G06Q20/26

SYSTEM AND METHOD FOR REMOTE ACCESS
20230119429 · 2023-04-20 ·

A technique for remote access via a computing device is discussed. In one embodiment, a computing device receives data indicative of a card number associated with a bank-issued debit card. The debit card is associated with a bank account at a bank that issued the bank-issued debit card. The computing device also receives data indicative of an amount of cash to be deposited into the account based on an amount of cash provided at the computing device location. Encrypted data indicative of the card number and the data indicative of the amount of cash is routed to a gateway vendor server and is further routed to a payment network server for deposit of an amount corresponding to the data indicative of the amount of cash into the bank account associated with the card number.

SYSTEM AND METHOD FOR REMOTE ACCESS
20230119429 · 2023-04-20 ·

A technique for remote access via a computing device is discussed. In one embodiment, a computing device receives data indicative of a card number associated with a bank-issued debit card. The debit card is associated with a bank account at a bank that issued the bank-issued debit card. The computing device also receives data indicative of an amount of cash to be deposited into the account based on an amount of cash provided at the computing device location. Encrypted data indicative of the card number and the data indicative of the amount of cash is routed to a gateway vendor server and is further routed to a payment network server for deposit of an amount corresponding to the data indicative of the amount of cash into the bank account associated with the card number.

SYSTEMS AND METHODS FOR CONDUCTING TRANSACTIONS USING A SURROGATE PIN
20230068468 · 2023-03-02 ·

System and methods for conducting transactions using a surrogate PIN are disclosed. In one embodiment, at a mobile payment platform comprising at least one computer processor, a method for conducting a transaction may include: (1) receiving an identification of a debit-based payment instrument from an electronic wallet; (2) receiving, from a payment switch, a token for the debit-based payment instrument and a limited use key; (3) associating the token and limited use key with the debit-based payment instrument; and (4) providing the token and limited use key to a digital payment platform for transacting. A surrogate PIN may be provided to a debit payment network from one of the payment switch and a digital payment platform for an issuer.

SYSTEMS AND METHODS FOR CONDUCTING TRANSACTIONS USING A SURROGATE PIN
20230068468 · 2023-03-02 ·

System and methods for conducting transactions using a surrogate PIN are disclosed. In one embodiment, at a mobile payment platform comprising at least one computer processor, a method for conducting a transaction may include: (1) receiving an identification of a debit-based payment instrument from an electronic wallet; (2) receiving, from a payment switch, a token for the debit-based payment instrument and a limited use key; (3) associating the token and limited use key with the debit-based payment instrument; and (4) providing the token and limited use key to a digital payment platform for transacting. A surrogate PIN may be provided to a debit payment network from one of the payment switch and a digital payment platform for an issuer.

Card registry systems and methods

A card registry system is configured to automatically identify financial card information in one or more credit files associated with a consumer and populate a card registry account of the consumer with the identified financial card information. Once the financial card information has been obtained from the credit file(s), the card registry system may transmit cancellation and/or reissuance requests to the respective card issuers in the instance that one or more cards are compromised, so that the financial cards may be easily and efficiently cancelled and/or reissued at the request of the consumer.

Card registry systems and methods

A card registry system is configured to automatically identify financial card information in one or more credit files associated with a consumer and populate a card registry account of the consumer with the identified financial card information. Once the financial card information has been obtained from the credit file(s), the card registry system may transmit cancellation and/or reissuance requests to the respective card issuers in the instance that one or more cards are compromised, so that the financial cards may be easily and efficiently cancelled and/or reissued at the request of the consumer.

Systems and methods for mobile wallet provisioning

A method for provisioning a payment account to a mobile wallet on a mobile device includes receiving, by a provider computing system, an encrypted network return address of the mobile wallet that uniquely identifies a network address of the mobile wallet when the encrypted network return address is decrypted from an initiating device, receiving, by the provider computing system, an encryption key configured to decrypt the encrypted network return address, wherein the encryption key is not provided to the initiating device, decrypting, by the provider computing system, the encrypted network return address using the encryption key, and provisioning, by the provider computing system, a payment token associated with the payment account to the mobile wallet based on the decrypted network return address received from the initiating device by transmitting the payment token to the mobile device without going through the initiating device.

Systems and methods for mobile wallet provisioning

A method for provisioning a payment account to a mobile wallet on a mobile device includes receiving, by a provider computing system, an encrypted network return address of the mobile wallet that uniquely identifies a network address of the mobile wallet when the encrypted network return address is decrypted from an initiating device, receiving, by the provider computing system, an encryption key configured to decrypt the encrypted network return address, wherein the encryption key is not provided to the initiating device, decrypting, by the provider computing system, the encrypted network return address using the encryption key, and provisioning, by the provider computing system, a payment token associated with the payment account to the mobile wallet based on the decrypted network return address received from the initiating device by transmitting the payment token to the mobile device without going through the initiating device.

Facilitation of real-time payment network transactions

A request for payment message is received. The message includes transaction data. A transaction identifier is generated. The transaction data is stored in association with the transaction identifier. The transaction identifier is transmitted to an acquirer bank. A request to retrieve data is received from a payer's bank. The request to retrieve data includes the transaction identifier. At least some of the transaction data is transmitted to the payer's bank. A confirmation is received from the payer's bank. The confirmation indicates that a real-time payment has been made in accordance with the request for payment message.

INTERCHANGE CODE PREDICTION SYSTEM FOR PROCESSING CREDIT CARD TRANSACTIONS
20220327546 · 2022-10-13 · ·

A computer-implemented method for predicting interchange charges includes: retrieving a historical transactions set, where each completed transaction in the set includes transaction features, a bank identification number (BIN), and a corresponding true interchange code; transforming all BINs in the set into a corresponding plurality of BIN features that comprise probabilities; creating a first training set including all transaction features, all pluralities of BIN features, and all true interchange codes associated with the historical transactions set; training a random forest model using the first training set and generating a second training set including rounded BIN features, rounded transaction features, discrete ones of the transaction features, and the true interchange codes; training the random forest model using the second training set to generate a trained random forest model for prediction of the interchange codes; and executing the trained random forest model for new transactions to generate corresponding predicted interchange codes.