Abstract:
The disclosed embodiments include methods and systems that automatically populate interfaces facilitating electronic transactions. In one embodiment, a system may detect an action of a first user that triggers an account transfer transaction. The system may also determine a first account associated with the first user based on the detected action, and determine a second account based on the detected action and a set of rules associated with the first user. The system may generate, based on the detected event and the set of rules, first information used to provide prefilled content identifying the first account as a source account and the determined second account as a destination account. The system may also generate, in response to an authorization, second information used to provide second content including a notification that a transfer of funds from the first account to the second account has occurred.
Abstract:
An authorization system includes a database, and at least one computer server in communication with the database. The database includes a plurality of database records, each including an account number and an associated card number. Each card number has fewer digits than the associated account number. The server is configured to receive, from a communications terminal, a request message that initiates a transaction with the server. The server is configured to request an authentication credential from the terminal, and in the database locate the card number that matches the received authentication credential and locate the account number that is associated with the located card number. The server is configured to request authorization of a test transaction using the account number, receive an authorization response confirming authorization of the test transaction, and authorize the initiated transaction in response to the authorization response. The test transaction is different from the initiated transaction.
Abstract:
The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method that monitors positional sensor data received from one or more triggering devices. The method may calculate a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also detect an occurrence of a triggering condition that impacts a movement of at least one of a client device or at least one of the triggering devices within a geographic region that includes the first location. In response to the detected triggering event, at least one of modified start time or a second location may be established for the event, which may be provided to the client and triggering devices in a notification.
Abstract:
The disclosed embodiments include computerized methods and systems for authenticating user identity based on non-credentialed information. For example, in response to a request from a device of a user for a service performable by one or more networked computer systems, the disclosed embodiments may identify one or more public and private sources of non-credentialed information. The disclosed embodiments may also transmit messages to devices of the individuals requesting non-credentialed information associated with the user, and based on the received responses, may verify an identity of the user based on at least a portion of the received non-credentialed information. Further, in some aspects, non-credentialed authentication processes consistent with the disclosed embodiments may reduce an ability of malicious parties to attach or hack into the one or more networked computer systems.
Abstract:
Mobile communications devices, systems and methods are provided for identifying a risk of fraudulent activity associated with a merchant before a user executes a transaction with the merchant. In an embodiment, a mobile communications device obtains first information identifying prior instances of fraudulent activity associated with a merchant. The mobile communications device may determine a level of risk of fraudulent activity associated with the merchant based on the obtained first information, and may identify, based on the determined risk level, one or more payment instruments and associated incentives appropriate for financial services transactions involving the merchant. The mobile communications device may present, to a user, a notification including the identified payment instruments and associated incentives prior to execution of a transaction between the user and the merchant.
Abstract:
The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method that monitors positional sensor data received from one or more triggering devices. The method may calculate a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also detect an occurrence of a triggering condition that impacts a movement of at least one of a client device or at least one of the triggering devices within a geographic region that includes the first location. In response to the detected triggering event, at least one of modified start time or a second location may be established for the event, which may be provided to the client and triggering devices in a notification.
Abstract:
The disclosed embodiments include computerized systems and methods for generating secured block-chain-based ledger data structures that track subdivide ownership and usage of one or more assets, such as Internet-connected devices. In one instance, an apparatus associated with a rules authority of the secured block-chain-based ledger may detect an occurrence of a triggering event related to at least one of partial ownership interests in the assets, and may access and decrypt a set of rules hashed into the secured block-chain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a generation of additional data blocks reflecting a change in at least one of the partial ownership interests, and additionally or alternatively, processes that adaptively monitor a compliance of one or more partial owners with an Imposed usage restriction.
Abstract:
The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a rules authority of the secured blockchain-based ledger may obtain data indicative of an initiated transfer of funds between parties, and may access and decrypt a set of restrictions imposed on the initiated transfer and a set of rules associated with the restrictions, which may hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may determine that the initiated transfer violates at least one of the restrictions, and may perform operations consistent with at least one of the rules associated with the at least one violated restriction.
Abstract:
The disclosed embodiments include computerized methods and systems that automatically verify an identity of a user based on social media messaging. In an embodiment, an apparatus identifies a first social media message associated with a social networking account of a user and generated by a device of the user. The apparatus may generate may extract authentication data from the first social media message, and may verify an identity of the user based on a correspondence between the extracted authentication data and at least a portion of stored user profile. In response to the verification, the apparatus may generate one or more electronic commands to initiate an action involving one or more securities.
Abstract:
The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.