Patent classifications
G06Q20/4014
Methods and systems for network-enabled account creation using optical detection
Provided is a network-enabled method for creating an online account using a network of devices. The method comprises: receiving by an authentication system, a request to create an online account with an online server; generating a visual graphical code by the authentication system, which is displayed on a display screen and comprises a validation identity; acquiring image data of the visual graphical code from a user device with aid of optical detection apparatus, by capturing an image of the visual graphical code displayed on the display screen; processing the image data to extract the validation identity; based on the validation identity identifying an online serve provider associated with the online server and user information categories associated with the online account; and based on identification information related to the user identifying the user, and the data to the online server for the online account with the online server.
Methods of verifying the onboard presence of a passenger, and related wireless electronic devices
Methods of verifying an onboard presence of a passenger of a transportation vehicle are provided. A method of verifying an onboard presence of a passenger of a transportation vehicle includes generating, via a wireless electronic device of the passenger while on board the transportation vehicle, different first and second data indicating the onboard presence of the passenger. Moreover, the method includes transmitting the different first and second data indicating the onboard presence of the passenger from the wireless electronic device to a server. Related wireless electronic devices, servers, and computer program products are also provided.
Identity protection
An example operation may include one or more of connecting, by an identity protection node, to a blockchain network comprised of a plurality of user nodes, assigning, by the identity protection node, two sets of credentials to users of the plurality of the user nodes, monitoring, by the identity protection node, transactions initiated by the plurality of the user nodes, in response to a detection of an unauthorized transaction initiated by a user node of the plurality of the user nodes, invoking, by the identity protection node, the second set of the credentials of a user associated with the unauthorized transaction, and executing, by the identity protection node, a smart contract to apply the second set of the credentials against the first set of the credentials.
Cognitive system for managing consent to user data
An example operation may include one or more of receiving a request for access to data of a user, the request comprising an identification of a requestor and an identification of the data, determining, via a cognitive engine, whether or not to provide access to the data of the user based on context associated with the user, in response to determining to provide access to the data of the user, invoking chaincode which retrieves access to the data of the user from a blockchain and provides the requestor with access to the data of the user, and storing a result of the determination by the cognitive engine via the blockchain.
Training a neural network model for recognizing handwritten signatures based on different cursive fonts and transformations
A device receives information indicating first names and last names of individuals and applies different cursive fonts to each of the first names and the last names to generate images of different cursive first names and different cursive last names. The device applies different transformations to the images of the different cursive first names and the different cursive last names to generate a set of first name images and a set of last name images. The device combines each first name image with each last name image to form a set of signature images and trains a neural network model, with the set of signature images, to generate a trained neural network model. The device receives an image of a signature and processes the image of the signature, with the trained neural network model, to recognize a first name and a last name in the signature.
Method and a system for creating a behavioral user profile
a user profile of behavior of a specific user is generated, including obtaining a plurality of dummy user profiles. An initial behavioral dataset relating to the behavior of the specific user during a specific transaction is collected, and compared to each of the plurality of dummy user profiles. When the initial behavioral dataset matches at least one of the plurality of dummy user profiles, the method further includes initiating a new user profile of the specific user to be equivalent to the at least a portion of at least one of the plurality of dummy user profiles, and further training the new user profile based on the initial behavioral dataset, to modify the new user profile to more accurately reflect behavior of the specific user.
Secure container mutual authentication
Systems and methods for mutual authentication of a user and a container administrator computer system. A container administrator computer system receives a request from a mobile computing device for a user to access a secure container. The request includes a user identifier. The administrator system receives a first authentication factor corresponding to the user. The administrator system authenticates the user by verifying that the first authentication factor matches a first reference authentication factor associated with the user identifier. The administrator system sends a second authentication factor associated with the administrator system to a human-machine interface associated with the secure container or the mobile computing device. The administrator system receives a notification of authentication of the administrator system using the authentication factor. The administrator system transmits an unlock signal to unlock the secure container.
SYSTEMS AND METHODS FOR AUTHENTICATING A USER USING PRIVATE NETWORK CREDENTIALS
A cardholder authentication computing device for authenticating user computing devices during online payment transactions are provided. The cardholder authentication computing device leverages pre-authentication of a user by a private network to facilitate authentication of a user in the context of an online payment transaction between the user and a merchant. During the course of an online payment transaction, the cardholder authentication computing device may receive an authentication request messages containing pre-authentication data from a merchant computing device. The cardholder authentication computing device then authenticates the user based, in part, on the pre-authentication data. In certain embodiments, the cardholder authentication computing device may also determine whether one or more partner services apply to transactions between the user and the merchant based on the user's affiliation with the organization.
TERMINAL AND OPERATING METHOD THEREFOR
The present invention relates to a terminal and an operating method therefor. The terminal executes a payment function in a first screen mode in which a screen direction of the terminal is a first direction, and can display a default payment card image corresponding to the executed payment function. The terminal transmits card information corresponding to the displayed default payment card image and can recognize that the first screen mode is changed to a second screen mode in which the screen direction of the terminal is a second direction. The terminal can execute an additional function related to a payment according to the transmitted card information in the second screen mode.
PRIVACY-PRESERVING ASSERTION SYSTEM AND METHOD
Disclosed are methods and systems for enabling a package of assertions to be provided to a relying entity seeking to interact with an account. A server computer may receive, from a relying entity, a request for assertions, wherein the request for assertions includes an identifier of the relying entity and a hash of an identifier of an account. The server computer may determine an assertions model based on the identifier of the relying entity. The server computer may retrieve a package of assertions associated with the account based on the assertions model and the hash of the identifier of the account. The server computer may transmit the package of assertions to the relying entity.