G06Q20/40

Interactive virtual reality system
11580708 · 2023-02-14 · ·

Provided herein are method, apparatus, and computer program products for generating a first and second three dimensional interactive environment. The first three dimensional interactive environment may contain one or more engageable virtual interfaces that correspond to one or more items. Upon engagement with a virtual interface the second three dimensional interactive environment is produced to virtual simulation related to the one or more items.

Method, device, and system of detecting mule accounts and accounts used for money laundering
11580553 · 2023-02-14 · ·

Method, device, and system of detecting a mule bank account, or a bank account used for terror funding or money laundering. A method includes: monitoring interactions of a user with a computing device during online access with a bank account; and based on the monitoring, determining that the bank account is utilized as a mule bank account to illegally receive and transfer money, or is used for money laundering or terror funding. The method takes into account one or more indicators, such as, utilization of a remote access channel, utilization of a virtual machine or a proxy server, unique behavior across multiple different accounts, temporal correlation among operations, detection of a set of operations that follow a pre-defined mule account playbook, detection of multiple incoming fund transfers from multiple countries that are followed by a single outgoing fund transfer to a different country, and other indicators.

Device with built-in bill capture, analysis, and execution
11580528 · 2023-02-14 · ·

Systems and methods for secure and efficient bill capture, analysis, and execution are provided. A method may include capturing, via a camera embedded in a smart card, an image of a bill. The bill may include a plurality of text fields. The method may include processing the text fields via a microprocessor embedded in the smart card. The method may include determining, based at least in part on the processing of the text fields, a balance amount and a payment recipient associated with the bill. The method may also include executing a payment for the balance amount from an account associated with a user of the smart card to an account associated with the payment recipient. The executing may be performed via a wireless communication element embedded in the smart card which may be configured to provide wireless communication between the smart card and a payment gateway.

System, method, and computer program product for determining an event in a distributed data system
11580552 · 2023-02-14 · ·

A method for preventing duplicate processing of a payment transaction includes: generating a first data structure with a first predetermined time interval and generating a second data structure with a second predetermined time interval. A first overlap region and second overlap region of the first and second predetermined time interval are defined by a same time interval. The method includes receiving first transaction data associated with a first payment transaction, receiving second transaction data associated with a second payment transaction, and determining based on a first transaction ID and a second transaction ID, that the second payment transaction is a duplicate of the first payment transaction. A computer program product and system for preventing duplicate processing of a payment transaction are also disclosed.

Contactless message transmission

A system and method uses one or more repurposed data fields in a payment transaction message to pass the merchant consumable data from a mobile device to the merchant system using an existing channel. The merchant consumable data relate to loyalty or rewards.

Contactless message transmission

A system and method uses one or more repurposed data fields in a payment transaction message to pass the merchant consumable data from a mobile device to the merchant system using an existing channel. The merchant consumable data relate to loyalty or rewards.

Systems and methods for minimizing user interactions for cardholder authentication

A method and system include providing a user interface associated with an issuer of an account; receiving, at the user interface, a request to generate a token associated with a user account; generating at least one token associated with the user account; authenticating one or more elements associated with the user account, wherein authentication may be one of prior to and subsequent to the generation of the at least one token; and receiving the at least one token. Numerous other aspects are provided.

Printer for selectively printing symbolic information on a medium

In some implementations, a printing system may include a card printer that includes a printing controller and a marking device. The card printer may be configured to receive a first printing instruction or a second printing instruction associated with printing an account identifier on a card. The card printer may receive one of the first printing instruction or the second printing instruction based on whether a risk score, associated with the account identifier, satisfies a threshold. The card printer may print a full account identifier, associated with the card, on a surface of the card based on receiving the first printing instruction. The card printer may print the card without the full account identifier on the surface of the card based on receiving the second printing instruction.

Systems and methods for rules-based decisioning of events

Systems and methods for rules-based decisioning of events are disclosed. In one embodiment, a method may include: creating an in-memory cache by parsing stored checkpoints, signals, and rules definitions; receiving a checkpoint request; prioritizing the checkpoint request; preparing a basic context, comprising a limited set of objects, for the checkpoint request; using the in-memory cached definitions, generating at least one of a raw signal, an engineered signal, and a secondary signal for the checkpoint request based on the basic context; using the in-memory cached definitions, executing rules on at least one of the basic context, the raw signal, the engineered signal, and the secondary signal to generate a list of potential decisions; reducing the list of potential decisions to a list of final decisions; publishing the final decisions and supporting data rules and signals execution details; and executing the final decisions.

Methods, systems and computer program products for implementing pre-authorized payment transactions

The invention provides methods, systems and computer program products for implementing pre-authorized payment transactions. In an embodiment, the invention comprises at a point-of-sale (POS) terminal (i) receiving a payment initiation request, (ii) receiving payment account information associated with a payment account associated with a payor, and (iii) receiving a first input identifying the payment transaction as a payment transaction that has been pre-authorized, (iv) responsive to receiving the first input identifying the payment transaction as a payment transaction that has been pre-authorized, generating a transaction payment request based on a pre-defined request message format, wherein a personal identification number (PIN) data element within the transaction payment request is populated independent of any PIN value input at the POS terminal, and (v) routing the generated transaction payment request to a transaction authorization server that is communicably coupled to the pre-authorized transaction database.