G06Q20/4014

Using an Always on Listening Device Skill to Relay Answers to Transaction-Based Knowledge-Based Authentications

Aspects discussed herein may relate to techniques for authenticating a user using transaction-based authentication questions. The transaction-based authentication questions may be provided to the user. The user may provide audible responses to the transaction-based authentication questions that may be captured by a smart device, such as an always on listening device. Authentication of the user may be based on voice analysis of the audible responses to the transaction-based authentication questions and/or based on the answers to the transaction-based authentication questions.

CORRELATING ASSET IDENTIFIERS
20220366199 · 2022-11-17 ·

Systems, methods, and computer-readable media provide automated identification techniques that associate at least two unique identifiers of one segment of a segmental multimode wireless flexible product to seamlessly and accurately bridge different identification methodologies to enable advanced real-time tracking of shipment location and status, and other such useful and advanced product and service offerings.

METHOD AND SYSTEM FOR MANAGING THE DISTRIBUTION OF AID OR BENEFITS INVOLVING MULTIPLE PARTNERS SHARING AN INFRASTRUCTURE

A method for managing programs associated with multiple entities on a payment card includes: storing lease profiles, each lease profile including a lease identifier, managing identifier, transaction account numbers, and one or more tenant identifiers; receiving a management request, the management request including a specific lease identifier, specific managing identifier, and requesting tenant identifier; identifying a specific lease profile that includes the specific lease identifier; verifying that the specific managing identifier corresponds to the managing identifier included in the specific lease profile; inserting the requesting tenant identifier into the specific lease profile; receiving a program request, the request including the specific lease identifier, the requesting tenant identifier, and program data; and transmitting the program data to a payment card corresponding to one of the transaction account numbers included in the specific lease profile.

REPLACING A CUSTOMER CARD PAYMENT WITH A ONE-TIME LOAN AT A POINT OF SALE
20220366398 · 2022-11-17 · ·

A system and method for replacing a customer's debit card payment with a one-time loan at a point of sale (POS) is disclosed. The method receives, at a POS, a debit card input from a customer to be used as a transaction payment. The POS obtains, from the debit card input, identification information for the customer. A total monetary amount of the transaction payment and the identification information is provided to a one-time loan provider's computer system. The one-time loan provider's system uses the customer identification information to perform a credit screening for the total monetary amount of the transaction payment. The one-time loan provider's system provides to the POS a one-time loan offer for the customer. The one-time loan offer to be used in place of the debit card input to make the transaction payment.

SYSTEMS AND METHODS FOR DIGITAL IDENTITY SCORE

Methods, computer-readable media, software, and apparatuses may calculate a digital identity score from verifiable credentials from a consumer's digital wallet. The systems and methods may score the consumer's identity based on the type and issuer of the digital credentials or verifiable credentials the consumers holds in the consumer's digital wallet. The systems and methods may issue consumers a digital identity score verifiable credential. The consumers may prove their digital identity score to various digital partners to gain preferential treatment, save time, and save money.

Detecting Cloned Payment Cards
20230177511 · 2023-06-08 ·

Aspects of the disclosure relate to a payment device to detect real-time suspicious payment cards. Prior to a transaction, a payment device detects suspicious payment cards based on captured images of the payment card. An alert may be generated upon detection of any suspicious or fraudulent payment card. In some arrangements, the payment device may utilize machine learning models or machine learning capabilities to detect suspicious payment cards. A characterization score may be generated and used to determine if a payment card is suspicious. The characterization scores may be updated based on different card issuer criteria and transaction use of each payment card.

Dynamic User Interface and Data Communications Via Extended Reality Environment
20230177831 · 2023-06-08 ·

Methods and systems for entering content into fields via an extended reality (XR) environment are described herein. An XR device may provide an XR environment. The XR device may detect, in a physical environment around the XR device, a user interface element, displayed by a display device, that permits entry of content by a user of a first computing device. The XR device may determine a type of content to be entered via the user interface element. The XR device may receive an image of a physical object corresponding to the type of content to be entered via the user interface element. The XR device may then process the image of the physical object to determine first content to provide to the user interface element and transmit, to the first computing device, the first content for entry into the user interface element.

System and method for managing E-commerce transactions

A system that incorporates teachings of the present disclosure may include, for example, an avatar engine having a controller to retrieve a user profile of a user, present the user an avatar having characteristics that correlate to the user profile, detect one or more responses of the user during a communication exchange between the avatar and the user, identify from the one or more responses a need to engage in an e-commerce transaction, engage in a commercial exchange with a merchant system according to the e-commerce transaction, identify a commercial status of the e-commerce transaction from the commercial exchange with the merchant system, and present the user by way of the avatar the commercial status of the e-commerce transaction. Other embodiments are disclosed.

Single sign-on through customer authentication systems

Described herein is a system, method, and non-transitory computer readable medium related to a service provider using a third party identity provider to authenticate a user with improved security. An authentication token is received from the identity provider, and can be verified against internal configuration information. The internal configuration information includes data that is not included in the authentication token, and therefore, is not vulnerable to some security attacks, such as a man-in-the-middle attack. After the authentication token is verified, the internal configuration information and authentication token may be used to create a custom identifier, referred to as an identity ID. The identity ID may be used by the service provider to verify user access to resources.

Peer-to-peer VoIP
11671534 · 2023-06-06 · ·

A Voice over Internet Protocol (VoIP) system is configured for direct communications between remote computing devices in a peer-to-peer configuration. Voice data from the communication is marked such that the voice data from the different endpoints can be combined into a unified audio stream. An authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier.