G06Q20/326

SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT

Systems and methods for securely generating and printing documents are disclosed. For example, processor(s) of a computer system may receive information for the document from a computing device through a network, verify the information for the document, and upon verification, generate document generation data using at least a portion of the information for the document. The document generation data may include document metadata that enables generation of an image of the document and/or the image of the document. Upon the processor(s) verifying first authentication information of a first code associated with a printing device received from the computing device through the network and second authentication information of a second code associated with the computing device received from the printing device through the network, the processor(s) may transmit the document generation data to the printing device through the network, and cause the printing device to print the image of the document.

SYSTEMS AND METHODS FOR MATCHING TOKENIZED ACCOUNTS BETWEEN ANONYMOUS PARTIES
20230230061 · 2023-07-20 ·

Systems and methods that allow fulfilment of a transaction wherein a first party initiates the transaction, for example, at a point-of-sale device, and a tokenized account of an anonymous second party is identified as an account optimal for completing the transaction. The tokenized account of the anonymous second party is identified based on the transaction information. The tokenized account of the anonymous second party is matched to complete the transaction for reasons including a financial advantage or incentive associated with the tokenized account of the anonymous second party and not available to the first party at the time of the transaction. This financial advantage may be shared between both parties. The tokenized account of the anonymous second party may receive a financial benefit or other valuable consideration for completing the transaction. The tokenized account of the anonymous second party is reimbursed for costs associated with completing the transaction.

VALUE TRANSFER VIA FACIAL RECOGNITION

A user device includes a display, a camera, and an application. The application is structured to: receive first image data of a first user from a first input of the camera; receive second image data of a second user from a second input of the camera; receive a payment amount of a bill; detect a location of the first user; determine a recommended division of the payment amount of the bill based on the first user, the second user, and the location; receive a first value of the payment amount owed by the first user and a second value of the payment amount owed by the second user; and initiate a transfer of funds from a first user account associated with the first user based on the first value and from a second user account associated with the second user based on the second value.

Data transfer via tile overlay
11561691 · 2023-01-24 · ·

A management system of a computing device provides enhanced functionality via selectable icons (e.g., tiles), presented on a home screen, that may be overlaid to perform overlay operations such as data transfer, payment, and/or granting of certain authorizations or permissions. Users are able to more readily perform cross-application and/or cross-entity operations via, for example, the operating system of a computing device without needing to engage with as many entities (or applications thereof). Tile overlay operations may be managed and reviewed via an application.

Processing payment transactions without a secure element
11704645 · 2023-07-18 · ·

A user conducts a wireless payment transaction with a merchant system by transmitting payment information from a user device to a terminal reader without accessing a secure element resident on the user device. A user taps a user device in a merchant system's terminal reader's radio frequency field. The terminal reader and the user device establish a communication channel and the terminal reader transmits a signal comprising a request for a payment processing response. The signal is received by the user device and converted by a controller to a request understandable by an application host processor. The controller transmits the request to the application host processor, where the request is processed, and a response is transmitted to the controller and then to the terminal reader. The response generated by the application host processor is identifiable by the merchant system as a payment response.

Generating and accessing video content for products
11706167 · 2023-07-18 · ·

In one or more implementations, video content generated using a client application may be provided to users of the client application in association with one or more products offered for purchase via the client application. Video content items presented to a user may be identified based on a level of interest of the user in relation to the respective video content items. A level of interest of the user in relation to a video content item may be based on profile information of the user.

Computer transaction security with delegated decisions

A method for authenticating e-commerce transactions involves receiving, from a payment network computer, a first authentication request message to authenticate a transaction associated with a payment account, the first authentication request message being initiated by an issuer domain computer not implementing a 3-D Secure authorization protocol, determining that the issuer domain computer has configured, at the access control server computer, a decision function of a second portion of the 3-D Secure authorization protocol and in response thereto, transmitting, to the issuer domain computer, a decision request message and information associated with the transaction, the decision request message requesting the issuer domain computer to determine an action for authenticating the transaction based on the information associated with the transaction and one or more programmatic rules of the issuer domain computer, the transmitting occurring in lieu of the access control server computer executing the decision function at the access control server computer.

Blaze non-browser based application for purchasing digital products
11704642 · 2023-07-18 · ·

A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.

SYSTEM AND METHOD TO PERFORM DIGITAL AUTHENTICATION USING MULTIPLE CHANNELS OF COMMUNICATION

Embodiments are generally directed to systems, devices, and techniques to authenticate unauthenticated users to perform sensitive actions.

PERSONAL DATA WALLET
20230015523 · 2023-01-19 ·

Methods and systems are presented for providing a secured electronic transaction processing framework that enables online service providers to process electronic transactions for users while allowing the users to retain control over their user data. The secured electronic transaction processing framework includes a data access system configured to dynamically access user data, that is stored on user devices and controlled by users, on an as-needed basis. When a service provider server receives a request for processing a transaction through a user account, the service provider serer may use the data access system to dynamically obtain user data required for processing the transaction from a wallet application of a user device. The wallet application may include data access policies that specify data access settings for different service providers. After processing the transaction using the user data, the service provider server may remove the user data.