G06Q20/4016

Method and system for usage of cryptocurrency, preventing financial crime
11507945 · 2022-11-22 ·

The usage of money has been always abused for financial crime. The invention of cryptocurrency on Blockchain did not change that since the ownership essentially remained anonymous. The present invention deals with the programmatic parameterization of cryptocurrency Smart Contracts to include the binding between the user's cryptocurrency transaction and user's Identity, thus creating “permissioned” crypto-token transfer. Such binding has advantageous properties as being resilient to any form of financial crime, preventing cryptocurrency theft, and precluding “bad actors” from using this cryptocurrency. The system for Identity-Bound Cryptocurrency Transfer (IBCT) will include IBCT Blockchain Smart Contract, IBCT Blockchain Oracle Smart Contract, and off-chain Identification-as-a-Service for the IBCT owner using dedicated CryptoWallet for executing IBCT Smart Contract. The Financial crime-preventive usage of cryptocurrency is achieved through user-opted, while pseudonymous, binding of the user's Blockchain public address with the user's identity. This Financial crime-preventive usage of cryptocurrency is facilitated via a specialized crypto wallet.

EFFICIENT AND SECURE COMMUNICATION USING WIRELESS SERVICE IDENTIFIERS
20230057111 · 2023-02-23 ·

Systems and methods are provided for reducing communications between servers and a mobile device and providing enhanced security and privacy to wireless beacon services. This can involve a broadcast device transmitting a beacon transmission using a short range wireless radio, such a Bluetooth or WiFi, and including a MAC address, a first unique identifier, and a beacon service identifier. The mobile device then selects one or more unique identifiers from received beacon transmissions, by filtering (that is, selecting) those beacon transmissions which include the beacon service identifier. The wireless device then takes further action, if the first unique identifier is present among the selected one or more unique identifiers, using stored information from the server. The stored information may be delivered to the wireless device in response to the wireless device sending the first unique identifier to a server, or the stored information may have been previously downloaded.

Systems for alerting user to undesired components in purchase items

A system for alerting a user of undesired components in purchase items is provided. The system comprises receiving a list of undesired components of purchased items, and defining an alert to a user of an undesired component in a purchased item, the alert comprising an alert timing configuration and an undesired component identification. The system further comprises receiving a notice that the user purchased an item, determining whether a listing of the purchased item has been automatically collected, and generating a list of components of the purchased item when the purchased item listing has been automatically collected, and obtaining from the user the list of components of the purchased item when the purchased item listing has not been automatically collected. The system further determines whether the purchased item contains an undesired component, and upon determining that the purchased item contains art undesired component, sends the alert to the user.

DEPLOYMENT OF SELF-CONTAINED DECISION LOGIC

In one aspect there is provided a method. The method may include collecting one or more functions that implement the decision logic of a solution. A snapshot of the one or more functions can be generated. The snapshot can executable code associated with the one or more functions. The solution can be deployed by at least storing the snapshot of the one or more functions to a repository Systems and articles of manufacture, including computer program products, are also provided.

SYSTEMS AND METHODS FOR FACILITATING TRANSACTIONS USING A DIGITAL CURRENCY
20230058531 · 2023-02-23 ·

Systems and methods for facilitating a transaction between a first entity and a second entity using a digital currency are described. In some aspects, a computing node participates in a private distributed ledger for a financial institution and stores one or more transaction blocks representing transactions in a digital currency. The digital currency is issued by the financial institution and is fixed with respect to a fiat currency. The computing node is configured to receive a transaction for transferring an amount of digital currency from a first entity to a second entity, generate a new transaction block representing the transaction, transmit the new transaction block to other computing nodes participating in the private distributed ledger, receive an indication of validity of the new transaction block, and insert the new transaction block into the private distributed ledger.

Digital wallet for digital identities and interactions with a digital identity services platform

A non-transitory computer readable storage medium has instructions executed by a processor to maintain a digital wallet with digital identities. Each digital identity has identity attributes different than identity attributes associated with a real individual utilizing the digital identity, an associated attribute for compartmentalized network activity, a digital identity key pair, and a designated block chain. Interactions between the digital identities of the digital wallet and a digital identity services platform are supported.

Mobile payment signature processing

A mobile device renders a page that receives input points on a signature provided in conjunction with a mobile payment transaction. The page applies a smoothing algorithm to smooth the input points and create a signature file that more truly represents the actual input signature. The signature file and/or the input points are provided to a payment facilitator for use in completing the mobile payment transaction, performing fraud detection, and potentially for other purposes. Mechanisms are also disclosed for authenticating a buyer device in conjunction with a mobile payment transaction.

Relying Party Risk-Adjusted Indicator System and Method
20230053383 · 2023-02-23 ·

Provided is a method including receiving, by a user device, a request from an identity service to approve communicating a user proof-of-identity to a relying party. A user of the user device is prompted to request a one-time transaction identifier based on the request. Based on a first input from the user, the user device requests the one one-time transaction identifier from the identity service. In response to the request for the one-time transaction identifier, the user device receives the one-time transaction identifier from the identity server and displays the one-time transaction identifier on a first user device screen. The user inputs the one-time transaction identifier on a second user device screen and the user device communicates the one-time transaction identifier to the identity service. In response to receiving the at least one inputted one-time transaction identifier, the relying party determines whether to approve or deny a transaction.

STORE MANAGEMENT SYSTEM AND STORE MANAGEMENT METHOD

A store management system includes a first determination unit, a monitoring unit, a settlement unit, a second determination unit, and a generation unit. The first determination unit determines a customer entering a store displaying and selling a commodity. The monitoring unit monitors that the customer determined by the first determination unit carries the commodity. The settlement unit settles price of the commodity monitored by the monitoring unit as being carried by the customer, according to instruction from the customer. The second determination unit determines that the customer leaves the store. The generation unit generates history data including suspicious data indicating that the customer, identified by an identification code, is associated with an unsettled commodity being carried out of the store, when a settlement of the commodity carried by the customer which is determined by the second determination unit as leaving the store has not been completed by the settlement unit.

METHOD AND SYSTEM FOR ASSESSING THE REPUTATION OF A MERCHANT

The system and method may assess the merchant risk level on a more continuous scale rather than a binary categorization. It may produce a continuous risk score proportional to the likelihood of a merchant being risky, effectively addressing the issue of shades of gray encountered by the traditional blacklisting approach. The continuous risk score feature provides greater flexibility as it allows the payment network to make dynamic pricing decisions (known as interchange optimization) based on the merchant risk level. Using collective intelligence from transactions across the payment network, the system and method may be able to assess the merchant risk level with high accuracy. The system and method may be particularly beneficial to small merchants with low transaction volume as even a few fraudulent transactions can easily put them in the high-risk merchant category. Further, the system and method may help payment processing networks make better decision on cross-border transactions.