G06Q20/4015

ELECTRONIC COMMERCE TRANSACTION AUTHENTICATION BASED ON A VEHICLE TRAVEL ROUTE DATA
20180130044 · 2018-05-10 ·

A device and method in a vehicle control unit for providing electronic commerce transaction authentication are provided. Upon receiving an electronic commerce transaction request relating to a transaction source, the vehicle control unit authenticates the transaction source against a vehicle travel route parameter by comparing the source location data with the vehicle travel route parameter. When the source location data compares favorably with the vehicle travel route parameter, an electronic commerce authentication is generated in response to the request, and transmitted.

TRAVEL ACCOUNT
20180130045 · 2018-05-10 ·

A user can set up a travel account with a payment provider, to inform the payment provider of expected dates and locations of travel, along with limits or restrictions at the various locations and/or dates. When the user travels and attempts to make a payment, the payment provider can determine the location and date to aid in processing the payment request, resulting in an easier process for the user, while still providing additional security with the limits and restrictions.

SYSTEMS AND METHODS FOR AUTHENTICATING A USER USING PRIVATE NETWORK CREDENTIALS
20180108012 · 2018-04-19 ·

A cardholder authentication computing device for authenticating user computing devices during online payment transactions are provided. The cardholder authentication computing device leverages pre-authentication of a user by a private network to facilitate authentication of a user in the context of an online payment transaction between the user and a merchant. During the course of an online payment transaction, the cardholder authentication computing device may receive an authentication request messages containing pre-authentication data from a merchant computing device. The cardholder authentication computing device then authenticates the user based, in part, on the pre-authentication data. In certain embodiments, the cardholder authentication computing device may also determine whether one or more partner services apply to transactions between the user and the merchant based on the user's affiliation with the organization.

SYSTEMS AND METHODS FOR CONTACTLESS AND SECURE DATA TRANSFER
20180108005 · 2018-04-19 ·

In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system. The sensor is configured to emit energy and receive at least one first identifier, send at least one communication to an electronic device requesting a second identifier, receive at least one second identifier, and send the at least one first identifier and the at least one second identifier to the authentication system. The authentication system is configured to receive the at least one first and second identifiers from the sensor, to choose, based on the at least one first identifier and the at least one second identifier, a transaction processing system, and send the at least one first and second identifiers to the chosen transaction processing system.

Enhanced certificate authority
09947008 · 2018-04-17 ·

An enhanced certificate authority system and method allows for the enhanced security, validation and Multi-Factor Authentication of user's within a digital signature and transaction system through the creation and management of a user's Digital Identity certificate so that through an enhanced certificate authority a user's identity and bona fides may be both protected and established across a diversity of electronic devices and transactions.

METHOD FOR CERTIFYING THE GEOLOCATION OF A RECEIVER
20240397324 · 2024-11-28 ·

Method for certifying the geolocation of a receiver, including, prior to said certification, receiving, at predetermined times, in addition to the geolocation signals emitted by a plurality of emitters and used to compute said geolocation, a predetermined number of additional electromagnetic signals emitted by the same emitters and comprising data used to authenticate the geolocation, the method comprising determining the authenticity of the geolocation on the basis of the additional electromagnetic signals.

User Authentication Based on Account Transaction Information in Text Field

Methods, systems, and apparatuses are described herein for authenticating access to an account using questions which allow users to provide textual information about transactions conducted by an account. A machine learning model may be trained to predict the guessability of merchants. A request for access to an account may be received, and transaction data for that account may be received. An authentication question may be presented. For example, a user may be prompted to list places they have shopped recently. A user response comprising text data may be received. The text data may be processed to identify one or more merchants. If the one or more merchant(s) are represented in the transaction data, the machine learning model may be used to determine the guessability of the one or more merchants. An authentication score may be determined based on the guessability, and access to the account may be provided.

Multi-dimension classification object matrices to estimate multi-dimensional representations with multi function device
12152894 · 2024-11-26 · ·

Various implementations directed to price time priority queue routing for a optimized multi-dimension map matrix tile data exchange linked database are provided. Implementations of various computer methods to organize a multi-dimension map tile data exchange linked database with associated social networking elements and multi dimension coordinate object optimization and price time priority queues and securitization to organize the data and create a fluid system for trading value within the system for the data over a plurality of devices and network members.

Computing system for distributing cryptocurrency to new users

A computing system receives a code that is generated based upon an image of an iris of a first user. The image of the iris of the first user is captured by way of an iris scanning device that is under control of a second user. The computing system executes a search over a plurality of codes stored in a data store based upon the code, where the plurality of codes are generated based upon images of irises of a plurality of users. The computing system determines whether the code is included in the plurality of codes based upon search results for the search. Based upon a determination that the code is not included in the plurality of codes, the computing system causes an amount of cryptocurrency to be transferred to a cryptocurrency wallet of the first user.

Systems and methods for detecting human presence near a transaction kiosk
12154416 · 2024-11-26 · ·

Disclosed embodiments may include a system that may receive first level authentication data from a first user, identify a first user device associated with the first user, and determine whether a current location of the first user device is within a predetermined proximity of a first computing device. In response to the determination, the system may detect one or more objects within the predetermined proximity of the first computing device using the one or more positional sensors. The system may determine that at least one of the one or more objects is associated with a human, and in response, trigger a security measure. The system may transmit an indication of the triggered security measure to the first computing device, and may transmit instructions to the first user device configured to cause the first user device to provide an alert to the first user.