G06Q20/4015

REAL-TIME AUTHORIZATION OF INITIATED DATA EXCHANGES BASED ON DYNAMICALLY GENERATED TOKENIZED DATA

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data in real-time based on dynamically generated tokenized data. For example, an apparatus may receive first positional data identifying a first geographic position of a client device and based on the first positional data, the apparatus may determine a value of a parameter characterizing an exchange of data between the client device and a terminal device disposed proximate to the client device during a temporal interval. The apparatus may transmit data requesting a pre-authorization of the data exchange to a computing system, which perform operations that pre-authorize the data exchange in accordance with the parameter value and transmit a digital token representative of the pre-authorized data exchange to the terminal device. The digital token may be valid during the temporal interval and may include a cryptogram associated with the client device.

ADDING SECURITY TO A TRANSACTION BY VERIFYING LOCATIONS

A method includes receiving a transaction authorization request for a transaction between a user and a transaction system. The method also determines the location of the transaction system based and receiving the location of an account holder device associated with the account. The method also determines whether an increased authorization level is required for the transaction based on the location of the transaction system and the location of the account holder device. If the increased authorization level is required for the transaction, the method includes transmitting an increased authorization inquiry to the transaction system and receiving a response to the increased authorization inquiry. The increased authorization inquiry may be associated with a predetermined response. The method determines whether to authorize the transaction based on the response by the user and the predetermined response to the increased authorization inquiry.

Systems and methods for securing access to resources

In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.

Vending machine authorization and customization based on confidences of user identities

Systems and techniques are disclosed for vending machine authorization and customization based on confidences of user identities. One of the methods includes receiving identifying information for a user device, the identifying information being received in response to the user device being within a distance of a vending machine. The vending machine can include sensors that trigger the user device to provide identifying information. A portion of profile information is accessed, portion of profile information indicating a unique identifier assigned to the user device. The portion of profile information is provided to one or more servers that communicate with the vending machine over one or more networks. Preference in formation is displayed via a display of the vending machine, the preference information being maintained by servers and being associated with the unique identifier.

Vehicle based electronic authentication and device management
10430566 · 2019-10-01 · ·

Systems and methods for an authentication system include determining that a first user device is located within a vehicle, where the first user device is associated with a first user. Vehicle authentication information is received from the vehicle. A vehicle account associated with the vehicle is authenticated using the vehicle authentication information. First transportation information associated with the vehicle is received from the vehicle. A user authentication configuration is determined based on the vehicle account and the first transportation information. A user account of the first user for the first user device is authenticated based on the first transportation information according to the user authentication configuration.

Enhanced certificate authority
10430786 · 2019-10-01 ·

An enhanced certificate authority system and method allows for the enhanced security, validation and Multi-Factor Authentication of user's within a digital signature and transaction system through the creation and management of a user's Digital Identity certificate so that through an enhanced certificate authority a user's identity and bona fides may be both protected and established across a diversity of electronic devices and transactions.

METHODS AND SYSTEMS OF PROVIDING VERIFICATION OF INFORMATION USING A CENTRALIZED OR DISTRIBUTED LEDGER

A method and system of providing verification of information of a user relating to an attestation transaction is provided, and includes sending a request for information of the user, wherein the information has been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address; receiving at a processor associated with a verifier the information of the user; sending a cryptographic challenge nonce; receiving at the processor associated with the verifier the cryptographic challenge nonce signed by the user's private key; verifying user identity with the cryptographic challenge nonce signed by the user's private key; deriving a public attest key by using the information of the user; deriving an attestation address using the public attest key; and verifying the existence of the attestation transaction at the attestation address in the centralized or distributed ledger.

System and method for composite-key based blockchain device control
20190296903 · 2019-09-26 ·

System and method for composite-key based blockchain device control, where the composite-key is created from control codes and a unique identification key. The control codes are used to control the blockchain device. The system uses the controlling system that can create controlling data. The system uses controlling data to control blockchain devices. The controlling data is used in conjunction with data in the blockchain. The system has methods for integrating with smart contracts to make execution of blockchain device depend on the smart contract. The system can be used for controlling financial activity, movement activity, asset activity, device activity, game activity. The system has methods for coupling controlling system with blockchain devices. The system has mechanisms to make blockchain device execution depend on the signature.

SYSTEMS AND METHODS FOR TRANSLATING A GESTURE TO INITIATE A FINANCIAL TRANSACTION
20190287083 · 2019-09-19 ·

Systems and methods for initiating and/or facilitating a financial transaction in response to detecting and translating a spatial gesture may be provided. A payor transaction device may be capable of detecting, via a motion-detecting device, a payor spatial gesture corresponding to a payment gesture of one or more predetermined spatial gestures and, responsive to detecting the payor spatial gesture, receiving payee account information from a payee transaction device. The payor transaction device may also be capable of transmitting, to a payor computing device, transaction data comprising the payee account information and data indicative of the payor spatial gesture. The payor computing device may be capable of transmitting at least a portion of the transaction data to a financial service provider terminal to enable the financial service provider terminal to facilitate the requested transaction.

METHODS AND APPARATUS FOR PROVIDING ATTESTATION OF INFORMATION USING A CENTRALIZED OR DISTRIBUTED LEDGER

Methods and apparatus for providing authentication of information of a user are described. Upon validation of this information, a first hash function is applied to the user's information to create a hash. A public attest key is generated by combining the hash of the user's information with one or more public keys. An attestation address is generated based on the public attest key. A signed transaction which includes the attest key is communicated for storage in a centralized or distributed ledger at the attestation address.