G06Q20/2295

System and method for integrating data from a remote server with a client application

The electronic device may invoke a host application. The device may display a first host user interface on the display, the first host user interface including a first host user interface component associated with a child application. In response, the device may invoke, using the host application, the child application executed at the electronic device. The device may transmit, using the host application, a request for data associated with a child user interface component to the child application. The device may transmit, using the child application, the request for data associated with the child user interface component to a child application server, wherein the data associated with the child user interface component is inaccessible by the host application. The device may receive, using the child application, the data associated with the child user interface component from the child application server. The device may display the child user interface component.

SYSTEM AND METHOD FOR INTER-BANK AND INTRA-BANK MOBILE BANKING COMMUNICATIONS AND TRANSFERS
20220374863 · 2022-11-24 ·

Systems and methods for inter-bank and intra-application mobile banking communications and transfers including receiving a communication from a requesting device regarding a funds transfer, processing the communication to determine relevant funds transfer request details and initiating a communication window to allow fluid communication between a requestor and responder(s) regarding the funds transfer request.

SYSTEM AND METHOD FOR THIRD-PARTY FOOD AND DINING ORDERING CONTROL
20220374859 · 2022-11-24 ·

A system and method for third-party food and dining ordering control, comprising at least one device capable of accessing the internet which may be a mobile device or personal computing device such as a laptop or desktop, a web application, and a point-of-sale system at a restaurant or retailer, wherein users of the web application may deposit funds into an account and set regulations on what they may purchase with the deposited funds, or have an administrator set up an account for them such as a parent setting up an account for a child or a doctor setting up an account for a patient, allowing the parent or doctor or other administrator to regulate what the sub-user such as the child or patient may purchase, in keeping with budget, diet, and lifestyle restrictions, and which may utilize zero-step authentication to allow for seamless use of the service at certain establishments.

SYSTEM AND METHOD FOR PROCESSING A TRANSACTION WITH SECURED AUTHENTICATION
20170344732 · 2017-11-30 ·

Embodiments of the disclosure enable one or more transactions to be processed with secured authentication. A system server receives a request for authentication for an article associated with a first user that is associated with a user account, identifies one or more client devices associated with one or more secondary users that are associated with the user account, communicates with the one or more client devices to obtain biometric data associated with the one or more secondary users, determines whether to approve the request for authentication based on the biometric data associated with the one or more secondary users, and, on condition that the request for authentication is approved, generates an authentication token. Aspects of the disclosure leverage authentication technology to authenticate one or more identities of one or more users to allow the users to confirm that an article is associated with another user.

System and method for third-party food and dining ordering control
11676125 · 2023-06-13 · ·

A system and method for third-party food and dining ordering control, comprising at least one device capable of accessing the internet which may be a mobile device or personal computing device such as a laptop or desktop, a web application, and a point-of-sale system at a restaurant or retailer, wherein users of the web application may deposit funds into an account and set regulations on what they may purchase with the deposited funds, or have an administrator set up an account for them such as a parent setting up an account for a child or a doctor setting up an account for a patient, allowing the parent or doctor or other administrator to regulate what the sub-user such as the child or patient may purchase, in keeping with budget, diet, and lifestyle restrictions, and which may utilize zero-step authentication to allow for seamless use of the service at certain establishments.

SYSTEMS AND METHODS FOR USE IN PROVIDING PAYMENT TRANSACTION NOTIFICATIONS

Systems and methods are provided for use in distributing payment transaction notifications. One example computer-implemented method includes identifying, by a computing device, transaction data for a transaction associated with a child token and identifying, in a token data structure, a parent token, which is different than the child token and which is associated with the child token. The computer-implemented method also includes determining that the parent token is enrolled for notifications and then, based on determining that the parent token is enrolled for notifications, transmitting, by the computing device, a notification to a communication device associated with the parent token, the notification indicative of the transaction and including at least a portion of the transaction data.

Secure credit card with near field communications
11263619 · 2022-03-01 · ·

A near field communication device included in a secure transaction card provides an addition and/or transitional communication link for communicating secure transaction information. The near field communication device may be selectively engaged or disengaged and, when engaged, either active or passive modes of operation of the near field communication device can be selected. in the active mode, secure transaction information is transmitted upon establishment of a communication link with a complementary near field communication device. In the passive mode, secure transaction information is transmitted upon interrogation from a complementary near field communication device. Secure transaction information is generated and stored for transmission in a memory and at least a portion of the memory is erased or nulled upon transmission or upon expiration of a selected period of time.

Parent level token issuance for asynchronous data processing based on device trust levels
11263621 · 2022-03-01 · ·

There are provided systems and methods for parent level token issuance for asynchronous data processing based on device trust levels. Two devices may interact enough that they develop a trust rating between the two devices that the devices are trusted for transaction processing and resolution. In order to provide asynchronous transaction processing without requiring a token service provider or transaction processor, a parent level token may be issued to the devices by a token service provider based on the trust rating. The devices may receive child level tokens from the parent token, while the parent token is stored by the transaction processor. The child level tokens may allow the devices and transaction processor to trust the devices to process and resolve transaction processing without availing the token service provider for token issuance.

Controlling a spending account based on user spending habits

Aspects described herein may allow for receiving authorization allowing monitoring a user's spending account. A base-line spending profile and a dysfunctional spending profile for the user are established. When notification of a pending purchase transaction is received, a determination is made as to whether the pending purchase transaction is in accordance with the base-line spending profile of the user. If the pending purchase transaction is in accordance with the base-line spending profile of the user, the pending purchase transaction is allowed, however, if the pending purchase transaction is not in accordance with the base-line spending profile of the user, then a temporary secondary approval may be instituted for a predetermined period of time and a secondary approval person is electronically notified that their approval is required before allowing the pending purchase transaction to be made using the spending account of the user.

IDENTITY AGGREGATION AND INTEGRATION

A global identity for a user is established and aggregated or federated for various personas of the user across transaction data for multiple lines-of business (LOB). Integration services provide features for integrating cross-LOB transactions, reporting, transacting, and/or metrics generation based on the global identity.