G06Q20/4014

PLAN INTERACTION UTILIZING CRYPTOGRAM

A method includes a network processing computer receiving an authorization request message comprising a token and a cryptogram during an interaction between a resource provider and a user. The network processing computer determines user credentials associated with the token. The network processing computer then determines a plan identifier based on the authorization request message. The network processing computer provides the plan identified to an authorizing entity computer.

SYSTEMS, MEDIA, AND METHODS APPLYING MACHINE LEARNING TO TELEMATICS DATA TO GENERATE VEHICLE FINGERPRINT
20230237335 · 2023-07-27 ·

Described herein are systems and methods for applying machine learning to telematics data to generate a unique vehicle fingerprint by periodically receiving telematics data generated at a plurality of sensors of a vehicle; standardizing the telematics data; aggregating the standardized telematics data; applying a trained machine learning model to embed the aggregated telematics data into a low-dimensional state; and generating a unique vehicle fingerprint, the vehicle fingerprint comprising a static component, a dynamic component, or both a static component and a dynamic component; including iterative repetition to update the dynamic component of the vehicle fingerprint.

System, method, and non-transitory computer-readable storage media related to transactions using a mobile device

Techniques for related to retail transaction are disclosed. The techniques involve various uses of a mobile device, such as a cell phone, in authorizing payment for a retail transaction and/or receiving and/or transmitting data to/from the mobile device.

Method for using and revoking authentication information and blockchain-based server using the same
11568396 · 2023-01-31 · ·

A method for using authentication information is provided. The method includes steps of: (a) a managing server, if a request for using the authentication information is acquired, acquiring a transaction ID corresponding to a specific user's identification information; (b) the managing server acquiring an output of a specific transaction corresponding to the transaction ID from a blockchain; (c) the managing server determining revocation of the authentication information by referring to the output of the specific transaction; and (d) the managing server supporting a communication by providing the specific user's public key in the output of the specific transaction, if the authentication information is not revoked, and if (i) a hash value of the specific user's identification information included in the output of the specific transaction or its processed value corresponds to (ii) a hash value of the specific user's identification information pre-stored in a certain database or its processed value.

Payment transaction methods and systems enabling verification of payment amount by payment card

Embodiments provide a method of facilitating a payment transaction with a payment card of a customer. The method includes receiving a payment transaction request initiated at a merchant terminal. The payment transaction request comprising at least a merchant transaction amount associated with a purchase entered at a merchant terminal, a PIN of the payment card provided by the customer via a keypad and a customer transaction amount provided by the customer via the keypad. The method includes facilitating verification of facilitating verification of the PIN with a stored PIN. The method further includes, upon successful verification, determining whether the merchant transaction amount conforms to the customer transaction amount. The method further includes facilitating a payment transaction associated with the payment transaction request if the merchant transaction amount conforms to the customer transaction amount.

SYSTEMS AND METHODS FOR A SEARCH ENGINE OF BUYERS IN A BLOCKCHAIN
20230237549 · 2023-07-27 ·

An example apparatus includes an account information circuit structured to interpret identifying information for a seller blockchain account and for each one of at least one buyer blockchain account, the identifying information for each one of the at least one buyer blockchain account including an attribute interest value. An apparatus further includes an asset attribute circuit structured to interpret an asset attribute value for an asset associated with the seller blockchain account. An apparatus further includes a buyer interest circuit structured to determine a buyer interest value for each one of the at least one buyer blockchain account in response to each corresponding attribute interest value and the asset attribute value. An apparatus includes a buyer identification execution circuit structured to perform a buyer identification operation in response to the buyer interest value.

Cryptocurrency transaction pattern based threat intelligence

A method for identification of malicious internet content and campaigns is provided. The method extracts a cryptocurrency indicator within a compromised data set and inserts the cryptocurrency indicator into a threat intelligence database. The method identifies a set of cryptocurrency transactions associated with the cryptocurrency indicator. From the cryptocurrency indicator and the set of cryptocurrency transactions, the method generates a transaction graph with a set of features representing the set of cryptocurrency transactions. The method modifies the threat intelligence database with at least a portion of the transaction graph.

Native-feature silent coercion alarm

Apparatus and methods for providing protection from economic exploitation. The apparatus and methods may include a platform for tagging a social security number and/or other suitable identification number. The system may allow a person associated with a social security number to automatically flag and deny any product or service request associated with the social security number. The alarms are “silent,” because the alarm may initiate an institution internal process in which the customer interaction with the institution follows a normal diligence process until an intervention can be effectively executed on behalf of the customer. This reduces the likelihood of a reaction from the customer's associate prior to completing the diligence process. A system may provide the customer with an opportunity to electronically activate an alarm by typing keystrokes on a card reader keypad or interacting with a physical sensor on the reader, on the card, or the like.

Payment systems and methods for in-store and online purchases
11568409 · 2023-01-31 ·

Systems and methods for implementing payments or mobile payments. In an aspect of in-store purchase, a merchant sends a payment amount and merchant account info to transaction center. A buyer sends a code and buyer account info to transaction center. The code represents the merchant. In an aspect of online purchase, an e-commerce merchant provides options for a buyer to use names other than a first name plus a surname. In one embodiment, a buyer submits a shortened name or nickname for online purchases when a given payment service is used as a payment method.

Data interaction method, verification terminal, server, and system

A data interaction method, a verification terminal, a server, and a system are described. The method includes: receiving, by a verification terminal, identity verification information from a user terminal, the identity verification information being information sent to the user terminal by a server in advance; sending, by the verification terminal, a request instruction to the server, the request instruction including the identity verification information; executing, by the server, an operation corresponding to the request instruction; and sending, by the server, feedback information to the verification terminal.