G06Q20/388

Distributed database stored at an edge application

Systems and methods for reducing latency in transactions are described herein. In an embodiment, an application edge acts as a system of record for an application. When a client computing device sends a request to perform a transaction to the application, the application edge receives the request and, without forwarding the request to a backend computing network, searches a transaction datastore stored at the application edge for the account balance and responds to the client computing device with the account balance. The client computing device then determines that a transaction can be performed and sends a request to perform the transaction to the application. The application edge passes this request to the backend computing network which performs the requested transaction. The application edge then uses a webhook infrastructure to update each transaction datastore stored at the application edge.

METHOD AND APPARATUS FOR SUPPORTING TRANSACTIONS OF PRODUCTS
20230042284 · 2023-02-09 ·

Methods and apparatuses for supporting transactions of products are provided. One of the methods comprises, receiving, by a second terminal, information of a seller that is selling the products, from a first terminal, requesting, by the second terminal, verification of the seller's information from a server, in response to successful verification of the seller's information, acquiring, by the second terminal, a transaction identifier for the products from the server, measuring, by the second terminal, a distance from the first terminal creating, by the second terminal, transaction data including the measured distance and the transaction identifier, requesting, by the second terminal, verification of the transaction data from the server and in response to receiving a message indicating successful verification of the transaction data from the server, performing, by the second terminal, a payment routine for the products.

Smartglasses-to-smartglasses payment systems
11556912 · 2023-01-17 · ·

Methods for smartglasses-to-smartglasses payment systems is provided. Methods include receiving a transfer of funds initiation at a first smartglasses. The transfer of funds initiation may include an identifier, an amount and a personal identification number (“PIN”). Methods include transmitting the transfer of funds initiation from the first smartglasses to a second smartglasses. Methods may include receiving a notification on the second smartglasses. The notification may include a first smartglasses telephone number and the transfer of funds initiation. Methods may include transmitting a transfer of funds request from the second smartglasses to an entity. The transfer of funds request may include the first smartglasses telephone number, the transfer of funds initiation and the second smartglasses telephone number. Methods may include retrieving a first account and a second account from the entity. Methods may include transferring funds from the first account to the second account.

Static Authentication Questions for Account Authentication

Methods, systems, and apparatuses are described herein for improving computer authentication processes using static authentication questions with answers that change based on user account information. A request for access to an account may be received. A static question may be received. The static question may comprise one or more prompts and a plurality of different predetermined answers. Transaction data may be received. Based on the transaction data, a portion of the plurality of different predetermined answers may that correspond to correct answers may be determined. The question may be presented to a user, and a candidate response may be received. Access to the account may be provided based on the candidate response.

METHOD AND SYSTEM, DEVICE AND PAYMENT TERMINAL USING PERSONAL DATA
20230004965 · 2023-01-05 ·

The invention relates to an electronic transaction method for a system comprising a user-associated payment device 3 or 4 and a payment terminal 1. The payment device 3 or 4 and the payment terminal 1 perform a cryptographic key exchange 500 before performing a transaction step 501. The payment device includes personal information PI about the user. The payment terminal includes a transaction policy including a condition relative to the personal information Pi. The method includes a verification step 510, 520, 530, prior to the transaction step 501, for securely verifying the condition of the transaction policy relative to the personal information using the cryptographic key.

Voice Payment Method and Electronic Device
20230021413 · 2023-01-26 ·

A voice payment method and an electronic device are provided. The method includes: A first electronic device receives voice information of a user, where the voice information is used to indicate a payment operation performed by the user; when a voiceprint feature of the voice information meets a preset condition, the first electronic device requests a second electronic device to authenticate the user; the second electronic device prompts the user to perform an authentication process, where the authentication process includes one or more of fingerprint authentication, facial recognition, password authentication, verification code authentication, and near field communication NFC authentication; when authentication performed by the second electronic device on the user succeeds, the second electronic device indicates to the first electronic device that authentication performed by the second electronic device on the user succeeds; and the first electronic device completes the payment operation with a payment platform.

METHOD AND SYSTEM OF BILLING FOR CHARGING A VEHICLE BATTERY LEVERAGING A PRE-ARRANGED PAYMENT METHOD
20230230074 · 2023-07-20 ·

A method and system provided for a single-action with which the customer places an order and receives goods by the single action of connecting an electrical vehicle (EV) to a charging station according to the business terms associated with this invention, the affiliated organizations that purchase or support the operation of the invention participate in a business “franchise” operation whereby all affiliated organizations increase their revenues as the volume of EV charging events increases.

Computer transaction security with delegated decisions

A method for authenticating e-commerce transactions involves receiving, from a payment network computer, a first authentication request message to authenticate a transaction associated with a payment account, the first authentication request message being initiated by an issuer domain computer not implementing a 3-D Secure authorization protocol, determining that the issuer domain computer has configured, at the access control server computer, a decision function of a second portion of the 3-D Secure authorization protocol and in response thereto, transmitting, to the issuer domain computer, a decision request message and information associated with the transaction, the decision request message requesting the issuer domain computer to determine an action for authenticating the transaction based on the information associated with the transaction and one or more programmatic rules of the issuer domain computer, the transmitting occurring in lieu of the access control server computer executing the decision function at the access control server computer.

Consumer controlled portfolio charitable giving system and method
11556965 · 2023-01-17 · ·

A donation facilitation system that can allow a donor, such as a customer, to challenge another entity, such as a provider, to make a provider contribution to a portfolio of multiple charities set up by the donor upon, for example, the purchase of a good or service from the provider. The provided portfolio donation facilitation system can allow the other entity such as a provider to create its own provider portfolio of multiple charities and make a provider contribution to a customer's portfolio of multiple charities when at least one component of the provider's portfolio of multiple charities matches at least one component of the customer's portfolio of charities. The provider makes the contribution to the charity or charities.

Secure authentication based on physically unclonable functions

The invention relates to an electronic device, and more particularly, to systems, devices and methods of authenticating the electronic device using a challenge-response process that is based on a physically unclonable function (PUF). The electronic device comprises a PUF element, a processor and a communication interface. The PUF element generates an input signal based on at least one PUF that has unique physical features affected by manufacturing variability. A challenge-response database, comprising a plurality of challenges and a plurality of corresponding responses, is set forth by the processor based on the PUF-based input and further provided to a trusted entity. During the trusted transaction, the processor generates a response in response to a challenge sent by the trusted entity based on the PUF-based input, and thereby, the trusted entity authenticates the electronic device by comparing the response with the challenge-response database.