G06Q20/4014

DISPENSERS AND METHODS OF USE THEREOF
20170242976 · 2017-08-24 ·

The present invention relates to a dispenser comprising: a) a reclosable opening on, or for fitment on and/or around an opening of, a container having a cavity for receiving at least one unit of a product to be dispensed; b) a controller adapted for controlling the opening of the reclosable opening; c) a receiver adapted for receiving a user authentication signal; d) a power source for powering the controller and receiver; and wherein the dispenser only permits the opening of the reclosable opening upon the receiver receiving a user authentication signal. The invention also relates to a dispensing system, method of dispensing and a kit of parts including such a dispenser. The inventions are particularly suited for dispensing pharmaceutical products to only the intended recipient and also to ensure compliance with dosage regimes.

Binding of decentralized identifiers to verified claims

Using an association data structure corresponding to a derived decentralized identifier of a subject entity to share a verified claim about the subject entity to one or more relying entities. A decentralized identifier of a subject entity is derived from a source decentralized identity of the subject entity. Next, an association data structure is created using the derived decentralized identifier. The association data structure is structured to be interpretable by a relying entity as demonstrating that a verified claim is about the derived decentralized identity. The relying entity is then caused to be provided the verified claim about the subject entity. The verified claim includes the association data structure that was created using the derived decentralized identifier.

SYSTEM FOR ROUTING OF PROCESS AUTHORIZATIONS AND SETTLEMENT TO A USER IN A PROCESS DATA NETWORK
20170243217 · 2017-08-24 ·

Embodiments of the present invention are directed to routing process authorizations to determine an appropriate legal entity name when an alternate entity name is provided. The system stores alternate entity names in a private or semi-private block chain distributed network, where a block chain ledger keeps an ongoing record of the alternate entity names and their associated legal entity name. When an authorization request is received that does not include a known legal entity name, the system will match the listed entity name with one of the stored alternate entity names, and thereby determine the legal entity name that should be associated with the authorization request.

SYSTEM TO ENABLE CONTACTLESS ACCESS TO A TRANSACTION TERMINAL USING A PROCESS DATA NETWORK
20170243213 · 2017-08-24 ·

Systems, computer program products, and methods are described herein for a system to enable contactless access to a transaction terminal using a process data network. The present invention is configured to electronically receive from a transfer terminal, an indication that a user is accessing the transaction terminal using a user device; retrieve, from the user device, a unique identifier associated with the user device; compare the unique identifier with a block chain of authentication information associated with the user to determine whether the unique identifier meets a condition associated with the block chain authentication information; receive an indication that the unique identifier meets the condition of the block chain thereby validating user identity; and allow the user to access the transaction terminal based on at least receiving the indication that the unique identifier meets the condition of the block chain.

SYSTEM FOR USE OF SECURE DATA FROM A PROCESS DATA NETWORK AS SECURED ACCESS BY USERS
20170243222 · 2017-08-24 ·

Systems, computer program products, and methods are described herein for a system for use of secure data in a process data network. The present invention is configured to determine that an entity is associated with a triggering event associated with management of resources; aggregate information associated with past actions associated with the management of resources executed by the entity; create a block chain of information based on at least the aggregated information associated with past actions; initiate a request to receive information associated with transfer of resources executed by the entity; receive information associated with the transfer of resources based on at least the initiated request, wherein the transfer of resources is associated with a resource type; and update the block chain of transaction information with the transfer of resources executed by the entity.

Systems and methods to identify merchants

A system and method including a mobile application installed on a mobile device and configured to authenticate a merchant represented by a unique identifier, determine a position of the mobile device while the mobile device is co-located with a transaction terminal of the merchant, communicate the position to a portal to associate the position with the unique identifier and to receive an account number, and provide the account number to generate an authorization request on the transaction terminal. The authorization request includes a terminal identifier of the transaction terminal. When the authorization request generated using the account number is detected, the association between the account number provided to the mobile application and the location received from the mobile application is replaced with the association between the terminal identifier extracted from the authorization request and the location. Thus, subsequent authorization requests generated by the transaction terminal can be determined to contain the terminal identifier and identified to be associated with the location and the merchant identifier.

Authentication policy orchestration for a user device
09742809 · 2017-08-22 · ·

A system and method for authentication policy orchestration may include a user device, a client device, and a server. The server may include a network interface configured to be communicatively coupled to a network. The server may further include a processor configured to obtain, from a client device via the network, a transaction request for a transaction, determine an authorization requirement for the transaction request based, at least in part, on a plurality of authorization policies, individual ones of the plurality of authorization policies being separately configurable by at least one of a relying party and an authorizing party, and complete the transaction based on the authorization requirement having been met.

Method for facilitating transactions between two or more parties

The present invention provides a method for facilitating a transaction between two or more parties. A server computer is used to determine whether a contact information and an identity validation information of a second party are accurate. Whenever the contact information and the identity validation information of the second party are accurate, one or more documents are modified by attaching and identity validation from a first party and the identity validation from the second party to the one or more documents.

Systems and methods for remote deposit of checks

Remote deposit of checks can be facilitated by a financial institution. A customer's general purpose computer and image capture device may be leveraged to capture an image of a check and deliver the image to financial institution electronics. Additional data for the transaction may be collected as necessary. The transaction can be automatically accomplished utilizing the images and data thus acquired.

Two-Level Authentication for Secure Transactions
20220036368 · 2022-02-03 ·

A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A Personal Digital Key stores one or more profiles (e.g., a biometric profile) in a tamper-proof memory that is acquired in a secure trusted process. Biometric profiles comprise a representation of physical or behavioral characteristics that are uniquely associated with an individual that owns and carries the PDK. The PDK wirelessly transmits the biometric profile over a secure wireless transaction to a Reader for use in a biometric authentication process. The Reader compares the received biometric profile to a biometric input acquired at the point of transaction in order to determine if the transaction should be authorized.