G06Q20/4016

Systems and Methods for Failed Payment Recovery Systems
20230029024 · 2023-01-26 · ·

Systems and methods for failed payment recovery can include a method for payment recovery. The method includes steps for receiving a set of transaction information, predicting a set of one or more authorization field values based on the received set of transaction information, predicting a set of one or more optimal send times based on the received set of transaction information, and transmitting a set of one or more authorization messages based on the predicted set of authorization field values and the predicted set of optimal send times.

WEB WALLET
20230025320 · 2023-01-26 ·

A digital identity wallet system includes a web wallet and Identity Cloud. The web wallet leverages browser APIs, platform authenticators, and secure device hardware to create, store, and use cryptographic keys. The Identity Cloud stores data encrypted on a per-user basis, so only a specific user can decrypt it, using the web wallet in a particular web browser, on a particular device. The web wallet, in conjunction with the browser and device, leverages cryptographic keys to perform all cryptographic operations locally. This allows the Identity Cloud to only handle sensitive data that's already been encrypted on a per-user basis before it receives it.

MULTIPLE CURRENCY CONVERSIONS IN ONLINE MARKETPLACES

Systems and method directed to performing a single checkout process using multiple currencies are described. More specifically, a first item total in a first currency type may be displayed at a first location in a user interface and a second item total in a second currency type may be displayed at a second location in the user interface. In response to receiving a determination of a third currency type associated with a buyer of one or more items associated with the first currency type and one or more items associated with the second currency type, a transaction total including a currency transaction fee associated with converting the first currency type to the third currency type and a second currency transaction fee associated with converting the second currency type to the third currency type is displayed at the user interface.

System and method for identity management
11563728 · 2023-01-24 ·

Some implementations may provide a machine-assisted method for determining trustworthiness of a requested transaction, the method including: receiving, from a relying party, a request to determine a trustworthiness of a particular transaction request, the transaction request initially submitted by a user to access data managed by the relying party; based on the transaction request, summarizing the particular transaction request into transactional characteristics, the transactional characteristics devoid of source assets of the transaction, the source assets including credential information of the user, the credential information of the relying party, or information content of the requested transaction; generating first machine readable data encoding transactional characteristics of the underlying transaction as requested, the transactional characteristics unique to the particular transaction request; submitting a first inquiry at a first engine to determine an access eligibility of the user submitting the transaction request, the first inquiry including the credential information of the submitting user, as well as the summarized transactional characteristics that is applicable only once to the underlying transaction request; and receiving the access eligibility determination from the first engine.

Payment authorization system
11562336 · 2023-01-24 · ·

Systems and methods for providing a payment authorization system include a payment authorization device that receives, through communication over a network with at least one of a user device and a payment provider device, a request to authenticate a merchant virtual storefront. The request may be received in association with a merchant virtual storefront transaction request. The payment authorization device also retrieves identifying information associated with the merchant virtual storefront. Additionally, the payment authorization device may retrieve, from a database located in a non-transitory memory, baseline identifying information for comparison to the retrieved identifying information. The payment authorization device determines an authenticity of the merchant virtual storefront based on the retrieved identifying information and subsequently authorizes the merchant virtual storefront transaction request. In some cases, prior to authorizing the merchant virtual storefront transaction request, the payment authorization device requests approval from a third-party approver.

Merchant evaluation method and system

A merchant evaluation method includes: acquiring multi-dimensional evaluation index data of a merchant to be evaluated; for the multi-dimensional evaluation index data, obtaining, by calculation based on standard normal distribution, a health portrait of the merchant to be evaluated, and obtaining, by calculation based on a geometric mean, a health score of the merchant to be evaluated, wherein the health portrait is data representing at least one evaluation result of the merchant to be evaluated; and outputting the health portrait and the health score of the merchant to be evaluated.

Method and System of Predictive Document Verification and Machine Learning Therefor
20230230088 · 2023-07-20 · ·

Provided are methodology and system countering fraudulent document and/or image use when authentication of a transaction based on a given document or image use is required. Additionally provided is a manner of machine learning adapting the methodology for implementation thereof.

TOKENIZED CONTROL OF PERSONAL DATA
20230230067 · 2023-07-20 ·

A device and method for managing personal data. A request for an identifier (ID) token corresponding to a user is received from a virtual wallet. The ID token is generated and transmitted to the virtual wallet, where the ID token is then presented to a third-party entity by a device of the user. A request for the personal data corresponding to the ID token is received from the third-party entity. A trustworthiness score is determined that corresponds to the third-party entity based at least in part on an analysis of entity data corresponding to the third-party entity. The trustworthiness score and received request are transmitted to the virtual wallet and passed on to the user device. An indication of acceptance of the request and encrypted personal data associated with the generated ID token are received from the virtual wallet and transmitted to the third-party entity for processing.

Blockchain-based data verification method, apparatus, and electronic device
11562375 · 2023-01-24 · ·

The present application provides blockchain-based anti-counterfeiting methods, apparatuses, and systems. One method includes: obtaining an anti-counterfeiting verification request submitted by a user for a product; initiating anti-counterfeiting verification of the product in response to the anti-counterfeiting verification request, wherein the anti-counterfeiting verification comprises integrity verification of anti-counterfeiting information generated by a plurality of anti-counterfeiting participants on a blockchain, wherein the anti-counterfeiting information comprises a plurality of types of anti-counterfeiting identification information corresponding to the product; and returning an anti-counterfeiting verification result for the product to the user.

Entity identification based on a record pattern

The methods described herein are configured to obtain a first record pattern associated with the unidentified entity and select a second record pattern associated with an entity identifier of a known entity. Based on the first record pattern matching the second record pattern, the entity identifier of the known entity is associated to the unidentified entity to indicate that the unidentified entity and the known entity are the same. Determining the entity identifier of the unidentified entity enables the linking of separate identifier systems of data structures to facilitate communication and/or interaction between the data structures.