G06Q20/4015

DIGITAL CURRENCY (VIRTUAL PAYMENT CARDS) ISSUED BY CENTRAL BANK FOR MOBILE AND WEARABLE DEVICES
20180158036 · 2018-06-07 ·

Provided is a method for digital currency transfers via a mobile and wearable device. The method may include receiving a transfer request with a transfer amount in digital currency and user identification data associated with the user, retrieving payment data of the user associated with the identification data, generating an optical code encoding the payment data and the transfer amount. The method may continue with providing the optical code on a screen of the mobile and wearable device. On scanning of the optical code, a transfer receiving request is created. The method may continue with receiving a transfer receiving request to perform a payment transaction associated with the user, accessing a user account maintained by a currency issuance unit, and transferring the transfer amount in the digital currency from the user account to a recipient account associated with the recipient identification data.

RAPID CHECKOUT PRE-INITIATION

A consumer may indicate that the consumer intends to complete a transaction at a merchant. An authorizing entity may perform some of the authorization inquiries typically performed at the time of checkout. The authorizing entity may provide a preauthorization code to the consumer. The consumer may use the preauthorization code to complete the transaction. The processing time to complete the transaction may be decreased due to the previously initiated inquiries. Additionally, the merchant may be authorized to forego verifying a signature or ID verification, speeding up the checkout process.

ENCRYPTION SYSTEM, ENCRYPTION KEY WALLET AND METHOD
20180144341 · 2018-05-24 ·

An encryption system for encrypting data of party, wherein the party is provided with an encryption key wallet and one or more encryption keys of the encryption key wallet are identifiable using at least one reference code, The encryption key wallet is opened for accessing an encryption key via its reference code, for encrypting data to generate corresponding encrypted data and/or for decrypting encrypted data to generate corresponding decrypted data, wherein the encryption key is reproducibly generated by the encryption key wallet.

When the encryption system enables exchange of encrypted data via the encryption system between two or more parties

the two or more parties are provided with the encryption key wallet; data exchanged between the parties are encrypted using one or more encryption keys obtained from the encryption key wallet; and the encryption key wallet is opened for use when encrypting and/or decrypting the data exchanged between the parties.

SYSTEM AND METHOD FOR ASSESSING RISK LEVEL OF TRANSACTIONS BASED ON ROUTING NUMBER
20240362703 · 2024-10-31 ·

A system determines a transaction's risk level from the routing number. The system includes a processor, a list of routing numbers and a group of transactions. Each transaction includes a dollar amount, a sender, and a routing number of a receiving institution. For each respective routing number, based on the transactions, the processor determines a transaction volume of the routing number and a probability of a legitimate transaction from the routing number to other routing numbers on the list. For each other routing number on the list, based on the transaction volume of the routing number, the processor determines risk curves for transactions from the sender to the routing number based on dollar amount and relative probability of legitimate transactions being sent from the sender to the other routing number. For a new transaction from the sender, a risk score is computed based on its dollar amount and routing number.

METHOD FOR GEOLOCATING A RECEIVER
20240361420 · 2024-10-31 ·

A method for geolocating a receiver by measuring times of reception, by the receiver, of a plurality of geolocation signals originating from a plurality of emitters, the geolocation signals are emitted on multiple different wavelengths, at least one geolocation signal having a frequency less than 1 GHZ.

MANAGING DATA TRANSACTIONS

Techniques for managing data transactions are described and are implementable to enable data transactions (e.g., payment transactions) to be automatically generated in response to different conditions. In implementations, user interactions to generate payment transactions are tracked at different locations over different time durations. Accordingly, when payment transactions at a particular location reach a threshold, a data transaction record can be generated. The data transaction record can be used to automatically generate subsequent data transactions. Further, application presence across different devices can be used to generate data transactions.

INTELLIGENT AUTHENTICATION PROCESS

A method for authentication includes receiving consumer information associated with a consumer transmitted over a first data network in a processor operated by an account issuer; determining available account authentication options based on the received consumer information and a database of potential authentication options stored in a memory in the processor; selecting a set of available authentication options from the available account authentication options based on a database of attributes for the potential authentication options stored in the memory in the processor; transmitting consumer information to an authentication provider associated with a selected authentication option over a second data network; receiving an authentication confirmation over the second data network in the processor; and updating the database of attributes for the potential authentication options to include information regarding a successful authentication and the authentication provider associated with the selected authentication option.

Systems, Methods and Apparatuses for Prevention of Relay Attacks

The systems, methods and apparatuses described herein provide an apparatus configured for preventing relay attacks on a communication link between the apparatus and a communication partner. The apparatus may comprise a communication port, a timer and a processor. The processor may be configured to generate a request, transmit the request through the communication link using the communication port and start counting time using the timer, receive a response via the communication port and stop the timer, receive authentication data via the communication port, authenticate the authentication data, compare the counted time with a predefined threshold, compare a first field within the request with a second field within the response and determine whether there is a relay attack.

SYSTEMS AND METHODS FOR GENERATION AND SELECTION OF ACCESS RULES

In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.

REGISTRATION-BASED USER-INTERFACE ARCHITECTURE

A registration-based user-interface architecture includes a retail shopping facility operated on behalf of an enterprise having a plurality of physically-discrete items disposed therein that are offered for retail sale. A control circuit maintains a record (for example, in a blockchain ledger) of a particular customer's purchase of a particular one of these items and also provides an opportunity to that particular customer to resell that particular item via a sales platform operated on behalf of the enterprise. By one approach the control circuit is further configured to interface with the particular customer to register that customer's purchase of this particular item. That interface may be conducted, for example, via a point-of-sale interface, a browser-based interface, a mobile device app-based interface, and so forth. By one approach this registration must necessarily occur within a predetermined amount of time from when the customer purchases the item.