Abstract:
A system for facilitating offline processing of electronic transactions at an ATM when the ATM does not support a network connection may be provided. The system may include a mobile device configured to store an updatable account balance of a personal account associated with a user of the mobile device and transaction data associated with a plurality of transactions executed via the mobile device. The system may include the ATM being configured to operate in an offline processing mode when the network connection is unsupported. The offline processing mode may include the ATM receiving a transaction request and account data from the mobile device. The ATM may be configured to authenticate or deny the executing of the transaction request based on a predetermined threshold of transaction locations positioned at a distance greater than or less than a pre-determined distance from the ATM.
Abstract:
Embodiments of the present invention provide systems and methods for authentication of users and authorization of user actions, and distribution or transfer of resources based on multi-channel input via a user device or one or more auxiliary user devices, such as smart home devices. The system is further configured to perform one or more user activities, in an integrated manner, within a single interface of the user device, without requiring the user to operate disparate applications. Furthermore, the system is configured to receive user input through multiple communication channels such as a textual communication channel and an audio communication channel and store unique user patterns to form an authentication baseline for subsequent user communications.
Abstract:
A system includes a memory and a processor. The memory may store a customer account associated with a customer and an enterprise account associated with an enterprise. The processor may be communicatively coupled to the memory and may cause the system to receive a request to deposit a first amount of a cryptocurrency in the customer account from the customer. The processor may also cause the system to determine a public key associated with the customer account and receive the first amount of the cryptocurrency. The processor may further cause the system to determine a first value approximately equivalent to the first amount of cryptocurrency and associate the first value with the customer account. The processor is further able to aggregate the first amount of cryptocurrency with an aggregated amount of the cryptocurrency in the enterprise account and facilitate securing the public key in the enterprise account.
Abstract:
A system for authorizing an electronic transaction in an augmented reality environment comprises an augmented reality user device and an authentication server. The augmented reality user device includes a display that overlays virtual objects onto a field of view of the user. The user device receives a request to verify information about a payment card used in an electronic transaction. The request includes a virtual authentication object, which is a virtual representation of an object capable of being manipulated by the user in a particular sequence to enter an authentication code. The user device displays the virtual authentication object to the user and detects gestures performed on the virtual authentication object. The user device sends the detected gestures to the authentication server. The authentication server determines the authentication code using the virtual authentication object and the detected gestures, and uses it to authorize the transaction.
Abstract:
The system includes a memory and a processor. The memory may store a customer profile associated with a customer. The processor may be communicatively coupled to the memory and may receive a request from the customer to perform a cryptocurrency transaction with a third party. The processor may calculate a risk score for the cryptocurrency transaction and determine a number of required validations to confirm the cryptocurrency transaction based at least in part upon the risk score. The processor may further receive a number of validations from a plurality of miners and compare the number of received validations to the number of required validations. The processor is further able to determine whether the number of received validations complies with the number of required validations.
Abstract:
The system includes a memory and a processor. The memory may store user profiles of an enterprise. The processor may be communicatively coupled to the memory and may receive a request from a user to perform a cryptocurrency transaction with a third party. The processor may retrieve block chain information associated with the cryptocurrency transaction and determine whether one of the user profiles is associated with the user based on the retrieved block chain information and a stored cryptoidentifier associated with one of the user profiles. The processor may further determine whether one of the user profiles is associated with the third party based on the retrieved block chain information and at least one stored cryptoidentifier associated with one of the user profiles. The processor may determine whether the cryptocurrency transaction is suspicious based on the associated user profile and communicate an alert to the enterprise.
Abstract:
A system may include a memory and processor. The processor may be configured to receive an electronic request to store a private key associated with a cryptocurrency. The processor may also be configured to generate a first vault key based at least in part upon the private key and generate a second vault key based at least in part upon the private key. The processor may also be able to facilitate the storage of the first vault key at a first data center and facilitate the storage of the second vault key at a second data center.
Abstract:
A system comprises a memory operable to store a set of conversion rules. The system also comprises a processor communicatively coupled to the memory. The processor is able to receive an electronic request for a cryptocurrency conversion requesting a conversion of a first currency into a second currency, wherein the second currency is a cryptocurrency. The processor is further able to retrieve price data associated with the first and second currencies and determine whether the conversion is optimal. In response to determining the conversion is optimal, the processor determines a plurality of exchange rates associated with converting the first currency into the second currency and determines an optimal exchange rate of the plurality of exchange rates. The processor is further able to initiate, essentially simultaneously as the determination that the conversion is optimal, converting the first currency into the second currency.
Abstract:
A method for facilitating electronic transactions between a first mobile device and a second mobile device is provided. At a central server, when internet connection is established, the method may include receiving transaction data and prior to processing an electronic transaction based on the transaction data, verifying the electronic transaction. The verifying may include retrieving a first activity log from the first mobile device and a first browser timeout history. The method may further include retrieving from the second mobile device a second activity log and a second browser timeout history. The method may further include verifying that a first mobile application was active when a browser on the first mobile device was in timeout and that a second mobile application was active when a browser on the second mobile device was in timeout.
Abstract:
A system includes a memory associated with a first virtual environment that stores data objects associated with a user. The memory is coupled to a processor configured to receive a user credential associated with the user and authorize the user to access the first virtual environment. The processor receives a request from the user to enter a second virtual environment accessible through the first virtual environment and generates a virtual pass for a first avatar of the user to enter the second virtual environment. The processor receives a request to perform a transfer of a selected amount of a first type data object and transfers the selected amount of the first type of data object from the memory to the second virtual environment. The processor receives an indication that the transfer is completed and deletes the selected amount of the first type of data object from the memory.