SYSTEMS AND METHODS FOR USE IN GENERATING AUDIT LOGS RELATED TO NETWORK PACKETS

    公开(公告)号:WO2023034281A1

    公开(公告)日:2023-03-09

    申请号:PCT/US2022/042010

    申请日:2022-08-30

    Abstract: Systems and methods are provided for generating audit log entries for data packet transactions. One example computer-implemented method includes, in response to a request to share data about a user with a first party, retrieving data identified in the request and generating a transaction ID for the request where the transaction ID is unique to the request to share the data. The method also includes compiling a data packet including at least the transaction ID and the identified data, and generating a signature value for the data packet. The method then further includes transmitting, by the computing device, the data packet to the first party as a transaction and appending an entry to an audit log, which includes the transaction ID and the signature value, but not the identified data.

    DIGITAL RIGHTS MANAGEMENT PLATFORM
    3.
    发明申请

    公开(公告)号:WO2022086711A1

    公开(公告)日:2022-04-28

    申请号:PCT/US2021/053883

    申请日:2021-10-07

    Abstract: Various implementations described herein may refer to a digital rights management (DRM) platform. In one implementation, a method may include receiving first biometric data associated with a user. The method may also include generating first biometric templates based on the first biometric data using a DRM platform. The method may further include receiving access control data from the user, where the access control data includes data indicating time periods during which requestors are permitted to authenticate the user using the first biometric templates. The method may additionally include transmitting the first biometric templates and the access control data to the requestors using the DRM platform, where the first biometric templates are configured to be compared to second biometric templates based on the access control data, and where the second biometric templates are configured to be generated using the DRM platform based on second biometric data associated with the user.

    SYSTEMS AND METHODS FOR USE IN MANAGING COMPLEX USER CREDENTIALS

    公开(公告)号:WO2022186936A1

    公开(公告)日:2022-09-09

    申请号:PCT/US2022/014839

    申请日:2022-02-02

    Abstract: Systems and methods are provided for providing verified claims, based on multiple credentials, to relying parties. One example method includes receiving, by a computing device, a request for identity claims from a relying party. The method also includes, in response to the request, soliciting an authentication input from the user, authenticating the user based on the authentication input received from the user at the computing device, and, in response to authentication of the user, compiling, from multiple credentials included in the computing device, the identity claims included in the request. The method then includes sharing the determined identity claims with the relying party.

    SYSTEMS FOR USE IN BINDING INTERNET OF THINGS DEVICES WITH IDENTITIES

    公开(公告)号:WO2021011126A1

    公开(公告)日:2021-01-21

    申请号:PCT/US2020/036930

    申请日:2020-06-10

    Abstract: Systems and methods are provided for binding an IoT device with an identity of a user, whereby action by the IoT device may be attributed to the user. One exemplary method includes receiving identifying data for a user, transmitting an OTP to the user, and receiving an OTP from the user. When the received OTP matches the transmitted OTP, the method includes compiling an identity for the user based on the identifying data, receiving an IoT device ID associated with an IoT device, and appending the IoT device ID to the identity of the user. The method further includes seeking authentication of the user at a communication device of the user, in response to a request indicator from the IoT device, and providing to the IoT device, in response, a confirmation of authentication of the user and/or a portion of the identifying data from the stored identity of the user.

    SYSTEMS AND METHODS FOR PROVISIONING ACCOUNTS

    公开(公告)号:WO2020123274A1

    公开(公告)日:2020-06-18

    申请号:PCT/US2019/064837

    申请日:2019-12-06

    Abstract: Systems and methods are provided for use in provisioning accounts to applications included in mobile devices. One exemplary method includes receiving, at a mobile device, a request to provision an account to a mobile device; prompting a user associated with the account for authentication at a wireless device associated with the account; receiving an account credential from the wireless device, via a local wireless communication between the mobile device and the wireless device, when the user is authenticated at the wireless device; transmitting the account credential toward a first party associated with the account, whereby the account credential is indicative of the authentication of the user; and provisioning the account to the mobile device, in response to an approval received from the first party.

    SYSTEMS AND METHODS FOR FACILITATING NETWORK TRANSACTIONS BASED ON USER AUTHENTICATION

    公开(公告)号:WO2020072144A1

    公开(公告)日:2020-04-09

    申请号:PCT/US2019/048234

    申请日:2019-08-27

    Abstract: Systems and methods are provided for facilitating network transactions based on user authentication. One exemplary method includes, for a network transaction, receiving, at a card device, an authentication command from an issuer of a payment account associated with the card device. A user of the card device is instructed, at an indicator of the card device, to provide a biometric for use in authenticating the user. Biometric data from the user is captured at biometric sensor of the card device, when the user provides the biometric, and the captured biometric data is compared with reference biometric data stored in a memory of the card device. The card device then returns a command reply to the issuer, where the command reply includes an authentication result based on the comparison, thereby permitting the issuer to employ the authentication result of the user in connection with the network transaction.

    SYSTEMS AND METHODS FOR GENERATING LENDING SCORES USING TRANSACTION DATA

    公开(公告)号:WO2018144132A1

    公开(公告)日:2018-08-09

    申请号:PCT/US2017/065232

    申请日:2017-12-08

    CPC classification number: G06Q40/025

    Abstract: A merchant score (MS) computing device for generating merchant lending scores for business loans is provided. The MS computing device receives a score request including a merchant identifier associated with a candidate merchant, determines a geolocation and a merchant category associated with the candidate merchant based at least in part on the score request, and retrieves transaction data associated with transactions for a plurality of merchants including the candidate merchant and a set of peer merchants. Each peer merchant is associated with the geolocation and merchant category of the candidate merchant. The MS computing device further compares the transaction data associated with the candidate merchant to the transaction data associated with the peer merchants, generates a merchant lending score associated with the candidate merchant that indicates a relative performance level based on the comparison, and transmits the merchant lending score to a requestor computing device.

    METHOD AND SYSTEM FOR AUTHENTICATION VIA A TRUSTED EXECUTION ENVIRONMENT

    公开(公告)号:WO2018136914A1

    公开(公告)日:2018-07-26

    申请号:PCT/US2018/014786

    申请日:2018-01-23

    Abstract: A method for authentication facilitated via a trusted execution environment includes: reading payment credentials in a first application program stored in a first memory area of a computing device; transmitting an authentication request to a second application program stored in a trusted execution environment of the computing device separate from the first memory area; displaying a prompt for authentication data based on an instruction supplied by the second application program; receiving authentication data; transmitting the received authentication data to an external computing device; receiving, by the second application program of the computing device, an authentication result from the external computing device; and transmitting, by the second application program of the computing device, the authentication result to the first application program in response to the authentication request.

Patent Agency Ranking