G06Q20/4014

METHOD FOR PERFORMING A TRANSACTION ON THE BLOCK CHAIN AND COMPUTER PROGRAM PRODUCT
20220209956 · 2022-06-30 ·

A computer program product includes a receiving module, a security module and a transmitting module. The receiving module is configured to receive identification data of a user ID from a mobile device at a time with a timestamp parameter t. The security module for storing activity parameter p is configured to identify the identification data. The security module generates a digital signature and a block chain ledger C corresponding to a block chain as a function C=f(ID, t, p). The transmitting module is configured to transmit the digital signature and the block chain ledger C to the mobile device. The mobile device accesses the block chain by using the digital signature and the block chain ledger C to perform a transaction on the block chain.

CARD REGISTRATION SYSTEM, CARD REGISTRATION METHOD, AND INFORMATION STORAGE MEDIUM
20220207518 · 2022-06-30 · ·

Provided is a card registration system including at least one processor configured to: acquire, when a registration request for a card is received from a user terminal, card information that enables identification of the card; acquire registered user information on a user who possesses the card, which has been registered in a server in advance in association with the card information; execute authentication based on the registered user information and input information input from the user terminal; and register the card based on an execution result of the authentication.

Method and System of Authenticating a Payment Transaction Using a User Device
20220207523 · 2022-06-30 ·

A method and system for authenticating a payment transaction. The method includes receiving a request for verifying a phone number associated with a Subscriber Identification Module card from a merchant application installed in the user device. Further, obtaining a first key from at least one of a server associated with a manufacturer of the user device and a network server. Furthermore, generating a first cryptogram based on at least one of the phone number and a unique identification value associated with the user device using the first key, wherein the first cryptogram is provided to the server associated with the manufacturer for verification. Upon verification of the first cryptogram, the method includes receiving a second cryptogram from the server associated with the manufacturer, wherein the merchant application provides the second cryptogram and payment transaction details to an issuer server for authentication of the payment transaction.

CONVERGENT DIGITAL IDENTITY BASED SUPERTOKENIZATION
20220207524 · 2022-06-30 ·

A system for combining tokens is provided. The system includes a computer device including at least one processor in communication with at least one memory device. The at least one processor is programmed to: a) receive identity information for an individual, b) receive device identity information for the computer device, c) combine the identity information and the device identity information to generate a base token, d) receive payment card information for a payment card associated with the individual, and e) combine the base token with the payment card information to generate a supertoken.

SYSTEMS AND METHODS FOR SECURING DATA USING A TOKEN
20220207534 · 2022-06-30 ·

Provided herein is a computing system for electronically transmitting a token linked to personally identifying information (PII) of a user to a merchant. The computing system includes a processor in communication at a memory device, and the processor is programmed to: (i) receive PII, issued payment instrument data, and a user identifier associated with a user, (ii) store the PII, issued payment instrument data, and user identifier in the memory device, (iii) receive an identification request for a user associated with a transaction including payment instrument data, (iv) perform a lookup in the memory device to retrieve the PII of the user and the stored user identifier associated with the received payment instrument data, (v) receive a user input identifier from the user to authenticate the user, (vi) generate a token that links the PII of the user to the transaction, and (vii) transmit the token to the merchant.

SYSTEM AND METHOD OF INCORPORATING CONFIDENTIAL AND UNIQUE INFORMATION INTO PROTECTION MEASURES, WITH REAL TIME EVALUATIONS OF ENVIRONMENTAL CONDITIONS AND EXPOSURE UNIQUE TO EACH USER
20220207535 · 2022-06-30 ·

A task exposure risk assessment system which captures the task, work conditions, and environmental conditions is presented. The system utilizes distributed ledger technology and/or blockchain technology to incorporate confidential information. In this way, unique profiles can be created and shared in real time while maintaining confidentiality of health records and more as relates to providing the implementation of control measures to protect workers from identified occupational health hazards. The system relates generally to a system and method to characterize risk of occupational health hazards and implement control measures to protect workers, with real time evaluations of environmental conditions and exposure concentrations, and platform for use are disclosed herein. Furthermore, the system relates to providing a system and method for characterizing the risk of various occupational health hazards across various industries, implementing and providing control measures that can be adopted to protect workers in such hazards or situations in real time.

System, Method, and Computer Program Product for Generating Synthetic Data

Provided are a system, method, and computer program product for generating synthetic data. The method includes receiving a plurality of data types associated with an environment to be evaluated and receiving a plurality of correlations of one data type to another data type. The method also includes generating a correlation graph of the plurality of data types based on the plurality of correlations and generating a directed acyclic graph of the plurality of data types based on the correlation graph. The method further includes generating a hierarchical graph of the plurality of data types by applying a path traversal technique to the directed acyclic graph and generating a synthetic dataset by repeatedly traversing the hierarchical graph to generate a plurality of records of data.

Systems and methods for authenticating an identity of a user of a transaction card

An input device associated with a user and an issuer computer system associated with an issuer are coupled to an interchange computer system associated with a network interchange. The interchange computer system is configured to authenticate an identity of a user of a transaction card as a legitimate cardholder. More specifically, the interchange computer system is configured to receive a registration request from the user using the input device wherein the registration request includes an account number or a name associated with the transaction card, generate an authentication message in response to the registration request, transmit the authentication message to an issuer of the transaction card wherein the issuer provides the authentication message to the user, and receive the authentication message from the user entering the authentication message into the input device to authenticate the identity of the user as the legitimate cardholder.

System and method for authentication of a registered mobile subscriber
11373163 · 2022-06-28 · ·

Briefly, in accordance with one or more embodiments, for example, a method and/or system is provided to at least authenticate a mobile subscriber that has been registered via a registration process comprising. A current international mobile subscriber identifier (IMSI) associated with a mobile telephone number received electronically via a network is queried. A database entry created via the registration process including an IMSI associated with a received mobile telephone number at the time of mobile subscriber registration is also queried. At least the current IMSI and the IMSI of the database entry are compared. Account status of the mobile subscriber based at least in part on a match between the current IMSI and the IMSI of the database entry is verified. Verifying the account status includes determining creditworthiness with respect to the account of the mobile subscriber.

System and method for verifying identity information using a social networking application

A method of verifying identity information is performed at a computer server using a social networking application. The computer server receives an identity verification request from a first terminal. The first terminal is associated with a first account of the social networking application and the identity verification request includes information of a verification code and a second account of the social networking application. The computer server then forwards information of the verification code to a second terminal associated with the second account of the social networking application. Upon receipt of a response from the second terminal, the computer server establishes a relationship between the first account and the second account after verification of the response from the second terminal using the verification code such that the second terminal can interact with the first terminal through the social networking application.