Abstract:
According to some embodiments, a system and a method of transmitting identity verification information to a merchant include receiving an account identifier from a user in response to the user interacting with a merchant. The user is authenticated based on the account identifier and identity verification information is transmitted to the merchant.
Abstract:
Intelligent advice and transaction handling systems and methods. An embodiment includes a merchant device, a merchant server computer, a consumer mobile device, and a smart preferences computer having a decision engine operably connected to a storage device. The storage device stores instructions configured to cause the decision engine to receive service call data associated with a purchase transaction, and determine that a cardholder associated with the purchase transaction is a registered smart preferences user. The process includes accessing smart preferences cardholder profile data, determining a recommendation including at least a first choice payment card account and a second choice payment card account, and then transmitting the first choice payment card account data to the merchant device for purchase transaction processing when the cardholder profile data includes a permission indication. However, the recommendation is transmitted to the cardholder device when the permission indication is not found.
Abstract:
According to some embodiments, a system and a method of transmitting identity verification information to a merchant include receiving an account identifier from a user in response to the user interacting with a merchant. The user is authenticated based on the account identifier and identity verification information is transmitted to the merchant.
Abstract:
A computer-implemented method for facilitating a payment transaction wherein a cardholder purchases an item from a merchant on behalf of a buyer is provided. The method includes receiving proposal data from a buyer computing device, wherein the proposal data includes at least one of an identification of an item proposed for purchase, a particular merchant, and a merchant purchase price. The method also includes receiving a selection message from the buyer computing device, wherein the selection message indicates a selected cardholder chosen to purchase the item on behalf of a buyer using a merchant payment card associated with the particular merchant. The method also includes reserving, by the computing device, at least the merchant purchase price and a cardholder processing fee associated with the merchant payment card in a buyer account. The method also includes transferring funds from the buyer account to a selected cardholder account, the funds determined at least in part by the merchant purchase price and the cardholder processing fee.
Abstract:
Various implementations described herein may refer to a compliance platform for use with identity data. In one implementation, a method may include receiving a compliance data package from a user, where the compliance data package includes encrypted evidence data corresponding to digital identity data of the user. The method may also include encrypting the compliance data package using a first cryptographic key. The method may further include generating a user key shard, a requestor key shard, and a regulator key shard based on the first cryptographic key. The method may include generating an unlock data package that includes the requestor key shard and encrypting the unlock data package using a second cryptographic key. The method may also include transmitting the user key shard, the encrypted unlock data package, and the encrypted compliance data package to the user. The method may include transmitting the regulator key shard to a regulator.
Abstract:
Systems and methods are provided for use in monitoring decentralized data structures including identity attributes, through tokenization of the attributes. One example computer-implemented method includes receiving a request associated with a digital identity including multiple attributes and, for each of the attributes in the request, generating a token specific to the attribute, searching for the generated token in a network graph having multiple stored tokens, and identifying one of the multiple stored tokens as a match to the generated token. The computer-implemented method then further includes, for each of the attributes in the request, retrieving additional ones of the multiple stored tokens linked to the identified one of the stored tokens, comparing the retrieved tokens to the generated token, and promoting the request for further action, in response to at least one of the retrieved tokens being inconsistent with the generated token.
Abstract:
Systems and methods are provided for restoring backup data files. One example computer-implemented method includes receiving a restore request including a backup data file having an L1 file, a wrapped L1 key, and an L4 file having an attribute of a user. In response, the method includes unwrapping the L1 key with a private key, decrypting the L1 file via the L1 key, and verifying a sample biometric included in the restore request against a reference biometric from the L1 file. Upon verification of the sample biometric, the method includes decrypting an L2 file of the L1 file, verifying a contact attribute from the L2 file with the user, decrypting an L3 file using the contact attribute, wrapping an L4 key from the L3 file with the public key of the restore request, and transmitting the wrapped L4 key to a mobile device of the user.
Abstract:
Various implementations described herein may refer to a digital rights management (DRM) platform. In one implementation, a method may include receiving first biometric data associated with a user. The method may also include generating first biometric templates based on the first biometric data using a DRM platform. The method may further include receiving access control data from the user, where the access control data includes data indicating time periods during which requestors are permitted to authenticate the user using the first biometric templates. The method may additionally include transmitting the first biometric templates and the access control data to the requestors using the DRM platform, where the first biometric templates are configured to be compared to second biometric templates based on the access control data, and where the second biometric templates are configured to be generated using the DRM platform based on second biometric data associated with the user.
Abstract:
Systems and methods are provided for use in appending log entries to a data structure. One exemplary method includes receiving, at a communication device, a log entry from a terminal and signing the log entry with a private key of a key pair specific to the communication device. The method also includes transmitting the signed log entry to an identity provider (IDP) and receiving, by the communication device, from the IDP, a signed, encrypted log entry. The method further includes verifying, by the communication device, a signature of the signed, encrypted log entry based on a public key associated with a key pair specific to the IDP and then appending the encrypted log entry to a digital identity included in the communication device.