Patent classifications
G06Q20/326
System and method for interoperable mobile wallet
A computer system includes one or more processors and machine readable storage media coupled to the one or more processors having instructions stored therein that cause the computer system to: receive a request for a dynamic token on behalf of a payor; route the request to a first financial institution; receive a message from a second financial institution including a merchant identifier and the dynamic token having a code comprising account information of the payor; identify the first financial institution based on the code; route the dynamic token and the merchant identifier to the first financial institution; receive the account information of the payor; and route the account information of the payor to the second financial institution to process a payment from an account of the payor to an account of the merchant.
Embedded card reader security
Techniques described herein are directed to embedded card reader security. In an example, personal account number data read from a payment instrument may be temporally and/or spatially separated from personal identification number data utilized to complete a payment for products. Temporal separation may include removing the personal account number data from a merchant device prior to request personal identification number data. Spatial separation may include utilization of trusted execution environments, separated embedded card reader applications, intermediary applications, and/or trust routines, for example to enable different components of a merchant device, and/or components of other devices and systems to handle personal account number data and personal identification number data.
Complex payment system using a portable terminal, and complex payment method
Disclosed are a complex payment system using a portable terminal, and a complex payment method. According to the present invention, a portable terminal such as a smartphone or a vendor server may analyze and display an optimum payment condition containing a minimum payment amount using bonus information such as card information, discount information, membership point information, or coupon information when a user pays, thus preventing personal information leakage and enabling the user to pay a minimum amount by means of his/her credit card using the bonus information.
Digital wallet for the provisioning and management of tokens
Disclosed are methods and systems for associating payment card credentials with a companion application. In an embodiment, a consumer's mobile device processor receives an instruction to launch a companion application, displays a companion application user interface, and receives selection of an option to obtain payment card credentials from at least one wallet application. The process also includes displaying a list of payment card accounts associated with the selected wallet application for association with the companion application, receiving a selection of at least one payment card account, transmitting payment account credentials of the selected payment account to a wallet server computer, receiving a companion token representing a digitization of the selected payment card account from the wallet server computer, and associating the companion token with the companion application.
Methods and apparatus for presence sensing reporting
A system includes sensors disposed within a location for outputting presence signals to a smart device, for receiving an ephemeral ID signal from the smart device, for outputting sensor ID signals to the smart device, for receiving responsive data from the smart device and for determining presence of the smart device in response to the responsive data, an authentication server for receiving the sensor ID signals from the smart device, for determining the responsive data, and for providing the responsive data to the smart device, a hub device coupled to the sensors for receiving an indication of the determination of the presence of the smart device, for determining additional data associated with the smart device, for facilitating a physical change perceptible to a user of the smart device in response to the additional data, and for providing the presence data to a smart device associated with a first responder.
AUTHENTICATING TRANSACTIONS USING RISK SCORES DERIVED FROM DETAILED DEVICE INFORMATION
One embodiment of the invention is directed to a method comprising, receiving an authentication request message for a transaction. The method further comprises determining that detailed device information is required to authenticate the transaction and generating a message including an identifier and a request for the detailed device information. The method further comprises retrieving the detailed device information from a remote server computer using the identifier and modifying the authentication request message to include the detailed device information. The method further comprises sending the modified authentication request message to an access control server computer. The method further comprises receiving an authentication response message from the access control server computer including a verification value for the transaction, where the verification value is generated based on a result of a risk analysis performed using the detailed device information.
SYSTEMS AND METHODS TO PAY WITH POINTS TO DIGITAL MERCHANTS
An intermediary application enables loyalty program members to redeem their loyalty points or miles through purchases with a merchant different from the business entity associated with the member's loyalty program. Members of a loyalty program pay merchants using loyalty points in exchange for goods and services. A virtual credit card is created to complete the purchase from the online merchant. Customer behavior is collected at the SKU level to help a loyalty program get to know their members better and further enhance the customer experience overall.
AUTOMATED FEEDER SYSTEM AND METHODS OF USE
An automatic feeder system may include: an input bin configured to store at least one physical request slip; a feeder unit; and a support frame. The feeder unit may include a feed neck operable to automatically obtain a physical request slip from the input bin and convey it out from an outlet of the feed neck. The support frame may support the feeder unit so that the outlet is configured to engage with an input of a retailer system engaged with the automatic feeder system such that conveyance of the physical request slip out from the outlet causes the physical request slip to enter the input of the retailer system and cause the retailer system to generate a physical ticket for the game of chance based on the physical request slip.
Edge Device Machine Learning
Techniques are disclosed in which a computing device repeatedly trains, using a stream of user data received at the computing device, a baseline model to generate a device-trained model, wherein the baseline model is trained at the computing device without providing user data included in the stream to a server computer system. In some embodiments, the computing device inputs, to the device-trained model, a set of characteristics associated with a user request received from a user of the computing device, wherein the device-trained model outputs a score for the user request. In some embodiments, the computing device transmits, to the server computer system, the score for the user request, wherein the transmitting includes requesting a decision for the user request. In some embodiments, the computing device performs an action associated with the user request in response to receiving a decision for the user request from the server computer system.
Method and system for authenticating digital transactions
A system and computer-implemented method for authenticating digital transactions. The method includes receiving a device registration request and a device attestation response including at least a device integrity status from a device. In response to the device registration request, the method includes providing a device registration response to the device, based on validation of the device integrity status. Further, the method includes receiving a first payment transaction request and an enrolment request from the device via an application to authenticate a second payment transaction request using a first type of authentication technique. Finally, the method includes enrolling the device to the first type of authentication technique and providing a second token to the device based on a result of the first payment transaction request, wherein the second token is used for authenticating the second payment transaction request.