H04L63/08

SYSTEMS AND METHODS FOR PROCESSING REQUESTS FOR REAL-TIME TRANSFERS OF RESOURCES

A computer-implemented method is disclosed. The method includes: receiving transfer parameters associated with a request for a first transfer of resources, the transfer parameters including an identifier of a designated transferor associated with the first transfer; determining that the transferor is eligible to access at least one protected data source based on the transfer parameters; generating a request message for the request including reference data for accessing the at least one protected data source; and providing, to a computing device associated with the transferor, the request message.

REMOTE DEVICE LINKAGE FOR SECURE COMMUNICATIONS

Embodiments of the present invention provide a system for facilitating a secure way to allow primary users and secondary users to perform interactions remotely via an automated machine, such as an automated teller machine (ATM). In particular, the system may assign exclusive control over an automated device to a primary user via a computing device connected to the same local network or virtual private network as the automated machine, and may allow the primary user to communicate via the automated machine with a secondary user who wishes to complete one or more resource interactions. In some embodiments, the system may invoke one or more auxiliary devices on the same network to complete the interaction.

IMAGE PROCESSING SYSTEM USING AUTHENTICATION INFORMATION ACQUIRED THROUGH TWO-FACTOR AUTHENTICATION, METHOD FOR CONTROLLING IMAGE PROCESSING SYSTEM, AND STORAGE MEDIUM
20230050211 · 2023-02-16 ·

To control an image forming apparatus using a service on a network, an information terminal performs two-factor authentication and acquires authentication information through the two-factor authentication so that the image forming apparatus accesses the service.

SYSTEMS, METHODS, AND DEVICES FOR GENERATING CRYPTOCURRENCY BASED ON CARBON DIOXIDE EMISSIONS
20230049748 · 2023-02-16 ·

A computer-based system collects data associated with a user activity. The data is transmitted from an app running on a computing device with a user account authenticated by the computer-based system. A carbon footprint of the user activity is calculated based on the data associated with the user activity. The system calculates a proof of environmental impact in response to a function of the carbon footprint and a baseline value. An amount of cryptocurrency is generated based on the proof of environmental impact by writing a transaction for the amount of cryptocurrency to a blockchain in response to proof of environmental impact. The amount of cryptocurrency is assigned to the user account authenticated with the computer-based system.

ENHANCED USER AUTHENTICATION SYSTEM AND METHOD
20230047380 · 2023-02-16 · ·

Systems and methods are provided to utilize information from a directory service to determine, at a layer-one network policy server, the appropriate layer-two network policy server to which an authentication request should be routed. For example, a first directory service group may be created that includes all users using a first authentication type, a second directory service group may be created that includes all users using a second authentication type, etc. The layer-one network policy server may periodically synchronize with the directory service to download information about users in the different directory service groups, update a markup language document with that information, and use the markup language document to help route incoming authentication requests to the correct layer-two network policy server for a particular authentication type. In addition, a priority may be set (and changed) by an administrator favoring one or more authentication types in a network.

SELECTING COMMUNICATION SCHEMES BASED ON MACHINE LEARNING MODEL PREDICTIONS

In some implementations, a prediction and monitoring system may processing, using a machine learning model, account data associated with an account that is associated with a user of a user device to identify a series of recurring events associated with the user device. The prediction and monitoring system may generate, using the machine learning model, a predicted transaction date and a predicted transaction amount that are both associated with the series of recurring events. The prediction and monitoring system may select, based on additional account data associated with the account and at least one of the predicted transaction date or the predicted transaction amount, a particular communication scheme, of a plurality of communication schemes, for communicating with the user. The prediction and monitoring system may transmit at least one message according to the particular communication scheme to facilitate authentication of the user.

Modifying security state with secured range detection

Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.

Aggregation platform permissions
11582224 · 2023-02-14 · ·

Apparatuses, systems, methods, and computer program products are presented for aggregation platform permissions. A hardware computing device is configured to aggregate a user's data from a first plurality of third-party service providers over a data network for the user to access through a second plurality of third-party service providers, the hardware computing device comprising a trusted intermediary between the first plurality of third-party service providers and the second plurality of third-party service providers. A permissions module is configured to monitor which of a second plurality of third-party service providers have access to which portions of data from which of a first plurality of third-party service providers. A graphical user interface is configured to display one or more user interface elements allowing a user to grant and/or revoke access to portions of data from a first plurality of third-party service providers individually to a second plurality of third-party service providers.

Store system, information processing apparatus, and information processing method therefor
11580566 · 2023-02-14 · ·

In accordance with an embodiment, an information processing apparatus acquires a rank of a visiting user and an amount according to the ranking. The information processing apparatus acquires a price at an own store of a commodity that the user has selected for purchase. The information processing apparatus acquires a price at another store of the commodity that the user has selected for purchase. In a case in which the price at the own store is higher than the price at the other store, the information processing apparatus adds an amount based on a difference in price therebetween to the amount according to the ranking, which is acquired by a first acquisition means.

Securing an injection of a workload into a virtual network hosted by a cloud-based platform

The disclosed system implements techniques to secure communications for injecting a workload (e.g., a container) into a virtual network hosted by a cloud-based platform. Based on a delegation instruction received from a tenant, a virtual network of the tenant can connect to and execute a workload via a virtual machine that is part of a virtual network that belongs to a resource provider. To secure calls and authorize access to the tenant's virtual network, authentication information provided with a call from the virtual network of the resource provider may need to match authorization information made available via a publication service of the cloud-based platform. Additionally or alternatively, an identifier of a NIC used to make a call may need to correspond to a registered name of the resource provider for the call to be authorized. These checks provide increased security by preventing unauthorized calls to the tenant's virtual network.