G06Q20/42

METHOD, TERMINAL, AND COIN REGISTER FOR TRANSMITTING ELECTRONIC COIN DATA SETS
20230222509 · 2023-07-13 ·

A first security element is for transmitting an electronic coin data set to a second security element. The electronic coin data set is registered in a coin register of a payment system. The method has the steps of: setting a status of the electronic coin data set from the security element to an inactive status; transmitting the electronic coin data set from the first security element to the second security element; checking whether a receipt confirmation from the second security element has been received in the first security element; and deleting the transmitted electronic coin data set if the checking step results in that the receipt confirmation has been obtained by the first security element. The aforementioned relates to a payment system, a coin register, a security element, and a terminal for transmitting electronic coin data sets.

METHOD, TERMINAL, AND COIN REGISTER FOR TRANSMITTING ELECTRONIC COIN DATA SETS
20230222509 · 2023-07-13 ·

A first security element is for transmitting an electronic coin data set to a second security element. The electronic coin data set is registered in a coin register of a payment system. The method has the steps of: setting a status of the electronic coin data set from the security element to an inactive status; transmitting the electronic coin data set from the first security element to the second security element; checking whether a receipt confirmation from the second security element has been received in the first security element; and deleting the transmitted electronic coin data set if the checking step results in that the receipt confirmation has been obtained by the first security element. The aforementioned relates to a payment system, a coin register, a security element, and a terminal for transmitting electronic coin data sets.

ITEM-LEVEL INFORMATION COLLECTION FOR INTERACTIVE PAYMENT EXPERIENCE
20230020714 · 2023-01-19 ·

Disclosed is a technology for sending near real time transaction notifications to user devices of users of a payment service. Data associated with one or more financial accounts of a user and one or more user devices of the user is stored in a database associated with the payment service. The payment service receives transaction information and determines it is associated with a transaction involving a financial account of the user. The payment service generates a notification associated with the transaction, including at least a payment amount. The payment service causes presentation of the notification, in near real time, via at least one user device of the user.

ITEM-LEVEL INFORMATION COLLECTION FOR INTERACTIVE PAYMENT EXPERIENCE
20230020714 · 2023-01-19 ·

Disclosed is a technology for sending near real time transaction notifications to user devices of users of a payment service. Data associated with one or more financial accounts of a user and one or more user devices of the user is stored in a database associated with the payment service. The payment service receives transaction information and determines it is associated with a transaction involving a financial account of the user. The payment service generates a notification associated with the transaction, including at least a payment amount. The payment service causes presentation of the notification, in near real time, via at least one user device of the user.

METHOD FOR ACQUIRING ACCESS RIGHTS TO CONDITIONAL ACCESS CONTENT

A method of acquiring access rights to conditional access content. The method comprises receiving an access right on a first terminal through a first communication channel; storing said access right in said first terminal; sending a request for said conditional access content to a content provider, said request containing at least an identifier of an account to which said first terminal is associated, an identifier of the requested content and a piece of information concerning said access right; verifying, by said content provider, the authenticity of said access right using said piece of information concerning the access right; and when there has been a successful verification, marking said access right as used, and sending said conditional access content to at least one terminal linked to said account. The first terminal using near field communication technology (NFC) during at least one transfer of said access rights.

Method and corresponding proxy server, system, computer-readable storage medium and computer program

A method is provided. The method includes receiving a request message, the request message relating to a transaction between a first client and a second client, the request message including first client data and second client data, the first client data identifying an account to be used by the first client in the transaction, the second client data indicating if the second client is subscribed to a service. The method further includes determining if the second client is subscribed to the service, and generating an authentication request message if the second client is not subscribed to the service, the authentication request message requesting confirmation that a holder of the account is the first client. The method further includes sending the authentication request message, and receiving an authentication response message from the external server in response, the authentication response message including an indication whether the holder is the first client.

METHODS FOR AUGMENTED/VIRTUAL-REALITY TRANSACTION SYSTEMS FOR ENABLING RAPID TRANSACTIONS WITH DEFERRED PAYMENT OBLIGATION AND LIMITED USER INTERACTION
20230222479 · 2023-07-13 ·

Methods for rapid micro-payment transactions with deferred payments employ a network-connected AR device (“HMD”) having sensors for detecting a user's gaze/physical commands. Such methods comprise: receiving information from the HMD indicating a selected real-world/virtual content item for a potential transaction; causing the HMD to display a virtual transaction management widget (“TMW”) showing the selected item's cost, maximum threshold amount before triggering settlement; and any prior unsettled payment obligations; receiving further information from the HMD confirming the potential transaction based on the user's gaze/physical command; transmitting an authorization signal to a merchant offering the selected item without concurrently requiring payment when the selected item's cost and prior unsettled payment are less than the maximum threshold amount; and transmitting a signal to a payment system for settlement of the balance when the selected item's cost and any unsettled payment are equal/greater than the maximum threshold; and updating the displayed TMW accordingly.

METHODS FOR AUGMENTED/VIRTUAL-REALITY TRANSACTION SYSTEMS FOR ENABLING RAPID TRANSACTIONS WITH DEFERRED PAYMENT OBLIGATION AND LIMITED USER INTERACTION
20230222479 · 2023-07-13 ·

Methods for rapid micro-payment transactions with deferred payments employ a network-connected AR device (“HMD”) having sensors for detecting a user's gaze/physical commands. Such methods comprise: receiving information from the HMD indicating a selected real-world/virtual content item for a potential transaction; causing the HMD to display a virtual transaction management widget (“TMW”) showing the selected item's cost, maximum threshold amount before triggering settlement; and any prior unsettled payment obligations; receiving further information from the HMD confirming the potential transaction based on the user's gaze/physical command; transmitting an authorization signal to a merchant offering the selected item without concurrently requiring payment when the selected item's cost and prior unsettled payment are less than the maximum threshold amount; and transmitting a signal to a payment system for settlement of the balance when the selected item's cost and any unsettled payment are equal/greater than the maximum threshold; and updating the displayed TMW accordingly.

PHISHING DETECTION AND MITIGATION
20230224326 · 2023-07-13 · ·

Described herein are example implementations for handling of phishing attempts. A system receives a request to perform an electronic transaction, with the request including information regarding a user account. The system generates one or more probabilities of the request being valid based on the request and processing of a plurality of electronic transactions associated with one or more user accounts, identifies whether the request is valid based on the one or more probabilities, and in response to identifying that the request is not valid, provides an indication that the request is not valid. Processing the plurality of electronic transactions includes, for a plurality of electronic transactions including information regarding user accounts, generating a numerical representation associated with each electronic transaction, clustering the plurality of electronic transactions into one or more clusters based on the numerical representations, and, for each cluster, generating one or more aggregates of user account information.

PHISHING DETECTION AND MITIGATION
20230224326 · 2023-07-13 · ·

Described herein are example implementations for handling of phishing attempts. A system receives a request to perform an electronic transaction, with the request including information regarding a user account. The system generates one or more probabilities of the request being valid based on the request and processing of a plurality of electronic transactions associated with one or more user accounts, identifies whether the request is valid based on the one or more probabilities, and in response to identifying that the request is not valid, provides an indication that the request is not valid. Processing the plurality of electronic transactions includes, for a plurality of electronic transactions including information regarding user accounts, generating a numerical representation associated with each electronic transaction, clustering the plurality of electronic transactions into one or more clusters based on the numerical representations, and, for each cluster, generating one or more aggregates of user account information.