Abstract:
The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a rules authority of the secured blockchain-based ledger may obtain data indicative of an initiated transfer of funds between parties, and may access and decrypt a set of restrictions imposed on the initiated transfer and a set of rules associated with the restrictions, which may hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may determine that the initiated transfer violates at least one of the restrictions, and may perform operations consistent with at least one of the rules associated with the at least one violated restriction.
Abstract:
The disclosed embodiments include computerized methods and systems that automatically verify an identity of a user based on social media messaging. In an embodiment, an apparatus identifies a first social media message associated with a social networking account of a user and generated by a device of the user. The apparatus may generate may extract authentication data from the first social media message, and may verify an identity of the user based on a correspondence between the extracted authentication data and at least a portion of stored user profile. In response to the verification, the apparatus may generate one or more electronic commands to initiate an action involving one or more securities.
Abstract:
A method for managing transfer of data over a network to a recipient system is disclosed. The method is implemented at a database management system that stores a schedule of data transfers associated with records in a database. The method includes: receiving a signal representing an electronic message from a third party system, the electronic message including details of a first scheduled data transfer to a first record in the database at a first transfer time; obtaining details of a second scheduled data transfer from the first record to the recipient system; determining that an effect on the first record by the first and second scheduled data transfers meets stored predefined criteria; updating the schedule of data transfers to change a second transfer time associated with the second scheduled data transfer; and initiating the second scheduled data transfer according to the updated schedule of data transfers.
Abstract:
The disclosed embodiments include computer-implemented systems and processes that perform operations consistent with services provisioned to a device based on real-time sensor data indicative of and characterizing a user's operation of the device and additionally or alternatively, a system or apparatus that includes the device. For example, the device may obtain stored data identifying a provisioned service, and may obtain sensor data captured by an on-board or external sensor during an operation of the device. Based on the sensor data, the device may generate a usage parameter that characterizes the operation of the device during a temporal period, and perform an operation consistent with the provisioned service in accordance with the generated usage parameter.
Abstract:
An apparatus for use in a digital messaging system includes a storage device and a processor coupled to the storage device. The storage device storing software instructions for controlling the processor that when executed by the processor configured the processor to: generate a master private and public key pair; associate the master private and public key pair with a first certificate; and derive at least one domain-specific key from the one of the master private and public key pair. The first certificate is registered to a group comprising a plurality of domains. The domain-specific key is associated with one of the plurality of domains.
Abstract:
A method and system are provided for processing an interaction request. The method includes detecting the interaction request in a first interaction session using a first interaction channel between a request initiator and a request service provider, assigning an identifier to the interaction request, determining a task associated with the interaction request, and obtaining context data of a plurality of other interaction sessions associated with the identifier. The plurality of other interaction sessions occurs proximal in time with the first interaction session. The context data is related to activity of the request initiator. The method also includes associating a subset of the context data with the interaction request. The subset of the context data is the context data of the plurality of other interaction sessions that are related to the task. The method also includes generating an interaction response using the subset of the context data.
Abstract:
Methods and electronic systems for managing data transfer timing in a database are described. An electronic system includes a communication interface, a memory, and a processor coupled with the memory and the communication interface. The processor is configured to receive a signal representing an electronic message from a third party system. The electronic message notifies the electronic system of a first scheduled data transfer to a database managed by the electronic system and including a first transfer time in the future and value change information that affects a value of the database. In response to receipt of the electronic message, the processor evaluates a second scheduled data transfer from the database to a recipient at a second transfer time in the future at which at least a portion of the value is expected to be transferred to the recipient.
Abstract:
The disclosed embodiments include computerized methods and systems for authenticating user identity based on non-credentialed information. For example, in response to a request from a device of a user for a service performable by one or more networked computer systems, the disclosed embodiments may identify one or more public and private sources of non-credentialed information. The disclosed embodiments may also transmit messages to devices of the individuals requesting non-credentialed information associated with the user, and based on the received responses, may verify an identity of the user based on at least a portion of the received non-credentialed information. Further, in some aspects, non-credentialed authentication processes consistent with the disclosed embodiments may reduce an ability of malicious parties to attach or hack into the one or more networked computer systems.
Abstract:
Mobile communications devices, systems and methods are provided for identifying a risk of fraudulent activity associated with a merchant before a user executes a transaction with the merchant. In an embodiment, a mobile communications device obtains first information identifying prior instances of fraudulent activity associated with a merchant. The mobile communications device may determine a level of risk of fraudulent activity associated with the merchant based on the obtained first information, and may identify, based on the determined risk level, one or more payment instruments and associated incentives appropriate for financial services transactions involving the merchant. The mobile communications device may present, to a user, a notification including the identified payment instruments and associated incentives prior to execution of a transaction between the user and the merchant.
Abstract:
A system has a storage medium encoded with program instructions, and a processor coupled to access the program instructions. The instructions configure the processor for: receiving a first request at a POS terminal to surrender a previously purchased first asset in exchange for at least a portion of a second asset that was used to purchase the first asset, receiving the private key from the first asset; accessing a set of rules stored in a distributed electronic ledger, the set of rules specifying conditions associated with the first request; transmitting an authorization to return the at least a portion of the second asset in exchange for surrender of the first asset, in the case where the conditions are satisfied; and invalidating the first request in the case where one or more of the conditions are not satisfied.