Abstract:
The disclosed embodiments include methods and systems for providing account and event status notifications. The disclosed embodiments include, for example, a communications device including a memory storing software instructions and one or more processors configured to execute the software instructions to perform operations. In one aspect, the operations may include receive a notification of a status of an account parameter. The operations may also include identifying a device eligible to access the notification in accordance with a user-specified data restriction, and identifying at least a portion of the notification that is consistent with the data restriction. The communications device provide the identified portion of the notification to the eligible device without receiving input from the user, and the eligible device may present at least one of a visual, audible, or tactile indicator of the status of the account parameter.
Abstract:
The disclosed embodiments include computerized methods and systems that facilitate two-factor authentication of a user based on a user-defined image and information identifying portions of the image sequentially selected by the user. In one aspect, a communications device presents a first digital image of a first user on a touchscreen display. The communications device may receive, from the first user, information identifying portions of the first digital image selected in accordance with a candidate authentication sequence established by the first user. The selected first image portions may, for example, be associated with corresponding facial features of the first user. The communications device may determine whether the candidate authentication sequence matches a reference authentication sequence associated with the first digital image, and may authenticate an identity of the first user, when the first selection sequence is determined to match the second selection sequence.
Abstract:
The disclosed embodiments include computerized methods and systems that facilitate two-factor authentication of a user based on a user-defined image and information identifying portions of the image sequentially selected by the user. In one aspect, a communications device presents a first digital image of a first user on a touchscreen display. The communications device may receive, from the first user, information identifying portions of the first digital image selected in accordance with a candidate authentication sequence established by the first user. The selected first image portions may, for example, be associated with corresponding facial features of the first user. The communications device may determine whether the candidate authentication sequence matches a reference authentication sequence associated with the first digital image, and may authenticate an identity of the first user, when the first selection sequence is determined to match the second selection sequence.
Abstract:
A message processing server includes a message processor and a database of multi-layer tokens. Each token in the database includes a plurality of encrypted data layers. The first layer includes the second layer and a first pointer. The second layer includes a second pointer. The message processor is configured to receive a first authorization message including a first cryptographic key and a second value; decrypt the first layer of one of the tokens with the first key; validate the first pointer by receiving confirmation of the first pointer pointing to a database entry comprising the second value; receive a second authorization message including a second cryptographic key and a third value; decrypt the second layer of the token with the second key; and validate the second pointer by receiving confirmation of the second pointer pointing to a database entry comprising a maximum data value not less than the third value.
Abstract:
The present disclosure involves systems and computer implemented methods for generating a virtual or augmented reality-based oversight system of business processes at a location remote from where the business process is executed. In one example, system operations include identifying a process-based operation performed at a physical first location, where the operation is associated with a request for oversight from a remote second location. A current state of the operation at the first location is identified, and at least one input source at the first location is identified. A simulation of the current state of the operation at the first location incorporating input from the input source(s) is generated for presentation at the second location. An action performed at the first location in the current state of the operation is identified, and the second location is then transmitted a request to authorize the identified action.
Abstract:
The disclosed embodiments include computerized systems and methods for generating secured blockchain-based ledger data structures that track an ownership and usage of one or more assets, such as Internet-connected devices. In one instance, an apparatus associated with a rules authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a determination of metrics indicative of a care, risk, and/or valuation of one or more of the Internet-connected devices, and additionally or alternatively, a modification of an operational or communicative functionality of the Internet-connected devices.
Abstract:
A method of effecting an incentive transaction involves a computer server receiving a transaction notification message that identifies a financial transaction. The server is in communication with a database of incentive plans, each comprising a plan definition that defines an incentive transaction to be transacted with an incentive account. Each plan is associated with plan participants by participant identifiers. Each participant identifier is uniquely associated with their plan participant. The incentive account is jointly associated with the plurality of plan participants. The notification message includes a product code and the participant identifier of one plan participant. The server identifies an incentive plan applicable to the financial transaction from a correlation with the participant identifier, determines an incentive amount from the product code and the incentive plan definition of the applicable incentive plan, and initiates the incentive transaction for the incentive amount with the incentive account of the applicable incentive plan.
Abstract:
Online reviews present a wealth of information for consumers to consider when making purchase decisions. Consumers however, can be disadvantaged by an inability to determine the usefulness of reviews, the wealth of information thus providing marginal utility. Where consumers can establish an affinity or trust with a reviewer, the usefulness of a review can be vetted against the perspective of the consumer, assisting consumers in making purchase decisions with greater confidence and reliability. Social media further supports consumers by providing a convenient pool of reviewers with whom a consumer may already have pre-existing relationships or familiarity with, bolstering the ability of the consumer to establish an affinity or trust with the reviewer. An adaptive influence process provides a method for consumers to adapt such a collection of reviews, and tailor them to the consumer's own perspective to assist in making purchase decisions with greater confidence.
Abstract:
A system, method and computer program product that is capable of determining respective merchant behaviour scores and consumer behaviour scores. Merchant locations (e.g. point of purchase or other geographic or virtual locations), in association with which merchants and consumers conduct transactions, can be used to enhance behaviour scoring capabilities. A merchant location may be attributed a merchant behaviour score such as one determined in accordance with consumer behaviour/financial/risk metrics of consumers who conduct transactions with the location. A specific consumer may be attributed a consumer behaviour score determined in accordance with the respective merchant behaviour scores of locations with which the specific consumer conducts transactions.
Abstract:
The disclosed embodiments include methods and systems for providing tokenized transaction accounts. In one embodiment, a computer-implemented method is provided that may include generating, by one or more processors, a first tokenized transaction account from a first transaction account associated with a first user. The method may also include providing the first tokenized transaction account to a client device associated with the first user for storage in the client device and use in transactions. The method may also include updating the first tokenized transaction account based on one or more conditions and providing the updated first tokenized transaction account to the client device for storage and use in a subsequent transaction.