Patent classifications
G06Q20/425
Camera activation and image processing for transaction verification
A device may receive first information related to a transaction. The device may identify a first device from which to receive an image of a receipt related to the transaction. The device may provide, to the first device, a notification to cause the first device to perform a set of actions including activating a camera associated with the first device to capture the image of the receipt, or providing, for display, an instruction related to capturing the image of the receipt associated with the transaction. The device may receive, from the first device, the image of the receipt. The device may process the image of the receipt to perform an analysis of the transaction. The device may perform an action related to the transaction based on a result of processing the image of the receipt.
METHOD AND APPARATUS FOR SUPPORTING TRANSACTIONS OF PRODUCTS
Methods and apparatuses for supporting transactions of products are provided. One of the methods comprises, receiving, by a second terminal, information of a seller that is selling the products, from a first terminal, requesting, by the second terminal, verification of the seller's information from a server, in response to successful verification of the seller's information, acquiring, by the second terminal, a transaction identifier for the products from the server, measuring, by the second terminal, a distance from the first terminal creating, by the second terminal, transaction data including the measured distance and the transaction identifier, requesting, by the second terminal, verification of the transaction data from the server and in response to receiving a message indicating successful verification of the transaction data from the server, performing, by the second terminal, a payment routine for the products.
SECURE AUTHENTICATION SYSTEM AND METHOD
Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a computer with a verification token associated with a computer can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation entity. The control server can validate the secure datum and authentication data and can generate a payer authentication response.
System and method for establishing and managing inter-institution transaction system
Disclosed is a method of establishing and managing an inter-institution transaction system. The method comprises creating plurality of threads to constitute parallel fund transfer system, wherein each thread is a replica of single fund transfer system, and wherein plurality of threads are to be operated in parallel; assigning plurality of institutions to plurality of threads, wherein a given institution is assigned as a sending institution and/or a receiving institution of a financial transaction to at least one thread, and a given thread has at least one sending institution-receiving institution pair assigned thereto; assigning financial transactions to plurality of threads based at least on sending institution-receiving institution pairs assigned to plurality of threads; and processing financial transactions at their corresponding threads.
Cloud-based virtual wallet NFC apparatuses, methods and systems
The CLOUD-BASED VIRTUAL WALLET NFC APPARATUSES, METHODS AND SYSTEMS (“EAE”) transform user enhanced security transaction initiation requests using EAE components into time-limited, session-specific transaction bounding tokens. In some implementations, the disclosure provides a processor-implemented method of transforming a transaction bounding token request into transaction bounded tokens and purchase authorizations.
Voice Payment Method and Electronic Device
A voice payment method and an electronic device are provided. The method includes: A first electronic device receives voice information of a user, where the voice information is used to indicate a payment operation performed by the user; when a voiceprint feature of the voice information meets a preset condition, the first electronic device requests a second electronic device to authenticate the user; the second electronic device prompts the user to perform an authentication process, where the authentication process includes one or more of fingerprint authentication, facial recognition, password authentication, verification code authentication, and near field communication NFC authentication; when authentication performed by the second electronic device on the user succeeds, the second electronic device indicates to the first electronic device that authentication performed by the second electronic device on the user succeeds; and the first electronic device completes the payment operation with a payment platform.
REMOVING DUPLICATE TRANSACTIONS FROM A TRANSACTION EXCHANGE PLATFORM
Aspects described herein may relate to a transaction exchange platform using a streaming data platform (SDP) and microservices to process transactions according to review and approval workflows. The transaction exchange platform may receive transactions from origination sources, which may be added to the SDP as transaction objects. As the transactions are received, the transactions may be analyzed to detect duplicate transactions and/or errors in the transactions. The transaction exchange platform may take steps to remediate transactions that are recognized as duplicates or predicted to generate one or more errors. Similarly, the transaction exchange platform may take steps to remediate transactions that are rejected by a clearinghouse.
WATCHDOG MICROSERVICE TO RESOLVE LOCKS WHEN PROCESSING FAILS ON A TRANSACTION EXCHANGE PLATFORM
Aspects described herein may relate to a transaction exchange platform using a streaming data platform (SDP) and microservices to process transactions according to review and approval workflows. The transaction exchange platform may receive transactions from origination sources, which may be added to the SDP as transaction objects. As the transactions are processed, the transactions may require access to a resource (e.g., a key value in a database). A microservice processing the transaction may request, from a locking microservice, a lock for the resource. The locking microservice may query a local cache to determine whether a lock exists for the resource. If the local cache determines that no lock exists for resource, the locking mechanism may employ a consensus protocol to obtain a lock for the resource from a plurality of clusters. If consensus is reached, a lock for the resource may be granted to the requesting microservice.
CONSENSUS KEY LOCKING WITH FAST LOCAL STORAGE FOR IDEMPOTENT TRANSACTIONS
Aspects described herein may relate to a transaction exchange platform using a streaming data platform (SDP) and microservices to process transactions according to review and approval workflows. The transaction exchange platform may receive transactions from origination sources, which may be added to the SDP as transaction objects. As the transactions are processed, the transactions may require access to a resource (e.g., a key value in a database). A microservice processing the transaction may request, from a locking microservice, a lock for the resource. The locking microservice may query a local cache to determine whether a lock exists for the resource. If the local cache determines that no lock exists for resource, the locking mechanism may employ a consensus protocol to obtain a lock for the resource from a plurality of clusters. If consensus is reached, a lock for the resource may be granted to the requesting microservice.
Security authentication system for membership login of online website and method thereof
A security authentication system for a website provides a safe login without having to directly enter an ID and a password on a user device requesting login to the website. A first user device receives one-time use authentication information from a second user device after the second user device received the one-time use authentication information from an authentication server without the authentication server receiving user login authentication information from the second user device. A request is transmitted to the authentication server based on the one-time use authentication information and the user login authentication information. In response to the request, one-time password (OTP) information is received from the authentication server. The OTP information is presented by the first user device, such that the OTP information can be entered into the second user device and used in a request to log in to the website.