G06Q20/4015

METHOD FOR TRADING CRYPTOCURRENCIES
20220277392 · 2022-09-01 ·

A method for trading cryptocurrencies in a vehicle involves providing the vehicle with a control module for trading in the cryptocurrencies. The control module checks each desired trading action based on stored and/or retrieved information relating to local legal provisions. Only legally compliant trading actions are permitted.

SECURED HD MAP SERVICES USING BLOCKCHAIN
20220286305 · 2022-09-08 ·

Various systems and methods for implementing secure high-definition map services are described herein. A system for implementing secure high-definition map services includes a processor subsystem; and a storage including instructions, which when executed by the processor subsystem, cause the processor subsystem to: receive map data from a remote data source; authenticate the remote data source; obtain an identifier of the remote data source; add the map data to an entry in an immutable log when the remote data source is authenticated, the entry having an entry identifier; store an association between the identifier of the remote data source and the entry identifier in a secure store; and incorporate the map data into a master map.

Method, apparatus, and computer program product for enhancement of fan experience based on location data

An example method includes receiving an application device identifier from an application device associated with a location tag; receiving blink data from the location tag; calculating, using a processor, location data based on the blink data; in response to an event occurrence indication, generating, using the processor, a camera data request based on the location data and the event occurrence indication; transmitting the camera data request; and receiving camera data from the application device in response to the camera data request.

Secure card not present transactions using chip-enabled cards
11436609 · 2022-09-06 · ·

Techniques are described for performing secure card not present (CNP) transactions using integrated circuit chip-enabled cards. The techniques include continually or periodically tracking a location of a user's card by a user computing device, e.g., a “smart” phone, and storing a log of datasets relating to the location of the user's card at a server device. Based on the tracking, the user computing device may alert the user via a push notification or other message when the user's card is not within a preset range of the user computing device. In addition, an authentication server determines a location of a purchaser computing device attempting to perform a CNP transaction using the user's card information, and compares the location of the purchaser computing device with a most recent location of the user's card retrieved from the log of datasets to determine whether to approve the CNP transaction.

System for User Authentication
20220300974 · 2022-09-22 · ·

A computer-implemented method of authenticating the identity of a user is provided, where the user is associated with a computer signature and is in possession of a cell phone. The method involves obtaining a current geographical location of the cell phone, determining if the computer signature is associated in a database with a stored geographical location of the phone, and, if the computer signature is associated in the database with a stored geographical location, comparing the stored geographical location to the current geographical location of the phone.

Computing systems utilizing generated unique authorization identifiers for authorizing user operations and methods of use thereof

In some embodiments, an exemplary method may include receiving by a computing device of a user, first facial image data of the user for identity verification from an authorizing entity for authorizing user operations in computing systems managed by a plurality of entities. Second facial image data of the user is obtained using an imaging device of the computing device at a predefined location of a particular entity from the plurality of entities for authenticating the user. A unique authorization identifier is displayed of the computing device of the user. A location of the computing device and a timestamp when a computing terminal of the particular entity scans the unique authorization identifier on the computing device of the authenticated user and an authorization request is relayed to the authorizing entity. An approval is received based on verification of the unique authorization identifier generated for the particular entity, the location of the computing device, and the timestamp.

Eligibility determination for delegation exemption to strong authentication requirements

Disclosed are various embodiments for determining eligibility for the delegation exemption to strong customer authentication requirements. In one embodiment, a payee entity determines that a payment transaction using a payment instrument issued by a payment issuer is eligible for a delegation exemption from an authentication challenge by the payment issuer based at least in part on a previous authentication challenge by the payment issuer being successfully completed for a previous payment transaction using the payment instrument and a returned payment history associated with the payment instrument. Subsequently, the payee entity generates an alternative authentication challenge that does not involve the payment issuer instead of the authentication challenge by the payment issuer.

Remote activation of kiosk to serve product or release cash to customer

Disclosed herein are system, method, and computer program product embodiments for remote activation of an automated teller machine (ATM) to dispense cash to a customer. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, the customer may visit the ATM. The customer may capture an image being displayed on a display of the ATM using a camera of the mobile device. The captured image may be sent to an application server from the mobile device. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.

Email security platform

A server can include a detection module for monitoring an electronic account and detecting irregular or fraudulent activities. The detection module can be a machine learning model configured to detect activities or patterns indicative of an account being compromised, hacked or accessed by unauthorized users. Upon detection of the irregular activities or patterns, the detection module can transmit a notification or signal to a trigger module which can implement remedial actions. The trigger module can receive the signal from the detection module and execute an action in accordance with a trigger plan. The trigger plan can include various information and a range of actions, which can be selected and/or executed based on the information included in the signal.

SYSTEMS AND METHODS FOR CONFIGURING A MOBILE DEVICE TO AUTOMATICALLY INITIATE PAYMENTS
20220253826 · 2022-08-11 · ·

The disclosed embodiments include a mobile client device for automatically performing a mobile financial service function, including a memory storing software instructions, the software instructions including a mobile financial service application configured to perform financial service processes. The system may also include and one or more processors configured to execute the software instructions to detect a physical action performed on the mobile client device, and determine a first financial service function to perform based on the detected physical action, wherein the first financial service function is a function provided by the mobile financial service application. The one or more processors may also determine whether verification of a user is required, verify the user if verification of the user is required, and automatically initiate the first financial service function.