G06Q20/4014

SYSTEM FOR A GEOGRAPHIC LOCATION BASED SHARING REQUEST NETWORK
20170323398 · 2017-11-09 ·

Embodiments of the invention are directed to a system, method, or computer program product for building a geographic location based sharing request network. The invention generates and builds a sharing request network based on user geographic locations for efficiently and conveniently matching and connecting users to one another and third party systems. In this way, the sharing request network system may identify social events, volunteering opportunities, medical aid sharing, and transportation sharing for aging individuals. Furthermore, the system generates a knowledge sharing advice database, since aging individuals typically have professional or personal experiences. The user may be able to respond with answers or advice to questions posted by other users via the system. Additionally, the system may generate rewards based on the knowledge or advice provided in response to posted questions.

SYSTEM-BASED DETECTION OF CARD SHARING AND FRAUD

This disclosure describes, in part, a payment service that associates customer profiles with an identifier of a payment instrument, and then uses the customer profiles to identify a customer that is using the payment instrument during a transaction with a merchant. For instance, in some examples, the payment service can identify preferences of customers using transaction information that includes an identifier for a payment instrument, and associate the preferences with respective customer profiles. The payment service can then receive transaction information associated with a transaction between a customer and a merchant, identify preferences of the customer using the transaction information, compare the preferences of the customer with preferences stored in the customer profiles, and identify the customer based on the comparing. The payment service can further generate a receipt for the transaction and send the receipt to contact information of the customer.

MECHANISM FOR SECURING LEGAL INTERACTIONS
20170323305 · 2017-11-09 ·

Provided are mechanisms and processes relating to securing legal interactions between a client and a legal professional. In one example, a process includes receiving a legal transaction request from a client, where the legal transaction request includes legal transaction parameters such as location and practice area. Legal professional profiles associated with legal professionals are then obtained, where the legal professional profiles include legal professional parameters such as level of experience and practice area. At least one legal professional is selected based on a comparison of the legal professional profiles and the legal transaction request. A legal services agreement is then generated by analyzing legal services agreements for prior legal transactions and determining vector space distances between these legal services agreements and the legal transaction parameters. The legal services agreement is transmitted to the client to secure a legal services arrangement between the client and a selected legal professional.

Modifying Signal Associations in Complex Computing Networks
20170324786 · 2017-11-09 ·

This disclosure is directed to an apparatus for modifying a temporal signal association in a complex computing network such that a future computing operation is intelligently executed based on the modified signal association.

Blockchain-based transaction processing methods and apparatuses and electronic devices

Embodiments of the present specification provide example blockchain-based data processing methods, mediums, and systems. One example method includes obtaining an available Nonce record for a target transaction from a Nonce list. The Nonce list comprises Nonce records, and each Nonce record comprises a version identifier of the Nonce list and a Nonce value. The available Nonce record to the target transaction is added. The target transaction in a blockchain is published. Prompt information indicating that the target transaction is an invalid transaction is received when a version identifier in the available Nonce record does not match the version identifier of the Nonce list; or a notification message indicating that the target transaction is processed is received when the version identifier in the available Nonce record matches the version identifier of the Nonce list and a replay attack detection is successfully performed by matching the available Nonce record with a Nonce record in the Nonce list.

Mobile account authentication service

A payment authentication service authenticates the identity of a payer during online transactions. The authentication service allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as with the use of tokens. Authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requesting a password from the cardholder, verifying the password, and notifying a merchant whether the cardholder's authenticity has been verified. Systems for implementing the authentication service in which a cardholder uses a mobile device capable of transmitting messages via the Internet are described. Systems for implementing the authentication service in which a cardholder uses a mobile device capable of transmitting messages through voice and messaging channels is also described.

System, method, and computer program for dynamically identifying a merchant associated with an authorization request for a payment card

The disclosure is directed to a system, method, and computer program for dynamically identify a merchant associated with an authorization request for a payment card, wherein a merchant identifier in the authorization request is unrecognized. A plurality of unique signatures is created for each of a plurality of registered merchants, wherein the signatures for each registered merchant are based on values of merchant attributes associated with the registered merchant. In response to the system receiving an authorization request for a payment card that includes an unrecognized merchant identifier used to process authorization requests, a plurality of unique signatures is generated for the unrecognized merchant based on a combination of merchant attributes in the authorization request. A payment processing system then determines if the signatures match one of the signatures previously created for the registered merchants. If so, the authorization request is identified as originating from the matching registered merchant.

System for capture of paper check and process of check payment to third party

The disclosure describes an apparatus having programmed instructions that when executed cause the apparatus to receive, via a communication network, a paper check image and payer information captured by an application at a device associated with a checking account holder; build an image file using the received paper check image and payer information; send the built image file to a payee financial institution server using the received payer information; and transmit payment confirmation to the device associated with the checking account holder.

CARDLESS FINANCIAL TRANSACTIONS
20170262823 · 2017-09-14 ·

An automatic-transaction-machine (ATM) has a housing covering at least a portion of the ATM, a transmitter, and a receiver. The processor controls at least portions of some financial transactions conducted by the ATM. A banking computer system associated with the ATM is receives a pre-created transaction request from a customer using a mobile device. The ATM will not process the pre-created transaction request until the customer is verified to be present at the ATM. When the customer later brings the mobile device within range of the transmitter of the ATM, the ATM presents transaction-verification data to be received by the mobile device. The receiver of the ATM is configured to receive mobile-verification data back from the mobile device that is responsive to the transaction-verification data. When the mobile-verification data is authenticated by the banking computer system the ATM is configured to execute the pre-created transaction request.

Identity verification (IDV) using a payment processing platform

Identity verification (IDV) using a payment processing platform is described herein. In an example, a computing device can receive identifying information of a user. The computing device can request payment information of a payment instrument of the user and can receive the payment information of the payment instrument of the user. The computing device can prompt the user to present the payment instrument at a point-of-sale (POS) of a trusted merchant and can verify the identity of the user based at least in part on verification information received from a merchant device operable by the trusted merchant at the POS.