Patent classifications
G06Q20/4016
TRAFFIC ACCIDENT HANDLING METHOD AND DEVICE, AND STORAGE MEDIUM
Provided in the embodiments of the present invention are a traffic accident handling method and device, and a storage medium. The traffic accident handling method includes: acquiring first accident data when a first vehicle has a traffic accident, wherein a first traffic accident handling device has an associative relationship with the first vehicle; on the basis of the first accident data, performing accident penalty determination processing to obtain a first penalty determination result; receiving a second penalty determination result sent by a second traffic accident handling device, wherein the second traffic accident handling device has an associative relationship with a second vehicle in the traffic accident other than the first vehicle, the second traffic accident handling device corresponds to a second node in a blockchain network and runs a smart contract, and the second penalty determination result is obtained by the second traffic accident handling device performing accident penalty determination processing on the traffic accident by means of the smart contract; and on the basis of the first penalty determination result and the second penalty determination result, determining a first target penalty determination result.
SYSTEM AND METHOD OF AUTOMATED KNOW-YOUR-TRANSACTION CHECKING IN DIGITAL ASSET TRANSACTIONS
An automated method of checking for legitimacy during a digital asset transaction, including by a customer, initiating a digital asset transaction, receiving a wallet address corresponding to a wallet, checking the wallet address against one or more databases, wherein said one or more databases comprise wallet transaction history and risk category information, determining if the wallet address should be flagged as a suspicious transaction based on the transaction history and risk category information stored in the one or more databases, if the wallet address is flagged as suspicious, rejecting the transaction and notifying the customer of the rejection. or moving the digital assets to a holding wallet for further checks, and if the wallet address is not flagged as suspicious, releasing the digital assets and proceeding with the transaction.
AUTHENTICATION-GAINING APPARATUS, AUTHENTICATION APPARATUS, AUTHENTICATION REQUEST TRANSMITTING METHOD, AUTHENTICATION METHOD, AND PROGRAM
An authentication-gaining apparatus includes: an acquiring unit that acquires unique information; an encrypting unit that encrypts the unique information using a cryptographic key, thereby generating encrypted information; and a display unit that repeatedly transmits an authentication request containing the encrypted information, to an authentication apparatus, during an authentication period, wherein multiple authentication requests respectively containing encrypted information obtained by encrypting different pieces of unique information are transmitted during the authentication period. An authentication apparatus includes: a receiving unit that repeatedly receives an authentication request transmitted from an authentication-gaining apparatus, during an authentication period; a decrypting unit that decrypts the encrypted information, thereby acquiring decrypted information; an authentication unit that judges whether or not the authentication-gaining apparatus is legitimate, using multiple authentication requests received during the authentication period and containing encrypted information that has been decrypted; and an output unit that outputs a judgment result by the authentication unit.
Generating account numbers using biometric information obtained via a generic transaction card
Methods and systems disclosed herein describe a generic transaction card that generates an account number based on a biometric identifier of a user. Multiple users may use the generic transaction card to transact. For example, a first user may provide a first biometric identifier to the generic transaction card, which may generate a first account number associated with the first user. The first user may then use the generic transaction card to transact. Similarly, a second user may provide a second biometric identifier to the same generic transaction card, which may generate a second account number associated with the second user. The second user may then use the same generic transaction card to make purchases charged to the second user's account.
RAPID APPROVAL OF BLOCKCHAIN-BASED TRANSACTIONS
The present disclosure involves systems, software, and computer implemented methods for providing rapid approval of blockchain-based transactions. This includes approval of transactions prior to the transaction being written to the blockchain. A transaction system can register with a transaction manager, such as a cloud-based or cloud transaction manager, which can maintain a queue of pending transactions and provide approval for transactions in real-time or near real-time, while later verifying the pending transactions are written into the blockchain as expected. This allows the transaction system to securely confirm the transaction is approved prior to the transaction being written in the blockchain, based on a real-time or near real-time analysis of each customer's corresponding account and transactions.
COMPUTER-BASED INFORMATION MANAGEMENT SYSTEM CONFIGURED FOR AUTOMATED AND DYNAMIC ACCOUNT ANALYSIS AND METHODS THEREOF
Systems and methods of the present disclosure enable user-level activity recordation using population level activity data by receiving operator data including a record of activities performed by users on an operator system. Each entry in the record of activities is parsed to form structured activity entries representing each activity executed on the operator system. Each entry in the record of activities is matched to an individual account in an account database based on an individual identifier of each entry and an account individual identifier identifying the individual account. A statistical metric representing the activity history of the individual account is produced based on each entry matched to the individual account, and an activity history dashboard is displayed on an operator computing device to depicts the statistical metric for the individual account.
SYSTEM AND METHOD FOR PROCESSING DIGITAL COUPONS
A processor is programmed with instructions to receive coupon data from a program creator. The coupon data defines a coupon and/or coupon program. The processor creates a first unique coupon program ID for the coupon data and writes the first unique coupon program ID and the coupon data to a database table. The processor transmits the first unique coupon program ID to the program creator. The processor also receives, from a user computing device, a coupon request message. The coupon request message includes a second unique coupon program ID. The processor extracts the second unique coupon program ID, retrieves the first unique coupon program ID, and matches the second unique coupon program ID to the first unique coupon program ID. Based on the matching, the processor generates a digital coupon token and transmits the digital coupon token to the user computing device via the communications interface.
METHOD AND SYSTEM FOR IDENTIFYING A COMPROMISED POINT-OF-SALE TERMINAL NETWORK
A method and a system for identifying a compromised Point-of-Sale (POS) terminal network are provided. The method comprises: receiving identifiers of a plurality of compromised geographical areas identifying, in a given compromised geographical area of the plurality of compromised geographical areas, at least one respective POS terminal network of a plurality of POS terminal networks; determining, for the at least one respective POS terminal network, a plurality of compromise parameters; determining, based on the plurality of compromise parameters, a respective compromise probability value for the at least one respective POS terminal network; ranking, by the processor, the plurality of POS terminal networks according to respective compromise probability values associated therewith; and determining a top-ranked POS terminal network as being the compromised POS terminal network
SYSTEMS AND METHODS FOR MITIGATING FRAUD BASED ON GEOFENCING
A device may receive, from a user device associated with a user and located at a location, a request to access a service, and may provide, based on the request, an authorization request to an authentication system. The device may receive an authorization code from the authentication system, and may request an access token from an authorization system. The device may receive the access token, and may request user information from the authorization system. The device may receive the user information, a first confidence score, and a second confidence score, and may perform a geofence analysis of the location to generate a third confidence score. The device may determine whether the request is genuine or fraudulent based on the user information, the first confidence score, the second confidence score, and the third confidence score, and may approve or deny the request based on whether the request is genuine or fraudulent.
PUSH NOTIFICATIONS AND ADDRESS RISKING
A method of fraud risk assessment, comprising: receiving labeled data that includes address information for one or more addresses and labels corresponding to the one or more addresses; training an address risk machine learning model capable of predicting a risk of fraud for an address by determining relationships among the labeled data; and determining, using the address risk machine learning model, an address risk score of a first address of the one or more addresses based on the labeled data of the first address.