G06Q20/4014

SYSTEMS AND METHODS FOR CONTINUOUS USER AUTHENTICATION
20230052407 · 2023-02-16 ·

A computer device configured to passively authenticate a user includes a memory device including a user profile, and at least one processor coupled to the memory device. The at least one processor is programmed to execute a passive authentication system programmed to receive an indication that the user successfully performed an active authentication by interacting with the computing device, and set an authentication state of the user as authenticated in response to the successful active authentication. The passive authentication system is further programmed to receive a first plurality of interaction data indicative of one or more interactions between the user and the computer device, the one or more interactions performed after the indication of the successful active authentication; compare the one or more interactions to the user profile; and update the authentication state of the user based on the comparison.

SYSTEMS AND METHODS FOR INTELLIGENT STEP-UP FOR ACCESS CONTROL SYSTEMS
20230052965 · 2023-02-16 ·

Some embodiments may provide systems, methods and computer program code to method to facilitate an interaction involving a user which include determining that a user authentication is required to complete the interaction, identifying at least a first verified device associated with the user, and transmitting an authentication message to the at least first verified device.

SYSTEMS AND METHODS FOR PROCESSING REQUESTS FOR REAL-TIME TRANSFERS OF RESOURCES

A computer-implemented method is disclosed. The method includes: receiving transfer parameters associated with a request for a first transfer of resources, the transfer parameters including an identifier of a designated transferor associated with the first transfer; determining that the transferor is eligible to access at least one protected data source based on the transfer parameters; generating a request message for the request including reference data for accessing the at least one protected data source; and providing, to a computing device associated with the transferor, the request message.

SERVER SYSTEMS AND METHODS FOR VALUING BLOCKCHAIN TOKENS BASED ON ORGANIZATIONAL PERFORMANCE
20230050782 · 2023-02-16 ·

A system for assigning value to a digital asset is disclosed. In some embodiments, the system is configured to link the monetary valuation for a digital asset to a sport team's performance. In some embodiments, the monetary valuation for a digital asset associated with a sport team can increase or decrease based on historical performance or live performance. In some embodiments, the system includes a dashboard that displays various sport teams and the value of associated digital assets. In some embodiments, the system includes functionality that allows a user to buy, sell, and/or trade digital assets associated with a sports team. In some embodiments, the system includes a digital wallet configured to store the digital asset and/or a crypto key that enables access to the digital asset on a blockchain. In some embodiments, the digital asset is a digital token or a digital coin.

SYSTEM AND METHODS FOR SIMULTANEOUS RESOURCE EVALUATION AND VALIDATION TO AVOID DOWNSTREAM TAMPERING

Systems, methods, and computer program products are provided for validating a deposit request. The method includes receiving a deposit request from a user device. The deposit request includes a deposit transaction information relating to an intended deposit. The method also includes determining a deposit transaction confidence level based on the deposit transaction information. The deposit transaction confidence level indicates a likelihood of the intended deposit being perfected. The method further includes causing a transmission of an audit request to the user device relating to the deposit request upon determining the deposit transaction confidence level is below a confidence level threshold. The audit request includes a request to confirm one or more details relating to the deposit request. The method still further includes determining a deposit determination based on a response to the audit response. The deposit determination indicates whether the intended deposit will be executed.

SYSTEMS, METHODS, AND DEVICES FOR GENERATING CRYPTOCURRENCY BASED ON CARBON DIOXIDE EMISSIONS
20230049748 · 2023-02-16 ·

A computer-based system collects data associated with a user activity. The data is transmitted from an app running on a computing device with a user account authenticated by the computer-based system. A carbon footprint of the user activity is calculated based on the data associated with the user activity. The system calculates a proof of environmental impact in response to a function of the carbon footprint and a baseline value. An amount of cryptocurrency is generated based on the proof of environmental impact by writing a transaction for the amount of cryptocurrency to a blockchain in response to proof of environmental impact. The amount of cryptocurrency is assigned to the user account authenticated with the computer-based system.

Reduced friction for merchant interactions
11580514 · 2023-02-14 · ·

Improvements to existing technologies associated with point-of-sale transactions and merchant ecosystems to, among other things, reduce in-person contact and, in some examples, improve the efficiency at which point-of-sale transactions are completed (i.e., reduce friction) are described. In some examples, such reduced in-person contact and/or improved efficiencies can limit transmission of infectious diseases. As such, techniques described are directed to modifying aspects of point-of-sale transactions such that they occur on different computing devices (e.g., customer computing devices instead of merchant computing devices), are automated, and/or occur at different times than with conventional point-of-sale transactions. Furthermore, in at least one example, techniques described can leverage a distributed, network-based merchant ecosystem—comprising multiple merchant computing devices and/or customer computing devices that are specially configured to communicate with a service provider—to facilitate social distancing, which can reduce in-person contact and, in some examples, improve the efficiency at which point-of-sale transactions are completed.

Disabling mobile payments for lost electronic devices

If a user loses an electronic device that has the capability to conduct financial transactions, the user may report that the electronic device is lost using a lost-device software application to a management electronic device associated with a provider of the electronic device. In response to receiving this information, a disabling command is sent to a payment network associated with the financial account of the user to temporarily disable use of the electronic device to conduct the financial transactions. In particular, the electronic device may include a secure element that stores a payment applet for a financial account, and the disabling command may disable a mapping from a virtual identifier for the financial account to a financial primary account number. Subsequently, if the user finds the electronic device, the user may re-enable the capability (and, thus, the mapping) by providing authentication information to the electronic device.

Methods and systems for controlling access to a protected resource

An electronic device is disclosed. The electronic device includes a memory, a camera module, a communications module, and a processor that is configured to: receive, from the camera module, image data associated with a machine-readable optical label, the optical label encoding transaction details of a transfer of data to a recipient account, wherein the transaction details do not indicate an identity of the recipient account; receive a user input indicating authorization to initiate a transfer of data, via a protected resource, from an account associated with the user to the recipient account; and in response to receiving the user input, generate a request for initiating the transfer of data based on the transaction details, the request including an access token for use in authenticating the user on requests to access the protected resource.

Systems and methods for employing a joystick sequence to authenticate a user

Systems and methods for authenticating identification information are disclosed. For example, a system may include an Automated Teller Machine (ATM). An ATM may comprise a user interface. The user interface may comprise a joystick. The user interface may be configured to receive joystick input from a user. The ATM may comprise at least one memory storing instructions. The ATM may comprise at least one processor configured to execute the instructions to perform operations. The operations may comprise receiving identification information from the user. The operations may comprise receiving the joystick input. The operations may comprise extracting a joystick sequence from the joystick input. When the joystick sequence is within a predetermined threshold from a stored joystick sequence corresponding to the identification information, the operations may comprise authenticating the user for an ATM operation.