PHYSICAL MARKER CODING FOR RESOURCE DISTRIBUTION ADJUSTMENT

    公开(公告)号:US20180197031A1

    公开(公告)日:2018-07-12

    申请号:US15404340

    申请日:2017-01-12

    CPC classification number: G06Q20/042 G06K9/00167 G06Q20/40145 G08B21/0297

    Abstract: Embodiments of the invention are directed to systems, methods and computer program products for providing physical marker coding for resource distribution adjustment or duress signaling when using paper resource distribution documents. Paper resource distribution documents have limited amount of multi-factor authentication. Thus, the system provides a system for multi-factor authentication of paper documents for enhancement of the authentication and security of utilizing paper resource distribution documents. Real-time and/or archived bio-data and geo-data are leveraged to validate the authentication of a resource distribution document. The data associated with the resource distribution document presented at a downstream point are used to verify the authentication of the drafting and executing of the resource distribution document.

    Multicomputer Processing of an Event Authentication Request with Centralized Event Orchestration

    公开(公告)号:US20180167390A1

    公开(公告)日:2018-06-14

    申请号:US15372692

    申请日:2016-12-08

    Abstract: Aspects of the disclosure relate to multicomputer processing of an event authentication request with centralized event orchestration. A computing platform may receive a request to authenticate an event. Subsequently, the computing platform may generate a first authentication dataset and receive a second authentication dataset. Then, the computing platform may calculate unauthorized access likelihood scores based on the first and second authentication datasets. Thereafter, the computing platform may calculate an event security score based on the unauthorized access likelihood scores. Subsequently, the computing platform may generate first event authentication commands. Next, the computing platform may send the first event authentication commands to an unauthorized access computing device. Then, the computing platform may receive a result of an unauthorized access analysis. Subsequently, the computing platform may generate, based on the result of the unauthorized access analysis, second event authentication commands. Thereafter, the computing platform may send the second event authentication commands.

    REAL-TIME ELECTRONIC EVENT PROCESSING AND IDENTITY VALIDATION SYSTEM

    公开(公告)号:US20180115540A1

    公开(公告)日:2018-04-26

    申请号:US15335009

    申请日:2016-10-26

    Abstract: Disclosed is an event processing and identity validation system. The system typically includes a processor, a memory, and an event processing and identity validation module stored in the memory. The system is typically configured for: validating a set of identity information for each profile of a set of profiles, receiving an event request comprising user identifying information, comparing the user identifying information with the sets of identity information of the set of profiles to determine a matching profile, processing the event request by generating an authentication code, notifying the user of the event request, determining that a device of the user is within a defined distance of an authentication location and automatically transmitting the generated authentication code to the device of the user, receiving a key code from a computing device, and determining a match between the key code and the authentication code to complete the event request.

    PARTIALLY COMPLETED RESOURCE GEOGRAPHIC TRIGGERING AND REMEDIATION SYSTEM

    公开(公告)号:US20180089680A1

    公开(公告)日:2018-03-29

    申请号:US15279105

    申请日:2016-09-28

    Abstract: Embodiments enable a remediation of a processing error by recognizing occurrence of the processing error, identifying one or more triggering events and, in response to the triggering event(s), remediating the processing error. This may be done by re-initiating the partially completed processing action from a partially completed position. Thus, embodiments monitor failed resource usage and remediate the failure by determining that the user attempted to use a resource to perform an action associated with a third party, determining that the attempt to use the resource to perform the action failed, determining a physical resource type related to the action, determining one or more physical locations at which the physical resource type is represented, providing information regarding the one or more physical locations to the user and expediting a second attempt to perform the action.

    SYSTEM FOR EXTERNAL SECURE ACCESS TO PROCESS DATA NETWORK

    公开(公告)号:US20170243215A1

    公开(公告)日:2017-08-24

    申请号:US15050379

    申请日:2016-02-22

    Abstract: A closed-loop system is operatively connected with a block chain distributed network for using the block chain distributed network for facilitating operation of a transaction record sharing system. Host and source institutions function to supply a consolidated transaction record to a user in response to a request from a user to the host institution. The request is determined to meet a condition of the block chain thereby verifying the request. The verified request for a transaction record is transmitted to at least one source institution. The transaction record of the source institution is accessed by the host institution. A consolidated transaction record is communicated to the user based on the transaction record.

Patent Agency Ranking