Abstract:
The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method for receiving, by one or more processors, a request to establish a first boundary around a first location. The method may also include monitoring, by the one or more processors, one or more triggering devices. The method may also include calculating, by the one or more processors, a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also include detecting, by the one or more processors, whether at least one of the one or more triggering devices is located within the first boundary extent. The method may also include, when the at least one of the one or more triggering devices is detected within the first boundary extent, sending, by the one or more processors, a notification to a client device based on the determining.
Abstract:
The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a centralized authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule. In some aspects, the detected event may correspond to a dispute involving one or more terms or conditions of a contractual agreement between a first party and one or more second parties, and the performed operations may resolve the dispute.
Abstract:
The disclosed embodiments include methods and systems that automatically populate interfaces facilitating electronic transactions. In one embodiment, a system may detect an system-generated event triggering an account transfer transaction. The system may also determine a first account associated with a first user based on the detected event, and determine a second account based on the detected event and a set of rules associated with the first user. The system may generate, based on the detected event and the set of rules, first information used to provide prefilled content identifying the first account as a source account and the determined second account as a destination account. The system may also generate, in response to an authorization, second information used to provide second content including a notification that a transfer of funds from the first account to the second account has occurred.
Abstract:
A method of person-to-person anonymous electronic payment processing may involve a payment processing server receiving from a payor payment device a payment initiation request for a payment from a payor account. The payment initiation request may identify a payment amount and excludes payee particulars and the payee account. The server may also receive from a payee payment device a payment completion request requesting completion of the payment. The payment completion request may include a payee identifier and exclude the payment amount, payor account and payor particulars. The server may confirm that the payment completion request is uniquely associated with the payee payment device and the payee identifier, and determine the payment amount and the payor account by correlating the payment completion request with the payment initiation request. In accordance with an outcome of the confirming, the payment processing server may effect a transfer in the payment amount from the payor account to the payee account.
Abstract:
The disclosed embodiments include computerized systems and methods for generating secured blockchain-based ledger data structures that track occurrences of events across fragmented and geographically dispersed lines-of-business of an enterprise. In one instance, an apparatus associated with a rules authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a disbursement of various rewards to employees in response to customer-specific interactions with the enterprise. The disclosed embodiments provide a rules process for aggregating mutually incompatible enterprise data that specifies the events, and for tracking the events in uniform data structures accessible across the enterprise.
Abstract:
An authorization system includes a database, and at least one computer server in communication with the database. The database includes a plurality of database records, each including an account number and an associated card number. Each card number has fewer digits than the associated account number. The server is configured to receive, from a communications terminal, a request message that initiates a transaction with the server. The server is configured to request an authentication credential from the terminal, and in the database locate the card number that matches the received authentication credential and locate the account number that is associated with the located card number. The server is configured to request authorization of a test transaction using the account number, receive an authorization response confirming authorization of the test transaction, and authorize the initiated transaction in response to the authorization response. The test transaction is different from the initiated transaction.
Abstract:
Mobile communications devices, systems and methods are provided for identifying a risk of fraudulent activity associated with a merchant before a user executes a transaction with the merchant. In an embodiment, a mobile communications device obtains first information identifying prior instances of fraudulent activity associated with a merchant. The mobile communications device may determine a level of risk of fraudulent activity associated with the merchant based on the obtained first information, and may identify, based on the determined risk level, one or more payment instruments and associated incentives appropriate for financial services transactions involving the merchant. The mobile communications device may present, to a user, a notification including the identified payment instruments and associated incentives prior to execution of a transaction between the user and the merchant.
Abstract:
A message processing server includes a message processor and a database of multi-layer tokens. Each token in the database includes a plurality of encrypted data layers. The first layer includes a first data pointer. A primary layer includes the first layer and identifies a reference data value. The message processor receives from a communications device an authentication request identifying a first data value, validates the authentication request from the first data value and the reference data value configured in one of the multi-layer tokens, receives a first authorization message including a first cryptographic key, derives a first decrypted data layer from the first cryptographic key and the first encrypted data layer of the one multi-layer token, and validates the first data pointer by receiving confirmation of the first data pointer pointing to a database entry comprising a second data value less than the reference data value.
Abstract:
The disclosed embodiments include methods and systems for providing account and event status notifications. The disclosed embodiments include, for example, a communications device including a memory storing software instructions and one or more processors configured to execute the software instructions to perform operations. In one aspect, the operations may include receive a notification of a status of an account parameter. The operations may also include identifying a device eligible to access the notification in accordance with a user-specified data restriction, and identifying at least a portion of the notification that is consistent with the data restriction. The communications device provide the identified portion of the notification to the eligible device without receiving input from the user, and the eligible device may present at least one of a visual, audible, or tactile indicator of the status of the account parameter.
Abstract:
The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.