Patent classifications
G06Q20/385
PRE-AUTHENTICATION OF MOBILE PAYMENTS
An embodiment of the invention may include a method, computer program product and system for transaction authentication. The embodiment may include receiving, by a mobile device from a network server via a wireless access point using a medium-range wireless communication protocol, an indication corresponding to a transaction to execute. The embodiment may include displaying a graphical interface element having an indication of approval to initiate the transaction to execute from a user based on receiving the indication. The embodiment may include authorizing the transaction to execute for a period of time based on receiving the indication of approval to initiate the transaction to execute. The embodiment may include detecting within the period of time, from a point of sale device using a short-range wireless communication protocol, a mobile payment method associated with the transaction to execute. The embodiment may include initiating the transaction based on detecting the mobile payment method.
False fraudulent correction methods and apparatuses
A computer-implemented method and apparatus are provided to reduce false fraudulent declines of transactions. Payment processor (PP) systems may be provided with a request acceptor and a replacement transaction generator. The request acceptor receives a notification of a decline of a first transaction attempted by a cardholder with a merchant, for allegedly fraudulent, and a request to determine whether the first transaction was falsely identified as fraudulent, and if so, to remedy the first transaction. The replacement transaction generator generates, in response to a determination that the first transaction was falsely identified as fraudulent, and the merchant is a false fraudulent reduction partner merchant, a replacement second transaction to replace the declined first transaction. The replacement second transaction may include a bypass authorization code, and made available to the cardholder to use to transact with the merchant bypassing the declined first transaction.
CONSUMER AUTHENTICATION SYSTEM AND METHOD
A method for authenticating a consumer. The method includes receiving an authorization request message associated with a consumer conducting a transaction with a portable consumer device. A challenge message is sent to the consumer, where the challenge message is dynamic or semi-dynamic. A challenge response message is received from the consumer, and an authorization response message is sent to the consumer. The authorization response message indicates whether or not the transaction is authorized.
DEVICE ENROLLMENT SYSTEM AND METHOD
Embodiments related to systems and methods comprising receiving payment data at an access device; receiving an identifier for a mobile device at the access device; and generating and sending an authorization request message to a payment processing network, wherein the payment processing network generates a verification token, which is then sent to the mobile device whereby the mobile device is thereafter used to conduct payment transactions.
System, Method, and Apparatus for Securely Transmitting Data via a Third-Party Webpage
Provided is a computer-implemented method for securely receiving data via a third-party webpage, including: generating configuration data in response to a request from a first system, the configuration data including a public key of a first key pair; digitally signing the configuration data based on a private key of a second key pair; transmitting the configuration data to the first system, the configuration data including code configured to facilitate the first system to embed a plurality of frames in a webpage, wherein the plurality of frames loads content from a domain that is independent from a domain that hosts the webpage; and verifying the configuration data based on a public key of the second key pair. The computer-implemented method may also include receiving, from a master frame of the plurality of frames, encrypted data. Systems and computer program products are also provided.
PLAN INTERACTION UTILIZING CRYPTOGRAM
A method includes a network processing computer receiving an authorization request message comprising a token and a cryptogram during an interaction between a resource provider and a user. The network processing computer determines user credentials associated with the token. The network processing computer then determines a plan identifier based on the authorization request message. The network processing computer provides the plan identified to an authorizing entity computer.
DIGITAL CARD INTEGRATION WITH CARD PROCESSING SYSTEM OF CARD ISSUER
Methods and systems for managing a digital wallet are described, including registration of payment cards and use of such payment cards. The digital wallet may be integrated into a mobile application provided by a card issuer, with the digital wallet providing integration between the mobile application and a payment service provider that provides token-based payment systems for implementing virtual cards.
METHOD AND APPARATUS WITH PROVIDER INFORMATION ACCESS AUTHORIZATION
A method and apparatus with provider information access authorization are provided. The method includes receiving a single sign-on (SSO) token from a provider apparatus for a validated login request by a client device for a user account, wherein the SSO token is indicative of the provider apparatus having authorized secure protocol access with the provider apparatus to access information at the provider apparatus associated with the user account, retrieving customer information from the provider apparatus using the SSO token, receiving information from the client device, confirming whether, based on the information and the customer information that a user of the user account is eligible to complete a data exchange, and in response to a result of the confirming being that the user of the user account is confirmed eligible to compete the data exchange, cause the provider apparatus to process the data exchange corresponding to the information.
Cloud-based virtual wallet NFC apparatuses, methods and systems
The CLOUD-BASED VIRTUAL WALLET NFC APPARATUSES, METHODS AND SYSTEMS (“EAE”) transform user enhanced security transaction initiation requests using EAE components into time-limited, session-specific transaction bounding tokens. In some implementations, the disclosure provides a processor-implemented method of transforming a transaction bounding token request into transaction bounded tokens and purchase authorizations.
Single-use payment tokens
Provided are systems and methods for managing and implementing single-use payment-enabled tokens. In one example, a method may include distributing, via a server, a payment-enabled token to a payment application on a computing device, the payment-enabled token being mapped to a payment account of the payment application via a tokenization service, detecting use of the payment-enabled token as a payment via the payment application, and in response to the detecting, deactivating the payment-enabled token at the server and storing an identifier of the payment-enabled token and an additional data element of the payment-enabled token that identifies the payment account together within a data structure of the server.