Patent classifications
G06Q20/4015
SYSTEMS AND METHODS TO ENABLE PAYMENTS IN THE ABSENCE OF A POINT OF SALE DEVICE
A method and system for processing a transaction between a merchant and a consumer using a consumer mobile device wherein the consumer mobile device is in communication with a payment processing computing device having a memory are provided. The method includes receiving merchant data associated with the merchant, receiving a consumer alias associated with the consumer, receiving, a transaction request message from the consumer mobile device, the transaction request message including a merchant identifier, a transaction amount, a device identifier associated with the consumer mobile device, and consumer verification data, retrieving the account number based on the device identifier and the consumer verification data, retrieving the merchant data based on the merchant identifier, generating an authorization request message including the account number, the transaction amount, and the merchant data, and transmitting the authorization request message over a payment network to an issuer bank.
PAYMENT METHOD, APPARATUS AND DEVICE
Implementations of the present specification disclose a payment method, apparatus, and device. In the case of face-to-face payment, the location information and the payment information are sent to the server through the terminal device of the first user, and the server generates a corresponding payment password and returns the corresponding payment password to the first user. The first user then forwards the payment password (for example, verbally, or forwarding using communication software, etc.) to the second user, and the second user then uploads the location and payment password of the second user to the server. The server performs matching or querying within a certain range based on the location of the second user, to determine whether a same payment password exists. If the matching or query is successful, payment is made.
MOBILE NETWORK-BASED MULTI-FACTOR AUTHENTICATION
A computer-implemented method of authenticating a user logged into a restricted-access account over a computer network, includes the steps of: receiving a request to authenticate the user over the computer network; verifying that authentication data of the user matches verification data that is acquired over the computer network and associated with a network identification of a mobile device that is linked to the restricted-access account of the user; verifying that a location of an IP address from which the user is accessing the restricted-access account matches a current location of the mobile device; and authenticating the user upon determining that the authentication data of the user matches the verification data and the location of the IP address matches the current location.
System, Method, and Apparatus for User-Less Payment on Delivery
Described herein are systems, methods, and apparatuses for performing a user-less payment for an item upon its delivery by an unmanned delivery vehicle. The unmanned delivery vehicle may navigate to a delivery location, receive payment information, initiate a payment transaction with a remote server, and release the item at a specified location upon successful completion of the payment transaction. Upon arrival of the unmanned delivery vehicle, a wireless data transmission device may send payment information to a remote server, and the remote server may provide the unmanned delivery vehicle with an indication of whether the item can be released and a specific location at which the item can be released.
SYSTEM AND METHOD FOR PROVIDING A REPORT OF AN ANALYTIC RESULT VALUE BASED ON IP DATA
Systems and methods for providing a report of an analytic result value based on IP data are disclosed. An example system may include a controller configured to: access a distributed ledger including a plurality of intellectual property (IP) data about a plurality of IP assets, where the IP assets include an aggregate stack of IP; tokenize the plurality of IP data; and interpret a distributed ledger operation corresponding to at least one of the IP assets. The controller may also be configured to determine an analytic result value in response to the distributed ledger operation and the tokenized plurality of IP data, where the analytic result value is one of: a number of access events, an access time; or an access processing time and to provide a report of the analytic result value; and record a transaction on the distributed ledger in response to providing the report.
SEMI-PRIVATE BLOCKCHAIN VIRTUAL CURRENCY EXCHANGE SYSTEMS
A first merchant node on a semi-private blockchain virtual currency exchange system is exclusively capable of creating first virtual currency units. Unaffiliated merchant node(s) are exclusively capable of creating other merchant-specific virtual currency units in the system, while customer computing devices are incapable of creating virtual currency units. The first merchant node creates and issues first virtual currency units to a first customer account associated with a first customer computing device. Upon receiving a transaction request for exchanging first virtual currency unit(s) for a second currency type between the first customer account and another customer account, the first merchant node validates the first transaction request, and creates and sends a first transaction receipt to unaffiliated merchant node(s). Upon receiving a redemption request from a customer account, the first merchant node validates the first redemption request, and creates and sends a first redemption receipt to unaffiliated merchant node(s).
REMOTELY CONTROLLING USE OF FEATURES BASED ON AUTOMATIC VALIDATION REQUESTS
A system and method for disabling a function of a feature of a vehicle based on a validation request to a centralized validation authority, prior to a use of the feature includes determining that a condition is met as part of a startup sequence of the vehicle, transmitting the validation request to the centralized validation authority, in response to determining the condition is met, wherein the validation request is part of the startup sequence of the vehicle, receiving a validation decision from the centralized validation authority, and disabling the feature of the vehicle as a function of the receiving the validation decision.
Network of trust
A user device may detect at least one external device in communication range of the device, receive at least one external device identifier from the at least one external device, generate a transaction request comprising data describing a transaction to be processed and the at least one external device identifier, and send the transaction request to a transaction service for fulfillment. The transaction service may receive the transaction request, analyze the at least one external device identifier to identify at least one security factor associated with the at least one external device identifier, adjust a security score for the transaction based on the at least one security factor, and determine whether to process the transaction based on the adjusted security score.
Payment information-based geofencing method and device therefor
Disclosed is an electronic device comprising at least one communication circuit, a display and a processor. The processor of the electronic device may be configured so as to: receive information associated with a payment from a first external electronic device; generate, from the information associated with a payment, payment information including at least the name of a store associated with the payment; acquire at least one wireless network information; and transmit the at least one wireless network information and the payment information to a second external electronic device. In addition, various embodiments are possible as identified in the specification.
Identifying anomalies in user internet of things activity profile using analytic engine
Techniques are provided for identifying anomalies in an Internet of Things (IoT) activity profile of a user using an analytic engine. An exemplary method comprises obtaining data from a plurality of IoT devices of a user, wherein at least one IoT device comprises an agent device that performs an action on behalf of the user; applying the obtained data to a feature engineering module to convert the obtained data into time-series features that capture behavior and/or characteristics of an IoT environment of the user; and applying the time-series features to an analytic engine comprising a multi-variate anomaly detection method that learns one or more patterns in the IoT activity profile of the user for a normal state and identifies an anomaly with respect to an action performed by the agent device based on a health score indicating a deviation from the learned patterns.