Patent classifications
G06Q20/40
Disabling mobile payments for lost electronic devices
If a user loses an electronic device that has the capability to conduct financial transactions, the user may report that the electronic device is lost using a lost-device software application to a management electronic device associated with a provider of the electronic device. In response to receiving this information, a disabling command is sent to a payment network associated with the financial account of the user to temporarily disable use of the electronic device to conduct the financial transactions. In particular, the electronic device may include a secure element that stores a payment applet for a financial account, and the disabling command may disable a mapping from a virtual identifier for the financial account to a financial primary account number. Subsequently, if the user finds the electronic device, the user may re-enable the capability (and, thus, the mapping) by providing authentication information to the electronic device.
Disabling mobile payments for lost electronic devices
If a user loses an electronic device that has the capability to conduct financial transactions, the user may report that the electronic device is lost using a lost-device software application to a management electronic device associated with a provider of the electronic device. In response to receiving this information, a disabling command is sent to a payment network associated with the financial account of the user to temporarily disable use of the electronic device to conduct the financial transactions. In particular, the electronic device may include a secure element that stores a payment applet for a financial account, and the disabling command may disable a mapping from a virtual identifier for the financial account to a financial primary account number. Subsequently, if the user finds the electronic device, the user may re-enable the capability (and, thus, the mapping) by providing authentication information to the electronic device.
Risk determination enabled crypto currency transaction system
Systems and methods for providing risk determination in a crypto currency transaction include receiving, through a network via a broadcast by a first payer device, a first crypto currency transaction that includes a first payee public address. A first request for a determination of risk associated with the first crypto currency transaction is then identified in the first crypto currency transaction, with the first request including risk criteria. A first payee involved in the first crypto currency transaction is then identified using the first payee public address, and first payee risk information is accessed via at least one external risk information database based on the identification of the first payee. If it is determined that the first payee risk information satisfies the at least one risk criteria in the first request, the first crypto currency transaction is provided for addition to a block in a crypto currency public ledger.
Financial terminal that automatically reconfigures into different financial processing terminal types
An improved financial terminal automatically reconfigures into different financial processing terminal types. In one embodiment, the terminal comprises a housing; a card reader configured to accept at least a portion of a card having an integrated circuit; at least one display; at least one processor; and at least one memory configured to store machine readable code, the machine readable code comprising a first kernel corresponding to a first transaction type and a second kernel corresponding to a second transaction type.
System and method for transactional data acquisition and establishment of customer lifetime value using acquired transactional data
A method for determining customer lifetime value using an incentive system to provide for geographically limited rewards earned for transactions includes tracking payment card transactions between enrolled payment cardholders and enrolled merchants, creating a database of rewards eligible transactions, instructing a virtual payment card issuer to apply the rewards amount for each rewards eligible transaction to an account, receiving transaction authorization requests from the virtual payment card issuer corresponding to enrolled cardholders requesting to spend rewards within their corresponding account, if the transaction is occurring within a prescribed geographic area in which rewards can be spent, transmitting an authorization for the virtual card issuer to complete the transaction using the rewards, establishing a cohort of enrolled payment cardholders and associated transaction data, and calculating a custom lifetime value for the enrolled payment cardholders within the cohort, the calculation based on the transaction data acquired by the incentive management system.
NFC card verification
Methods and systems are provided for verifying the possession of a card, such as a credit card or a debit card, by a card user. Possession of the card can be verified, for example, when a purchase transaction, such as a telephone purchase transaction or an online purchase transaction, is attempted with the card and the purchase transaction is denied due to suspected account take over. Possession of the card can be verified by detecting the present of the card with a mobile device of the user, such as a smart phone. For example, possession of the card can be verified by near field communication (NFC) between the card and the mobile device, wherein the communication is sufficient to adequately determine the presence of the card.
Transparent crowd sourcing for projects
Methods and systems are provided for crowdsourced funding via a blockchain system. A token contract, associated with a token issuer, is generated on a blockchain system. Tokens are issued to a plurality of token holders. Each of the plurality of token holders is allowed access to a feedback mechanism associated with the token issuer. A performance of the token issuer in an associated field is monitored to provide at least one performance metric. A dividend is paid to each token holder proportional to a number of tokens held by the token holder after a predetermined amount of time based on the at least one performance metric.
Methods and systems for controlling access to a protected resource
An electronic device is disclosed. The electronic device includes a memory, a camera module, a communications module, and a processor that is configured to: receive, from the camera module, image data associated with a machine-readable optical label, the optical label encoding transaction details of a transfer of data to a recipient account, wherein the transaction details do not indicate an identity of the recipient account; receive a user input indicating authorization to initiate a transfer of data, via a protected resource, from an account associated with the user to the recipient account; and in response to receiving the user input, generate a request for initiating the transfer of data based on the transaction details, the request including an access token for use in authenticating the user on requests to access the protected resource.
Systems and methods for employing a joystick sequence to authenticate a user
Systems and methods for authenticating identification information are disclosed. For example, a system may include an Automated Teller Machine (ATM). An ATM may comprise a user interface. The user interface may comprise a joystick. The user interface may be configured to receive joystick input from a user. The ATM may comprise at least one memory storing instructions. The ATM may comprise at least one processor configured to execute the instructions to perform operations. The operations may comprise receiving identification information from the user. The operations may comprise receiving the joystick input. The operations may comprise extracting a joystick sequence from the joystick input. When the joystick sequence is within a predetermined threshold from a stored joystick sequence corresponding to the identification information, the operations may comprise authenticating the user for an ATM operation.
Predictive pre-authorization of subsidiary accounts using passive biometrics
A system and method for predictive pre-authorization of subsidiary accounts using passive biometrics which uses wireless mobile devices and biometric scanning to automatically predict pre-authorized transaction amounts for a plurality of subsidiary accounts in a secure manner without requiring the customer to handle his or her mobile device. The system and method uses a payment facilitation device at the business location which automatically detects and recognizes registered mobile devices, displays a photo of the customer to a business employee for identity confirmation, verifies the customer with a biometrics verification database, generates a pre-authorization amount with an authorization generator, and automatically deducts payments for purchases from a pre-authorized customer account. The system and method may further include capabilities for facilitating offline transactions using accounts enabled as offline accounts.