mapped to a universal payment address. The payer computing device may request a payment server for a payee account information associated with the payment credential. The payment server may translate the payment credential to the universal payment address, resolve the universal payment address to the payee account information, retrieve the payee account information using the universal payment address, and transmit the payee account information to the payer computing device. The payer computing device may perform a payment PUSH operation to the payment server. The payment server may forward the payment PUSH operation to the payee account to complete a financial transaction between the payer computing device and the payee.

Identification token, systems and methods for identification and identity verification.
20230206219 · 2023-06-29 ·

An exemplary embodiment comprises at least one identification (ID) token (16) held in a crypto wallet (14) owned by an individual (12), and one registry record (24) managed by a registrar smart contract (18). The ID token contains an identification hash which uniquely represents the individual's identity, and an address which points to a registration authority. The authority is the one who has confirmed the identity of the individual and created the registry record (24). The registry record (24) contains a unique value which is cryptographically computed from the wallet address (30) and the ID token address (31). By asking the registrar (18) for the existence of the registry record (24), applications and service providers (10) can reliably verify the identity of the individual (12) without the individual (12) submitting ID documents, therefore reducing the risk of exposing sensitive data to untrusted parties. Other embodiments are described and shown.

Cardless financial transactions

An automatic-transaction-machine (ATM) has a processor that controls at least portions of some financial transactions conducted by the ATM. A banking computer system associated with the ATM is receives a pre-created transaction request from a customer using a mobile device. When the customer later brings the mobile device to the ATM, the ATM presents transaction-verification data to be received by the mobile device. The ATM is configured to receive mobile-verification data back from the mobile device that is responsive to the transaction-verification data. When the mobile-verification data is authenticated by the banking computer system the ATM is configured to execute the pre-created transaction request.