Patent classifications
G06Q20/4015
Authentication of contactless transactions
Disclosed embodiments include aspects that relate to authentication of contactless interactions. Identifying information can be provided from multiple sources. A chip-embedded card can be registered to an individual and include identifying information associated with the information. During a contactless transaction, identifying information can be acquired. An individual's identity can be validated based on identifying information. A chip-embedded card can be read by a card reader at a particular location providing physical presence information. In one instance, identifying information from the chip-embedded card can be compared to other identifying information to determine whether there is a match or mismatch. A confidence score can be computed based on the amount and type of information provided. An individual's identity can be validated when the confidence score satisfies a threshold.
SYSTEMS AND METHODS FOR CONFIGURING A MOBILE DEVICE TO AUTOMATICALLY INITIATE PAYMENTS
The disclosed embodiments include a mobile client device for automatically performing a mobile financial service function, including a memory storing software instructions, the software instructions including a mobile financial service application configured to perform financial service processes. The system may also include one or more processors configured to execute the software instructions to detect a physical action performed on the mobile client device, and determine a first financial service function to perform based on the detected physical action, wherein the first financial service function is a function provided by the mobile financial service application. The one or more processors may also determine whether verification of a user is required, verify the user if verification of the user is required, and automatically initiate the first financial service function.
SYSTEMS AND METHODS FOR CONTROLLING OPERATION OF AN ARTICLE BASED ON DETECTION OF AN INTERACTION EVENT
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for detecting events occurring to an article at a remote location using low-power event detection circuitry and transmission of event detection messages over a network.
CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE
A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes generating, by a user, a first private key and a first public key corresponding to each other; generating, by an n.sup.th service provider, an n.sup.th private key and an n.sup.th public key corresponding to each other; transmitting, from the user to the n.sup.th service provider, a level n key; verifying, by the n.sup.th service provider, the level n key; generating, by the n.sup.th service provider, a level (n+1) key by concatenating the level n key and the n.sup.th public key signed with the n.sup.th private key; and transmitting, by the n.sup.th service provider, the level (n+1) key to the user, where n is a natural number, and when n=1, the level 1 key is the first public key signed with the first private key.
Wagering platforms and access derived from machine-readable codes
A system for verifying a user device for authorizing access to a wagering portal comprising: a server system comprising at least one server, at least one database, and at least one user device; a plurality of operable rules populated on said server system wherein said operable rules are met by actions performed by scanning by the user device one or more tags positioned within a geofence within a venue; verifying an identification card or another verification data confirm age of the user; verifying a location by determining whether the scan by the user device of the first tag was within a geofence corresponding to the venue; and upon verifying the age and a location, redirecting the user device from a server, a URL, or a Web app to a wagering portal.
SYSTEM FOR IDENTIFYING POINTS OF COMPROMISE
The disclosure describes an apparatus having programmed instructions that when executed cause the apparatus to receive, via a communication network, information regarding suspicious fraud activity at a first location involving a plurality of transaction cards; monitor changes over a first time interval to received information regarding suspicious fraud activity at the first location; and identify a point-of-compromise (POC) location based on monitored changes surpassing a threshold indicating suspicious fraud activity at the first location over the first time interval.
RADIO NETWORK PULSES FOR CONTACTLESS PAYMENT VERIFICATION
A method of a transaction verification service is implemented by an electronic device. The method includes receiving a transaction identifier from a user device or a merchant device, requesting at least one transmitter near the user device or the merchant device to send a location code to the user device or the merchant device, receiving the location code from the user device or the merchant device, verifying the location code, and forwarding the transaction identifier to a payment processing service, in response to verification of the location code.
SYSTEM AND METHOD FOR EFFECTING A SECURE EVENT
Systems and methods for effecting secure transactions are described. A processing device, when executing computer-executable instructions: receives from a requesting entity computing system a transaction request for a payload. The transaction request is transmitted to delivery entity computing system associated with a delivery entity identifier and geographic location. An encryption key, random number and a unique request identifier are generated and transmitted to requesting and delivery entity computing systems. In response to receiving a delivery transaction confirmation from the delivery entity computing system, the processing device verifies the secure transaction. After receiving a requestor transaction confirmation from the requesting entity computing system (indicating a verified transfer of the payload), a payload reimbursement is transferred to a delivery transaction account from a requestor transaction account.
COMPUTER-BASED SYSTEMS CONFIGURED TO PROVIDE PRE-STAGED TRANSACTIONS VIA LOCKERS AND METHODS OF USE THEREOF
Systems and methods of providing pre-staged transactions via lockers are disclosed. In one embodiment, an exemplary computer-implemented method may comprise receiving a request from a user to perform a pre-staged transaction at a physical location; generating a first token based on the pre-staged transaction; transmitting first token to an app executing on a mobile device associated with the user; assigning a locker from a plurality of lockers positioned within the physical location; receiving the first token from the app executing on the mobile device of the user to initiate access to the locker when the user is within the physical location; authenticating the user based on the first token; transmitting, upon successful authentication of the user, a second token to the app executing on the mobile device; and causing, in response to receiving the second token at the locker, the locker to unlock.
SYSTEM AND METHOD FOR REAL-TIME VIDEO BROADCASTING, AUTHENTICATION, AND ELECTRONIC TRANSACTION PROCESSING IN A DISTRIBUTED NETWORK EVENT SETTING
A system and method for live streaming, license verification, and sales engagement in various connected event settings, including trade shows, presentations, tutorials, podcasts, educational events, conferences, and seminars, are provided. The system enables live streaming from locations, automated license verification for attendees, and dynamic sales engagement. The platform comprises a dynamic interface and methods for verifying licenses, controlling access to restricted products, and facilitating transactions. The platform integrates live streaming, IoT devices, real-time data processing, and secure communication protocols to enhance user experience, ensure compliance, and expand event reach to a broader audience.