Patent classifications
H04L2463/102
Multi-Party Exchange Platform
Arrangements for providing multi-party exchange functions are provided. In some aspects, a request for exchange may be received by a computing platform. The request for exchange may include identification of parties involved in the exchange, identification of goods, services, property, or the like, involved in the exchange, and the like. In some examples, the computing platform may determine a value of property, goods, or services associated with the exchange. The computing platform may request additional exchange data from one or more other parties. For instance, data associated with the exchange and another party to the exchange may be requested and received. In some examples, unique exchange identifiers may be generated linking each party to the exchange to the goods, services or property being exchange, a value, or the like. An indication of acceptance may be received and one or more exchange processing functions may be executed.
ACCESS CONTROL TOWER
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information.
Computer transaction security with delegated decisions
A method for authenticating e-commerce transactions involves receiving, from a payment network computer, a first authentication request message to authenticate a transaction associated with a payment account, the first authentication request message being initiated by an issuer domain computer not implementing a 3-D Secure authorization protocol, determining that the issuer domain computer has configured, at the access control server computer, a decision function of a second portion of the 3-D Secure authorization protocol and in response thereto, transmitting, to the issuer domain computer, a decision request message and information associated with the transaction, the decision request message requesting the issuer domain computer to determine an action for authenticating the transaction based on the information associated with the transaction and one or more programmatic rules of the issuer domain computer, the transmitting occurring in lieu of the access control server computer executing the decision function at the access control server computer.
SYSTEMS AND METHODS FOR ENCRYPTION AND DECRYPTION SERVICE FOR ELECTRONIC TRANSACTION MONITORING AND REPORTING
A method for electronic transaction monitoring and reporting includes: determining whether the received transaction request is encrypted, upon determining that the received transaction request is not encrypted, sending a failure alert to the merchant, determining a receiving acquirer processor for the transaction request, and transmitting the transaction request to the determined acquirer processor.
Systems and methods for monitoring and analyzing financial transactions on public distributed ledgers for suspicious and/or criminal activity
Systems and methods configured for monitoring and analyzing financial transactions on public distributed ledgers for suspicious and/or criminal activity are disclosed. Exemplary implementations may: access public third-party information for addresses involved in financial transactions; correlate a first portion of the public third-party information with transaction addresses; label the financial transactions and/or the addresses according to characteristics, such that individual ones of the addresses either have been labeled or are unlabeled; cluster the financial transactions and/or the addresses into a set of clusters that includes a first cluster; assign levels of risk for suspicious and/or criminal activity to the addresses and the financial transactions; and responsive to comparisons of levels of risk with a threshold, report transactions for suspicious and/or criminal activity.
Systems and methods for two-way account onboarding and linking across multiple service providers
Methods and systems for facilitating a two-way user accounts onboarding and linking across multiple service providers are presented. Upon logging in a user device to a first user account of a first service provider, a first user interface associated with the first service provider is provided on the user device. Through the first user interface, a user of the user device may request creating a second user account with a second service provider. The first service provider may then exchange access tokens and refresh tokens with the second service provider to link the first user account with the second user account. After the linking, the first service provider may configure the first user interface to provide the user access to the second user account without requiring the user to log in to the second user account.
A SYSTEM FOR DIGITAL ASSET EXCHANGE, A DIGITAL WALLET AND AN ARCHITECTURE FOR EXCHANGING DIGITAL ASSETS
A system for digital asset exchange, a digital wallet and an architecture for exchanging digital assets. The system for digital asset exchange includes an interface arranged to receive digital asset transaction requests from a user; and a gateway arranged to communicate with one or more exchanges to process the digital asset transaction requests.
KEY-VALUE MAP COMMITMENTS SYSTEM AND METHOD
A method includes a validation computer receiving an authorization request message comprising a user state and a user proof from a user device. The user state comprises first and second user state elements. The user proof comprises first, second, and third user proof elements. The validation computer computes a first verification value by multiplying the first user proof element raised to the power of the second user state element, and the second user proof element raised to the power of the first user state element. The computer computes a second verification value by raising the second user proof element to the power of the second user state element. The computer compares the first verification value to a first accumulated state element of an accumulated state. The compares the second verification value to a second accumulated state element. The validation computer authorizes the authorization request message based on the comparison steps.
EXPONENTIALLY SMOOTHED CATEGORICAL ENCODING TO CONTROL ACCESS TO A NETWORK RESOURCE
In an example of a method described herein, historical events occurring over a network are detected, and at least one of the historical events is associated with an observed value of a categorical variable. A numerical aggregate value representing the observed value is updated by applying an exponential smoothing function to (i) a prior numerical aggregate value representing prior historical events associated with the observed value and (ii) a count of the historical events associated with the observed value. An event occurring over the network is detected and is associated with the observed value. Features are extracted from the event, where the features include an encoded feature based on the numerical aggregate value to represent the observed value. A predictive model is applied to the features to determine a score representing likelihood of an outcome. Based on the score, access to a resource of the network is controlled.
Security attack detections for transactions in electronic payment processing networks
Systems, apparatuses, methods, and computer-readable media are provided for detecting security attacks based on transaction flow graphs. Other embodiments may be described and/or claimed.