G06Q20/4014

Apparatus and method for processing virtual credit cards for digital identities

A non-transitory computer readable storage medium has instructions executed by a processor to maintain digital identities. Each digital identity has identity attributes different than identity attributes associated with a real individual utilizing the digital identity. Each digital identity has an associated attribute for compartmentalized network activity. Interactions between the digital identities and a virtual card provider are supported to secure virtual cards for the digital identities. Interactions between the digital identities and a persona management application are brokered, including delivering the virtual cards for the digital identities to the persona management application.

Voice Payment Method and Electronic Device
20230021413 · 2023-01-26 ·

A voice payment method and an electronic device are provided. The method includes: A first electronic device receives voice information of a user, where the voice information is used to indicate a payment operation performed by the user; when a voiceprint feature of the voice information meets a preset condition, the first electronic device requests a second electronic device to authenticate the user; the second electronic device prompts the user to perform an authentication process, where the authentication process includes one or more of fingerprint authentication, facial recognition, password authentication, verification code authentication, and near field communication NFC authentication; when authentication performed by the second electronic device on the user succeeds, the second electronic device indicates to the first electronic device that authentication performed by the second electronic device on the user succeeds; and the first electronic device completes the payment operation with a payment platform.

System and Method for Facilitating and Processing Transactions
20230237484 · 2023-07-27 ·

Disclosed herein is a system and method for recognizing and identifying person(s), user(s), device(s), object(s) and/or event(s). The system senses, predicts and verifies, with highest accuracy, person(s), user(s), device(s), object(s) and/or event(s) within proximal distance of another object or within a certain boundary. This sensing, prediction, and verification, enables integrated and adjacent system(s) to be actuated through a known or shared protocol. The system employs specific technological devices and methods to securely authenticate person(s), user(s), device(s), object(s), characteristic(s) and/or event(s). This novel system, among its many applications where humans, devices, and/or machines interact, enables secure authentication of person(s), user(s), device(s), object(s) and/or event(s) within a proximal distance or geographical range of another object to perform the like of automated interaction(s), automated transaction(s), and/or to perform action(s). In the wild, a single mode of verification is not enough when performing authentication or being attributed to a transaction or exchange of value.

DIGITAL NON-FUNGIBLE ASSETS IN PERSISTENT VIRTUAL ENVIRONMENTS LINKED TO REAL ASSETS

The technology relates to linking virtual assets and physical assets through non-fungible tokens (NFTs) in a metaverse. As such, the invention anchors a metaverse to the real world. The metaverse can limit ownership or rendering of certain virtual assets in the metaverse to only those who actually own physical assets. For example, the metaverse can limit a virtual representation of a car in the metaverse to those who own the real car. The linkage between the virtual and real assets can be verified in the metaverse based on NFTs stored on a blockchain. As such, only those who actually own a physical asset in the real world are associated with the virtual asset (or related representation) in the metaverse.

TRANSACTION SECURITY TECHNIQUES

Aspects of the present disclosure relate to transaction security techniques. In examples, a resource platform causes a set of executable verification instructions associated with an authorization processor to be executed by a user computing device. The verification instructions may be encrypted by the authorization processor for decryption by the user computing device. The verification instructions may generate verification information associated with the user computing device. In some instances, the verification information may be encrypted for decryption by the authorization processor. The encrypted verification instructions may be provided to the authorization processor (e.g., via the resource platform), such that the authorization processor may provide an indication to the resource platform as to whether the verification is verified. Accordingly, if the verification information is verified a transaction associated with the resource platform may proceed or, as another example, the user computing device may be granted access to information.

Biometric authentication during voice data transfers
11711361 · 2023-07-25 · ·

There are provided systems and methods for biometric authentication during voice data transfers. A user may initiate voice communications with a service provider endpoint that provides automated services to the user through the voice or audio communications, such as an interactive voice response (IVR) system where a user may navigate menus through audio commands. The user may by required to authenticate their identity during the phone call or other voice data transfer, which may be done by entering a biometric, such as a fingerprint. The biometric may be converted to biometric feature data and provided to one or more token service providers. The token service providers may provide one or more tokens for the biometric, which may be used as the authentication token. This token may then be transmitted to the IVR system through the user's endpoint using a dialer feature of the endpoint.

UPDATING A SECURE TOKEN OF A CONTINGENT ASSET
20230026112 · 2023-01-26 · ·

A method executed by a computing entity includes obtaining, in accordance with a securely passing process, control over a secure first token representing a first pending transaction associated with a transaction item. The method further includes obtaining a selection of a first subset of instant assets of a set of candidate instant assets that may be utilized to subsequently provide conversion of the selected contingent asset to complete the first pending transaction. The method further includes generating an updated secure first token in accordance with the securely passing process to represent the selection of the first subset of instant assets of the set of candidate instant assets to subsequently provide the conversion of the selected contingent asset to complete the first pending transaction.

ENABLING USER TO USER INTERACTIONS IN MULTI-USER VIDEO CONFERENCE APPLICATIONS
20230025638 · 2023-01-26 ·

There are provided systems and methods for enabling user to user interactions in multi-user video conference applications. A user may utilize a computing device to interact with online service providers in order to initiate and/or join a video conference with one or more other users. During the video conference, the user may be provided with options to interact with other users, such as by engaging in electronic transaction processing. When performing such interactions, data for the video conference may be extracted and provided to a transaction processor server. The server may then utilize the data to determine accounts of users within the video conference that may be utilized for electronic transaction processing services. If no account exists, the server may initiate a process to onboard such users. When an account exists, the server may further populate graphical icons that may be used for electronic transaction processing services.

SYSTEMS AND METHODS FOR FACILITATING CARD VERIFICATION OVER A NETWORK

A system and method for facilitating electronic commerce over a network, according to one or more embodiments, includes communicating with a user via a user device and an issuer of payment media via an issuer device over the network, the payment media being issued to the user by the issuer, receiving user instruction over the network to link the payment media to a user account related to the user, prompting the user over the network to input a secure password known only by the issuer and the user, receiving the secure password from the user over the network, verifying that the payment media is owned by the user over the network via a secure protocol, returning a response to the user related to verification of the payment media, and storing payment media verification information.

SETTLEMENT SYSTEM, RECOGNITION DEVICE, AND METHOD THEREOF
20230024823 · 2023-01-26 ·

According to one embodiment, a settlement system includes an imaging portion, a specifying portion, an acquisition portion, and a recording portion. The specifying portion specifies the commodity from an image captured by the imaging portion. The acquisition portion acquires an image of a medium used for online settlement from the image captured by the imaging portion. The recording portion records the image of the medium acquired by the acquisition portion and the information related to the transaction of the commodity specified by the specifying portion on a recording medium.