G06Q20/4014

SYSTEM AND METHOD PROVIDING AN ELECTRONIC CENTRALIZED GATEWAY SWITCH TO A PLURALITY OF NETWORK DEVICES

Systems, methods, and computer program products are provided for providing an electronic centralized gateway switch to a plurality of network devices. The method includes assigning a resource value to a resource received from a sending user. The resource value corresponds to a value of the resource received. The method also includes receiving a resource transfer information. The resource transfer information includes intended transfer target information corresponding to an intended transfer target account associated with an intended transfer target. The intended transfer target account is associated with one of a plurality of resource entities. The method further includes connecting to the resource entity associated with the intended transfer target account based on the resource entity associated with the intended transfer target account. The method still further includes causing a transmission of the resource value to the intended transfer target account at the resource entity associated with the intended transfer target account.

IDENTIFYING SUSPICIOUS BEHAVIOR BASED ON PATTERNS OF DIGITAL IDENTIFICATION DOCUMENTS

A computer-implemented method, system and computer program product for identifying suspicious behavior. Requests to provide digital identification (ID) document(s) to a computing device of a verifier by a computing device of a consumer based on a validation context are detected. Responses to such requests are also detected in which the computing device of the consumer provides digital ID document(s) to the computing device of the verifier. A score is then generated corresponding to a likelihood of fraud in the transaction involving the consumer and the verifier using an artificial intelligence model based on the validation context, the digital ID document(s) requested to be provided by the computing device of the consumer and the digital ID document(s) provided to the computing device of the verifier. The computing device of the verifier may then be informed that there is evidence of fraud based on a value of the score.

System to perform identity verification

According to a first aspect, there is provided an identity verifier comprising: at least one processor; at least one memory including computer program code; and a communication port coupled to the processor the at least one memory and the computer program code configured to, with the at least one processor, cause the identity verifier at least to: receive, through the communication port, query information to verify an identity provided by a party requesting a financial service; extract a unique identifier of an electronic device from the query information, the electronic device used to request the financial service; calculate a probability of an accuracy of the identity verification by at least determining whether one or more databases contain a record of the unique identifier, the one or more databases storing data used to perform the identity verification; and respond, through the communication port, to the query with the calculated probability.

User interfaces for stored-value accounts

In some examples, an account is provisioned onto an electronic device. In some examples, the device receives a value to fund the account provisioned on the electronic device. In some examples, the electronic device transacts with a contactless transaction terminal using the provisioned account and displays an indication of the transaction. In some examples, the electronic device transmits information corresponding to the provisioned account without checking for authentication. In some examples, the device receives user input initiating a process for moving the account from a first device to a second device. In some examples, the device receives account payment credentials from a second device when a set of payment criteria are met.

Reducing information requirements in digital electronic transfers

Systems and methods for transferring between accounts in the absence of sensitive information needed to perform a direct transfer between accounts are described herein. In an embodiment, an intermediary system receives a request to perform a digital electronic transfer of an item from a first online account to a second online account through the intermediary system, wherein the intermediary system does not have access to the sensitive information for either the first online account or the second online account. Without requesting the sensitive information for either the first online account or the second online account, the intermediary system responds to the request by: performing a first digital electronic transfer of the item from the first online account to a system account, storing data assigning the item to an intermediary account for which the intermediary system has the sensitive information, and performing a second digital electronic transfer of the item from the system account to the second online account.

Digital, personal and secure electronic access permission
11681792 · 2023-06-20 · ·

The present invention puts forward a personal electronic access permission (Figure B, 31) that can both check on the customer's identity (Figure A, step 2) and right to access an event/venue in one scanning event, and address the unwanted secondary market, still enabling a customer (Figure D, 5) to sell back an electronic access permission to the system (Figure D, I) in case the customer is not able to attend the event.

Electronic signature leveraging for consolidated transactions

An order completion system and method are described. In some implementations, the system may execute the method which includes receiving an order from a user that includes a retail component; determining that a profile identification (ID) of the user is associated with prescription information of the user; forming a consolidated order by adding one or more eligible prescriptions associated with the user to the retail component of the order using the prescription information. The method may further include applying transaction rules to the consolidated order to determine whether the consolidated order is eligible for a single input authorized checkout; and responsive to determining whether the consolidated order is eligible for the single input authorized checkout, presenting to the user via a user interface, a prompt for the user to complete the consolidated order using the single input authorized checkout.

AUTHENTICATION METHOD
20170351866 · 2017-12-07 ·

Described herein is a method comprising obtaining a user identifier code associated with a document and receiving a password from a user. The method further comprising authenticating the user identifier code with the password and applying an image to the document in response to the identifier code and the password being authenticated.

System and method for integrated application and provisioning

The present disclosure involves systems, software, and computer implemented methods for generating new credit accounts for immediate availability for use in current online transaction. One example process includes identifying a request to perform a credit application process associated with a particular user via a client application. A first signal can be transmitted that includes a redirect instruction for the client application to a credit application site to perform a credit application process. A second signal can be transmitted that includes a merchant-specific identifier of the particular user and a request to perform the credit application process. A third signal can be received from the credit application site that includes an approval, a payment credential associated with a newly created credit account, and the merchant-specific identifier of the particular user. The payment credential can be associated with the user profile of the user corresponding to the merchant-specific identifier.

Contactless delivery systems and methods

A contactless delivery system is provided. The contactless delivery system includes a contactless card storing a cryptogram containing a unique identifier associated with a user account. After entry into a communication field, the contactless card is configured to transmit the cryptogram to a server. Upon receipt of the cryptogram, the server is configured to validate and decrypt the cryptogram, and extract the unique identifier. The server can query a database for an identity of the user account using the unique identifier, generate a digital signature based on the identity of the user account, and transmit a verification notification including the identity of the user account and the digital signature.