Patent classifications
G06Q20/4014
TAX-FREE PROCESSING SYSTEM AND RELATED INFORMATION PROCESSING APPARATUS AND PROGRAM
An information processing apparatus according to an embodiment receives electronic receipt information corresponding to each purchase made by a customer in one or more stores in a group during a predetermined period. The electronic receipt information includes a tax-free classification code for each sales object included in the electronic receipt information. The apparatus receives passport information of the customer. The apparatus determines, based on the tax-free classification code and the passport information, tax-exempt objects purchased in the stores in the group during the predetermined period. The apparatus determines, based on the determined tax-exempt objects, an amount of a tax refund, and provides the determined tax refund to the customer. The apparatus transmits tax refund information indicating the tax refund paid relative to the objects determined to be tax exempt.
Systems and Methods for Device Authentication
Systems and methods for device authentication are disclosed. In one embodiment, a method may include (1) an acquirer portion receiving a device credential and a payment credential that were received from the payment application in conjunction with a transaction, the acquirer portion further receiving transaction data for the transaction from the merchant; (2) the acquirer portion performing a first validation assessment on the transaction based on the transaction data and first data retrieved from a first data source; (3) the payment network portion performing a second validation assessment on the transaction based on the transaction data and second data retrieved from a second data source; and (4) the issuer portion identifying and authenticating the customer based on the device credential, the payment credential, and at least one of the first validation assessment and the second validation assessment.
Secure Authentication and Financial Attributes Services
Devices, interfaces, methods, and systems for secure authentication of identification data and financial attributes services. An example method for transmitting data using at least one server includes receiving a data sequence that includes a resource locator, wherein the locator comprises at least one reference code, wherein the code is identifiable to one or more persons, and wherein the sequence comprises a data record. The method may also include determining an address from the reference code and transmitting a modified sequence of data that comprises the address to another server.
Secure mobile user interface
The invention provides systems and method for securely inputting user data from a user into a mobile device and also for generating user data to be input by a user into a mobile device. For example, there is provided a mobile device case for securely inputting user data from a user into a mobile device, the case comprising: a microcontroller, a communication module for communicating with the mobile device and a user interface to enable the user to input the user data. The microcontroller is preferably configured to receive the user data which is input by a user via the user interface, process said user data to create processed data and communicate said processed data to said mobile device. Alternatively, the microcontroller is configured to receive a request to generate the user data; generate said user data and display said user data on the user interface.
METHOD AND SYSTEM FOR SECURE IDENTITY TRANSMISSION WITH INTEGRATED SERVICE NETWORK AND APPLICATION ECOSYSTEM
Method of generating a secure user identity data set, using timestamps and algorithms which can be encrypted, whose structure is generated in an initial communication between the communication device of the user and a remote identity server. The identity can be transmitted indefinitely to a client device from a user device while offline. The user's secure identity exists within a universally accessible network (cross-platform, cross-chain, cross-system, cross-application, cross-device, cross-industry) which provides the user with access to services and resources from providers who have integrated with the network. The network provides an application Ecosystem permitting a family of software applications that perform tasks and offer resources (smart contracts) such as payment processing terminals, point of sale use and exchange of virtual currency, ticket scanning and authentication, and requesting and receiving bids from service providers. The network also enables applications from one platform to execute smart contracts with applications residing on other platforms.
SINGLE-USE AUTHORIZATION CODES IN SELF-CONTAINED FORMAT
The present disclosure relates to computer-implemented methods, software, and systems for generating access tokens at an authentication server based on authorization codes. A first authorization server from a set of authorization servers receives a request for authorization of a request to access a resource by a resource owner. The first authorization server validates the request for authorization of the request to generate an authorization code. In response to successful validation of the request for authorization to generate the authorizaction code, the first authorization server generates a single-use authorization code by signing the generated authorization code with a unique private key. A unique public key is maintained for verifying the signed authorization code. The single-use authorization code is generated in a self-contained format. The single-use authorization code is provided to the client application for generation of an access token by one of the authorization servers from the set of authorization servers.
CONTACTLESS DELIVERY SYSTEMS AND METHODS
A contactless delivery system is provided. The contactless delivery system includes a contactless card storing a cryptogram containing a unique identifier associated with a user account. After entry into a communication field, the contactless card is configured to transmit the cryptogram to a server. Upon receipt of the cryptogram, the server is configured to validate and decrypt the cryptogram, and extract the unique identifier. The server can query a database for an identity of the user account using the unique identifier, generate a digital signature based on the identity of the user account, and transmit a verification notification including the identity of the user account and the digital signature.
CONTACTLESS VEHICLE ORDERING AND AUTOMATION SYSTEM
A computing system, includes: a non-transitory memory; processors coupled to the non-transitory memory and configured to execute instructions to perform operations including: detecting a vehicle at a first location, executing instructions local to the first location by one or more edge processors to determine vehicle specific parameters that identify the vehicle; determining the vehicle is associated with a user account stored in a computerized vehicle management system; in response to the determining that the vehicle is associated with the user account, and transmitting instruction to a first display at the first location to present a user-tailored menu generated by using the edge processors to access a machine learning computer model based on data obtaining from the user account.
Augmented reality numberless transaction card
A method implemented on an augmented reality (AR) electronic device includes receiving a request to activate a transaction card account on a transaction card. The transaction card account is activated on the transaction card. A virtual representation of account information corresponding to the transaction card account is displayed on the AR electronic device. The exterior of the transaction card is free of account identifying information.
SYSTEMS AND METHODS FOR MANAGING DIGITAL IDENTITIES ASSOCIATED WITH MOBILE DEVICES
Systems and methods are provided for enabling, providing, and managing digital identities in association with mobile devices. One example method includes determining, by a mobile device, that identity data of a user is changed, and prompting the user to identify a third party separate from the mobile device to authenticate the user. The method also includes requesting the third party to authenticate the user, and causing an authentication interface of the third party to be displayed at the mobile device where the authentication interface solicits login credentials for an account of the user at the third party. The method then includes granting, by the mobile device, access to one or more aspects of a mobile application installed at the mobile device, in response to an indication of a successful authentication of the user from the third party.