Patent classifications
G06Q20/4014
STANDARDIZED IDENTIFIERS FOR MULTIPLE TRANSACTION AUTHORIZATIONS
Examples described herein include systems, methods, instructions, and other implementations for data security. One example includes receiving a checkout communication associated with a secure transaction, where the checkout communication includes a first child merchant identifier associated with a first child merchant system, a second child merchant identifier associated with a second child merchant system, and a parent merchant identifier associated with a parent merchant system. The parent merchant identifier is associated with multiple different child merchant identifiers. The parent merchant system is then authenticated using the parent merchant identifier. The authentication of the parent merchant system is then used to facilitate payments with the multiple different child merchant systems.
INFORMATION PROCESSING SYSTEM, METHOD, AND MEDIUM
An information processing system includes an identification information receiving unit for receiving user identification information presented by a user, a determining unit for determining whether the user identification information that has been received is first user identification information for performing first processing relating to the user, or second user identification information for performing second processing that is executed following the first processing, and an user identifying unit for, in a case of determining that the user identification information that has been received is the second user identification information, identifying a user that is an object of third processing relating to the user, with the third processing being executed following the second processing, on the basis of the second user identification information.
SYSTEM AND METHOD FOR PROVIDING CONTROLLED ACCESS TO PERSONAL INFORMATION
Systems and methods for managing verification and identity information comprises a private blockchain configured to be accessed by a user associated with a first entity. The private blockchain comprises an immutable ledger. Information associated with the first entity is stored on the private blockchain. A digital passport is generated containing blocks corresponding to the private blockchain that are associated with the first entity. The user causes to be transmitted attestation information verifying that the user is associated with the first entity.
Customer identity verification system
A computerized system conducts customer identification processing for customers who remotely open accounts with personal identification information that cannot be verified through available data sources.
Systems and methods for managing digital identities
Systems and methods for managing digital identities. In some embodiments, a method is provided, comprising acts of: receiving a request to validate at least one statement about a user; identifying, from the request, a reference to a distributed ledger, the reference comprising an identifier for the distributed ledger and an identifier for a transaction recorded on the distributed ledger; identifying, based at least in part on the identifier for the distributed ledger, at least one node of a network of nodes managing the distributed ledger; and communicating with the at least one node to validate the at least one statement about the user.
Authentication and security for mobile-device transactions
A method including collecting transactional information from a mobile application on the mobile device. The mobile device can be used by a user to initiate an activity at a risk moment. The method also can include aggregating a set of risk signals. The method additionally can include obtaining a first set of risk rules for a model specific to the activity requested by the user. Each risk rule of the first set of risk rules can define weights when the risk rule is triggered based on one or more risk signals of the set of risk signals. The method further can include executing a risk engine using the first set of risk rules for the model and using the set of risk signals to generate a risk score. The risk score can be based on the weights of triggered risk rules of the first set of risk rules. The method additionally can include generating a disposition based on a comparison of the risk score to one or more predefined thresholds scores for the model. Other embodiments of related systems and methods are disclosed.
Systems and methods for enrollment and identity management using mobile imaging
Systems and methods for automatic enrollment and identity verification based upon processing a captured image of a document are disclosed herein. Various embodiments enable, for example, a user to enroll in a particular service by taking a photograph of a particular document (e.g., his driver license) with a mobile device. One or more algorithms can then extract relevant data from the captured image. The extracted data (e.g., the person's name, gender, date of birth, height, weight, etc.) can then be used to automatically populate various fields of an enrollment application, thereby reducing the amount of information that the user has to manually input into his mobile device in order to complete the enrollment process. In some embodiments, a set of internal and/or external checks can be run against the data to ensure that the data is valid, has been read correctly, and is consistent with other data.
Providing multiple authentication elements via a pointing device for user authentication
A method for authenticating access to remote devices. The method includes receiving authentication data for authenticating a user for using a pointing device at an input of a Point-of-Sale (PoS) device for initiating of a transaction. The method includes receiving a user input that includes an authenticating input, the user input provided via the pointing device at an input device of the POS device, the authenticating input for authenticating the user for the transaction. The method includes accessing encoded data that is embedded in the user input, and determining a correlation between the authentication data and the encoded data. The method includes determining, based on the correlation and the authenticating input, authentication for initiating the transaction by the user at the POS device.
Obtaining a blockchain-based, real-name, electronic bill
A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system is provided for obtaining a real-name electronic bill. In response to an association operation initiated by a user for a target electronic bill, an association transaction is published that includes an identifier of the target electronic bill, where the association transaction causes a network node on the blockchain to return identity association prompt information when determining that the target electronic bill stored in the blockchain is not associated with user identity information (UII). The UII is collected when receiving the identity association prompt information. The UII is sent to the network node, where the network node verifies whether the UII matches identity information of a payment user in the target electronic bill, and after verification succeeds, publishes an association relationship between the UII and the identifier of the target electronic bill to the blockchain for storage.
Intelligent preprocessing routing to decisioning services
The system and methods described herein allow users to give their applicant information when seeking to purchase a good with financing from multiple potential lenders, and may be pre-screened by one or more rule sets implemented by a marketplace client in an eligibility analysis to ultimately submit applicant information to a subset of the multiple potential lenders which are found to be suitable for lending to an applicant based on the applicant information, wherein lender microservices are then run in a jailed, firewalled, and self-contained, autonomous environment, and the results of said lender microservices are reported to the user and may be used to change the one or more rule sets implemented by the marketplace client for future pre-screening of applicants.