G06Q20/325

Systems and methods for secure wireless payment transactions when a wireless network is unavailable
11526866 · 2022-12-13 · ·

Systems, methods, and devices are disclosed which allow a mobile device user to complete financial transactions even when the mobile device is not connected to a wireless network. The systems, methods, and devices of the present disclosure may utilize a combination of an encrypted lockbox containing out of network payment codes on the mobile device and a matching set of out of network payment codes stored on a server of a payment authority.

Push payment decision routing
11526867 · 2022-12-13 · ·

In an example embodiment, a method for push payment decision routing in relation to a transaction is provided. An example method comprises issuing a virtual payment identifier to a mobile device and receiving payment rules from a mobile device. The user-defined rules include parameters for invoking at least one push payment to be made via the virtual payment identifier for the transaction. Instructions to implement or pay for the transaction as a pull payment are received and, based on the rules, the transaction is completed or paid for a push payment.

SECURE ELECTRONIC MESSAGING GUARANTEEING INTEGRITY AND NON-REPUDATION

It is proposed a method and system to improve the security of electronic messages exchange between two or more users. The proposed electronic messaging mechanism allows guaranteeing the integrity of a message exchange (i.e., no message has been added, modified, reordered, nor removed from the message exchange), as well as its non-repudiation (i.e., users are univocally associated with the message exchange and cannot deny being authors of the messages they sent), using a local or external blockchain.

SYSTEM AND METHOD OF MULTIPLE CLOSED-LOOP SECURED TRANSACTION
20220391880 · 2022-12-08 · ·

The present invention relates to a system and a method for performing a closed-loop secured transactions using NFC. The method comprises of receiving a payment selection comprising of instrument selection at a secure element of a first user device. The instrument selection is used to automatically select the closed-loop kernel. The invention further encompasses using symmetric key encryption for the payment selection data which can only be decrypted inside the HSM for quick and hassle-free peer to peer (P2P) or peer to merchant (P2M) closed-loop transactions.

TECHNIQUES FOR VEHICLE PARKING MANAGEMENT AND INVITATION-BASED PERMITTING

A parking management system identifies vehicles in entrance lanes, exit lanes, or both, of a parking facility and provides a real-time vehicle inventory count. One or more beacons locate point of sale (POS) devices assigned to parking attendants to determine which of them are performing vehicle transactions. Vehicles can be associated with specific transactions, as well as the transaction-authorizing attendant and the barrier gate and vehicle travel lane to which the attendant is assigned. To reduce fraud, this transaction information can be monitored in real time by a web or mobile dashboard and analyzed in real time or upon attendant end-of-shift checkout. The parking management system also implements permit parking invitation techniques that provide registration, payment in advance or on demand, or both, for parking of an invitee's vehicle. These tasks are accomplished without an inviter's knowledge about the invitee, the invitee's vehicle, or both.

Multi-functional authentication apparatus and operating method for the same

A multi-functional authentication apparatus and an operation method for the same are provided. The multi-functional authentication apparatus integrates multiple communication modules into one device. A biometric authentication procedure is firstly performed when activating this multi-functional authentication apparatus. A security code is generated through a security authentication mechanism provided by this apparatus after reading biometric features. After that, according to a connection protocol, one of the communication modules of the multi-functional authentication apparatus is activated to connect with an external host. The security code is transmitted to the host via the communication module for identifying a user. The multi-functional authentication apparatus acts as an authenticator that allows a user to login to a computer system or obtain a network service after authentication. The multi-functional authentication apparatus also provides authentication for the user to open an access control device or conduct a mobile payment.

Efficient propagation of user data across disparate systems

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for fluid blob tracking. One of the methods includes receiving from a user device, a request to change an address with a financial institution. The method includes accessing an electronic bill pay system of the financial institution. The method includes identifying an external party to notify of the change of address based on data in an electronic bill pay system. The method also includes notifying the external party of the change of address, wherein the external party is independent of the financial institution.

Payment Channel Returning Limited Use Proxy Dynamic Value

A central platform provides proxy dynamic values for any one of a number of a cardholder's portable payment devices, upon a request for such information made during a transaction. The proxy dynamic value can be provided to the merchant, who then can route it into the acceptance network in order to initiate the authentication process. The central platform provides the actual primary account number associated with the proxy dynamic value during the authentication process.

PERSONALIZED ROUTE RECOMMENDATION AND NAVIGATION

According to examples, a system for providing personalized routes may include a processor and a memory storing instructions. The processor, when executing the instructions, may cause the system to receive a user request for a personalized route wherein the user request can include at least a route origin and destination. The processor employs the user request to identify the user and retrieves the user's preferences from different recommender systems. The recommendations output by the recommender systems are ranked based on context data associated with the user request. The geographic locations associated with a predetermined number of top-ranked recommendations are obtained and a personalized route that passes through a maximum number of the geographic locations is built for a display to the user.

Fuel dispensing terminal and proxy system and method of redundancy
11593794 · 2023-02-28 ·

A fueling station payment system having a fuel pump dispensing fuel to individual customers; a forecourt controller; a terminal disposed within said fuel pump, said terminal comprising a processing unit, a secure card reader, an encryption module and a wireless communication module; said terminal being in wireless communication with a payment processor such that encrypted secure payment information is transmitted between said terminal and said payment processor; said terminal being in wireless communication with the cloud such that encrypted secure payment information is transmitted between said terminal and said cloud; one or more point of sale systems which communicate with said forecourt controller using established protocols; and a gateway device, wherein said terminal communicates wirelessly with said gateway device, and wherein said terminal and said forecourt controller communicate with each other through said gateway device, and wherein said gateway device communicates with said forecourt controller using said established protocols of said point of sale systems.