G06Q20/4014

USER-LINKED PAYMENT METHODS FOR COMPLETION OF AN ONLINE TRANSACTION

A computer-implemented method of providing payment methods for an online transaction includes: receiving an unencrypted shopper identifier credential that is associated with a specific user and is input via a checkout user interface, wherein the checkout user interface is associated with the online transaction and is displayed at a user device; in response to receiving the unencrypted shopper identifier credential, generating an encrypted shopper identifier credential based on the unencrypted shopper identifier credential; sending a query that includes the encrypted shopper identifier credential to an issuing bank, wherein the query requests an indication that the encrypted shopper identifier credential is associated with an account for the issuing bank; receiving a response from the issuing bank that includes the indication; and causing the checkout user interface to be modified with a selection field, wherein the selection field is associated with the issuing bank.

TECHNOLOGIES FOR ENABLING EFFICIENT CHECK IN OPERATIONS FOR HOTELS
20230186177 · 2023-06-15 ·

Technologies for enabling efficient check in operations for hotels include a compute device. The compute device includes circuitry configured to receive a request to check in a guest at a hotel without a human front desk operator present at the hotel. The circuitry is further configured to verify an identity of the guest, obtain payment, from the guest, for reservation of a room of the hotel and provide, to the guest and in response to obtaining payment for reservation of the room, a key to the room of the hotel.

SYSTEM AND METHOD FOR AUTHENTICATION TO A NETWORK BASED ON STORED ID CREDENTIALS

Systems, computer program products, and methods are described herein for authenticating access to a network using electronic identification credentials. The present invention is configured to receive a request from a user to access resources via a first communication channel; determine that an authorization level of the user does not meet one or more requirements associated with accessing the resource via the first communication channel; determine, using the network authorization engine, one or more user identification elements required for the user to access the resource; display a notification to the user, wherein the notification comprises at least a request for the one or more identification elements; receive, from the user input device, the one or more identification credentials corresponding to the one or more identification elements; verify, using the network authorization engine, the one or more identification credentials; and authorize the user to access the resource via the first communication channel.

IDENTIFYING A PUBLIC BENEFIT ASSETS SECURE TOKEN
20230186386 · 2023-06-15 · ·

A method executed by a computing entity includes identifying, using a securely passing process and based on at least one of a public benefit project type and a public benefit project geographic location of selection criteria for a set of public benefit credit assets, a secure first token on an object distributed ledger representing the set of public benefit credit assets. The method further includes establishing, using the securely passing process, control over the secure first token representing the set of public benefit credit assets, where only a device possessing control over the secure first token may modify the secure first token.

THIRD-PARTY RESOURCE AUTHORIZATION

Aspects of the present disclosure involve a system and a method for performing operations comprising: receiving, by a messaging application, a request to access a third-party resource; in response to receiving the request, obtaining a user interface data corresponding to the third-party resource; generating, for display on a client device, a graphical user interface of the third-party resource based on the markup-language document; generating for display a menu with an option to authorize the third-party resource to access user data from the messaging application; and authorizing the third-party resource to access the user data from the messaging application in response to a user interaction with the menu.

USING PROOF OF PURCHASE FOR MULTIFACTOR AUTHENTICATION

Multifactor authentication techniques described herein may allow a user to submit a recent proof of purchase as a part of a multifactor authentication process to access an account associated with a financial institution. As part of the login process, the user may submit a proof of purchase associated with a transaction. The financial institution may determine information associated with the transaction, such as a merchant associated with the proof of purchase, a time of the transaction, the last four numbers of the transaction card used, a dollar amount, or any combination thereof. If the information matches one or more records in the transaction history of the user's account, the financial institution may authenticate the user and provide access to the account. In this way, the financial institution may leverage transaction history known to the financial institution and the user to authenticate the user.

METHOD FOR PROVIDING ELECTRONIC COMMERCE SERVICE USING CONNECTION BETWEEN SERVICE USE INFORMATION OF MULTIPLE PURCHASERS
20170345072 · 2017-11-30 ·

An electronic commerce service configured to achieve safe ordering and payment using the connection between service use information of multiple purchasers. Operations include receiving service use information of one user, searching for whether there is another user whose service use information has a connection with the user whose service use information has been received, or requesting a server to search for whether there is another user whose service use information has a connection with the user whose service use information has been received. In addition, operations include receiving the corresponding search result, and when there is another user whose service use information has a connection with the user, adjusting, by one or more levels, a security procedure for service use of the another user whose service use information has a connection with the user or maintaining the level of the security procedure.

Enhanced Feedback Exposure for Merchants Based on Transaction Metadata

Methods, systems, and apparatuses are described herein for the direct sharing and use of transaction data separately from transaction authorization processes. Transaction metadata associated with a transaction may be received and validated. Authorization information corresponding to the transaction may be received. The degree to which the transaction metadata is tested may be based on a predicted time of receipt of the authorization information. The transaction metadata and authorization information may be correlated. A computing device may determine whether to authorize the financial transaction based on the authorization information and the correlated transaction metadata. All or portions of the transaction metadata may be provided to one or more users after the transaction has been authorized or denied.

SYSTEMS, METHODS, AND DEVICES FOR INTEGRATING A FIRST PARTY SERVICE INTO A SECOND PARTY COMPUTER APPLICATION

Systems, methods, and devices for integrating a first party service into a second party computer application are disclosed. In one embodiment, in a financial institution comprising at least one computer processor, a method for integrating a financial services payment service into a merchant computer application may include (1) receiving customer electronic device information from a customer electronic device using a first communication channel; (2) transmitting a passcode to the customer electronic device using a second communication channel; (3) receiving the passcode from the customer electronic device over the first communication channel; (4) sending a session identifier to electronic device over first communication channel; (5) receiving the session identifier from a merchant host; and (6) sending an authentication value to a merchant host. The merchant host may provide the authentication value to the customer electronic device.

System and method for identity chaining

An identity chaining fraud detection method that allows each current transaction to be linked to other transactions through commonly shared identities. Over a period of time the links create a chain of associated transactions which can be analyzed to determine if identity variances occur, which indicates that fraud is detected. Additionally, if a specific identity is detected as being fraudulent, that identity can be tagged as fraudulent and can be referenced by a plurality of other merchant transaction chains to determine fraud.