Patent classifications
G06Q20/105
UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE
A transaction card includes a near-field communication (NFC) component, a security component, a wireless component, one or more memories, and one or more processors communicatively coupled to the one or more memories. The device receives a signal from a user device attempting to access a secure application, and energizes the NFC component based on the signal received from the user device. The device causes the security component to generate an encrypted code based on the NFC component being energized, and provides, via the security component, the encrypted code to the wireless component. The device provides, via the wireless component, the encrypted code to the user device to permit the user device to utilize the encrypted code as authentication for accessing the secure application.
Prepaid chip card exception processing
A portable consumer device may have money stored therein, which can be calculated using an accumulator record and an exception record. The accumulator record can be incremented by the amount of any initiated transaction using the portable consumer device. The exception record can be incremented by the amount of any completed transaction using the portable consumer device. The portable consumer device may also have a limit amount, to record the amount of money added. The records allow for a later reconstruction of the device history, and can account for any errors or problems during transactions.
Method, apparatus, and computer program product for topping up prepaid payment cards for offline use
A card holder carries out an initial top-up of a balance of a pre-paid payment card. The prepaid payment card is configured for use in an infrastructure in accordance with a payment specification requiring different behavior for normal transactions in the infrastructure versus that required for topping-up of the balance. Contemporaneously with the initial top-up, the card holder registers risk mitigation information in association with the pre-paid payment card. Subsequent to the initial top-up, an indicator is written to the pre-paid payment card during a transaction with the pre-paid payment card outside the infrastructure. The indicator identifies the pre-paid payment card as having the risk mitigation information associated therewith. During subsequent presentation of the pre-paid payment card to the infrastructure, the pre-paid payment card is treated as a token backed up by the risk mitigation information, based on presence of the indicator on the pre-paid payment card.
METHODS AND SYSTEMS FOR MAKING PAYMENTS
A computer-implemented method and computer system are proposed for assisting a consumer associated with a plurality of payment cards. When the consumer wishes to make a payment transaction, a computer system with access to information about the payment cards and access to at least one consequence database storing information relating to consequences of the making payment using the payment cards, determines consequences of making the payment using each of a plurality of the payment cards. According to the determined consequences, the computer system makes an automatic selection of one of the payment cards to use for the purchase. The computer system's selection may be presented to the consumer as a proposal. Upon the consumer accepting the proposal, the payment transaction is performed using the selected payment card.
Utilizing a transaction card to provide secondary authentication for accessing a secure application with a user device
A transaction card includes a near-field communication (NFC) component, a security component, a wireless component, one or more memories, and one or more processors communicatively coupled to the one or more memories. The device receives a signal from a user device attempting to access a secure application, and energizes the NFC component based on the signal received from the user device. The device causes the security component to generate an encrypted code based on the NFC component being energized, and provides, via the security component, the encrypted code to the wireless component. The device provides, via the wireless component, the encrypted code to the user device to permit the user device to utilize the encrypted code as authentication for accessing the secure application.
System and computer program product to issue a retail prepaid card including a user-designed external face using a chit and related computer implemented methods
Embodiments of systems, computer program product, and related computer implemented methods to issue a closed-loop retail prepaid card including a user-designed external face using a chit, the chit being defined by an identification mechanism representing a financial commitment to issue a closed-loop retail prepaid card in an amount associated with a value paid for the chit, are provided. Embodiments of the present invention advantageously provide a service that enables a consumer to purchase, at the storefront of a retail establishment, a chit card that the consumer can subsequently redeem through a graphical user interface of an Internet website for a closed-loop retail prepaid card with a user-designed external face. The user-designed closed-loop retail prepaid card, for example, can be subsequently printed and delivered to an intended recipient. Advantageously, such a service can be made available to any retail establishment that uses a point-of-sale system.
Method for using and maintaining user data stored on a smart card
In a method for using and maintaining user data stored on a smart card, a smart card receives a user data request for the user data stored on the smart card. The smart card determines whether the user data request is a data maintenance request or a data use request. A data maintenance request is for modifying user data stored on the smart card. A data use request is for read only access to user data stored on the smart card. The smart card uses a first process to determine whether to allow the user data request when the user data request is determined to be a data maintenance request. The smart card uses a second process, different from the first method, to determine whether to allow the user data request when the user data request is determined to be a data use request.
Displaying payment card account information
A payment card information system according to one embodiment of the invention includes a card reader that scans a payment card and a display device that displays account information items. The payment card information system further includes an information terminal in communication with the card reader and the display device. The information terminal is configured to receive verification data from the card reader, verify the payment card using the verification data, receive an action code from the card reader, obtain one or more predetermined account information items corresponding to the action code, and display the one or more predetermined account information items on the display device.
Multi-directional wallet connector apparatuses, methods and systems
The W-CONNECTOR (“W-CONNECTOR”) facilitates the enrollment of payment accounts in a consumer's virtual wallet. The consumer may be logged into their payment account issuer's web site and designate one or more payment accounts for enrollment in a virtual wallet. The issuer may then share account, billing and/or other relevant information with the virtual wallet provider to facilitate the enrollment of the designated payment accounts in the virtual wallet. The W-CONNECTOR may also be configured to facilitate the creation and funding of pre-paid accounts in a consumer's virtual wallet.
SYSTEMS AND METHODS FOR MULTI-LAYER ADAPTIVE PACKET ROUTING
A multi-layer adaptive routing (MLAR) computing device including at least one processor in communication with at least one memory adaptively routes packet data within one or more networks. The MLAR device stores a custom group instance on a database, the instance includes a network of a plurality of service providers and a consultant comprised of a plurality of user groups. The MLAR device submits a query to the database based on a data request from a user. Data packets are created based on the database's response to the query, which are then divided, routed, and transmitted among a plurality of users within the custom group instance.