G06Q20/4016

COMPUTER-IMPLEMENTED METHOD FOR DETERMINING A MERCHANT LOCATION USING A VIRTUAL CARD, IN REAL-TIME

The present disclosure is related to a computer-implemented method, card processing server, and non-transitory computer readable medium for determining a merchant location using a virtual card, in real-time. A card processing server may receive test transaction data from an acquirer bank of a merchant when a test transaction is initiated through a virtual card provided to the merchant. The card processing server may detect a record of the test transaction in a transaction database, in real-time, using one or more attributes of the virtual card stored in the card processing server and may retrieve signature data from the test transaction data upon detecting the record of the test transaction. Finally, the card processing server determines a transaction source data location of the merchant at which the test transaction was initiated and a registered name of the merchant based on the signature data.

Payment terminal operation method and system therefor

A method of payment terminal operation, including: receiving a payment collection request for a payment from an application, generating a payment initiation request for the payment, sending the payment initiation request to a secure processing system, switching the secure processing system from operation in an unsecured mode to operation in a secured mode in response to receipt of the payment initiation request, facilitating payment information entry, and receiving a payment response notification, generated based on the payment information, at the main processor.

TRACKING SYSTEM, TRACKING METHOD, AND RECORDING MEDIUM
20230016373 · 2023-01-19 ·

A system for tracking exchange of energy, includes: a memory that stores energy information generated by each node of a plurality of nodes in a blockchain network, the energy information indicating a production method used for producing the energy and an issuance status of a certificate that certifies the production method; and circuitry that receives, from an information processing apparatus, issuance request information requesting issuance of the certificate for the production method of energy, and determines an issuance status of the certificate for the production method of energy, based on the issuance request information that is received.

System and Method for Processing Deferred Authorization Transactions

A method of processing a deferred authorization transaction including: receiving at least one transaction processing request associated with a transaction, where the transaction is initiated using a portable financial device associated with a user, the at least one transaction processing request including a deferred authorization indicator; determining that the at least one transaction processing request includes the deferred authorization indicator; determining that the transaction is a deferred authorization transaction based on determining that the at least one transaction processing request includes the deferred authorization indicator; and processing the transaction using at least one deferred authorization transaction rule in response to determining that the transaction is a deferred authorization transaction. A system for processing a deferred authorization transaction is also disclosed.

Identity protection system

A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.

SYSTEM AND METHOD TO REPLAY SUSPICIOUS ACTIVITY DETECTION PIPELINE IN RISK NETWORKS

A computer-implemented system, platform, computer program product, tool, and/or method for re-running alert reports that includes: identifying an alert report to be rerun; collecting information on the alert report; gathering information on the configuration of a data analytics pipeline that generated the alert report; gathering data used to generate the alert report; recreating a regenerated data analytics pipeline based upon the information gathered on the configuration of the data analytics pipeline that generated the alert report; running the regenerated data analytics pipeline using the gathered data to create a rerun alert report; and optionally comparing the rerun to the original run including optionally generating a visual display of the results including in an aspect creating a side-by-side comparison of the tasks.

Geocoding Geocode Datasets in Know Your Customer Blockchain Data Blocks for Spatial Analytical Risk Modeling
20230020845 · 2023-01-19 ·

Aspects of the disclosure relate to geocoding geocode datasets in KYC blockchain data blocks for spatial analytical risk modeling. In some embodiments, a computing platform may receive a client request to initiate a transaction with an enterprise organization. Using financial documentation and identification documentation associated with the client request, the computing platform may generate geocode coordinates and may identify a series of geographic risk factors. The computing platform may translate the geocode coordinates and the geographic risk factors into analytical overlays. The computing platform may stack the analytical overlays to generate an interactive spatial risk analysis model. The enterprise organization may use the interactive spatial analytical risk model to analyze the client request, and to determine whether to approve or deny the client request.

MACHINE LEARNING BASED SERVER FOR PRIVACY PROTECTION LEVEL ADJUSTMENT
20230017468 · 2023-01-19 ·

A computer-implemented method, a computer program product, and a computer system for preventing scams in commerce transactions. The computer system identifies a critical decision-making process of a user in a commerce transaction that involves exposing personal data. The computer system receives current stress factors of the user. The computer system calculates a current stress score of the user, based on the current stress factors, by using a machine learning model that correlates behavioral patterns of the user and stress levels of the user. The computer system determines an abnormal level of the current stress score, based on predetermined thresholds for different abnormal scores. The computer system determines a privacy protection level in the critical decision-making process, based on the abnormal level. The computer system takes an action for preventing scams in the commerce transaction, based on the privacy protection level.

DEVICES, SYSTEMS AND METHODS FOR AUTONOMOUSLY MONITORING CUSTOMER USE OF EQUIPMENT & BILLING VIA A BLOCKCHAIN NETWORK

An apparatus for charging fees to a renter of equipment based upon wear to an item of equipment is disclosed herein. The apparatus can include a communications device proximal to the equipment that charges the renter, via a connected blockchain network, based off of the amount of vibration, pressure, flow rate, or temperature that the item of equipment is subjected to.

SUPPLY CHAIN MANAGEMENT USING BLOCKCHAIN AND MACHINE LEARNING FUNCTIONALITIES
20230012566 · 2023-01-19 ·

An initial transaction is generated representing a forecasted demand for material needed to manufacture equipment via a supply chain. The initial transaction is added to a blockchain for access by entities in the supply chain comprising at least a subset of one or more supply entities, one or more material distribution entities, and one or more manufacturing entities. In one or more examples, the steps may be performed by an OEM blockchain node that accesses any transactions added by the various entities on the blockchain node and limits access to transactions on the blockchain by the various entities. Further, the initial transaction may be a main transaction and a transaction representing a commitment by one of the supply entities may be a sub-transaction of the main transaction, and the sub-transaction is closed in the blockchain upon the request for payment for the committed material or payment of the request.