Patent classifications
G06Q20/351
Systems and methods for data breach detection using virtual card numbers
Disclosed are systems and methods for data breach identification. The method may include: generating virtual card number (VCN) data sets; storing the VCN data sets on a first database; receiving one or more compromised VCN data sets stored on a second database and obtained from a scan of unindexed websites; comparing the compromised VCN data sets with the VCN data set stored on the first database to determine whether the VCN data sets have been compromised; for each compromised VCN data set, training the recurrent neural network (RNN) to associate the compromised VCN data sets with one or more sequential patterns found within the compromised VCN data sets to generate a trained RNN; receiving a first VCN data set from the first database; determining whether the first VCN data set matches a compromised VCN data set; and transmitting a message indicating the determination to a user or provider device.
SYSTEMS AND METHODS TO PAY WITH POINTS TO DIGITAL MERCHANTS
An intermediary application enables loyalty program members to redeem their loyalty points or miles through purchases with a merchant different from the business entity associated with the member's loyalty program. Members of a loyalty program pay merchants using loyalty points in exchange for goods and services. A virtual credit card is created to complete the purchase from the online merchant. Customer behavior is collected at the SKU level to help a loyalty program get to know their members better and further enhance the customer experience overall.
System and method for processing a card-not-present payment transaction by a purchaser using a friend's card for obtaining a reward
A server and method for processing a card-not-present transaction whereby a purchaser selects to use one or more friends' card to obtain a reward is disclosed. The server comprises at least a computer processor to: (i) receive, from a merchant server, a payment request including a contact mechanism for the friend(s); (ii) send a selection request to the friend(s) using the contact mechanism; (iii) receive, from the friend(s) a selection response including card number(s) eligible for the reward; (iv) request the issuer server(s) for authentication and blocking the amount; (v) track a cumulative amount dynamically and repeat steps (iii) and (iv) until equal to or greater than the payment amount; (vi) generate a virtual card number for one time use based on the card number(s); and (vii) send a payment response to the merchant server including the virtual card number for the purchaser to complete the transaction.
Zero-knowledge proof-based virtual cards
Disclosed are various embodiments for issuing virtual cards to client devices. Also disclosed are embodiments for provisioning a transaction terminal to process transactions with virtual cards. A zero-knowledge proof algorithm can be utilized to validate the transactions. A virtual card can be based upon a public key of a client device that is managed by a hardware security module.
Map on a phone used to find and operate public multi-user devices
A phone display, shows an internet map. The map allows a user to search for, and operate, multiuser public devices, such as, a hydrogen car fuelling station. The user finds the device, by viewing the device's location, and the phone's location on the map. For example, the phone searches for, and finds elevators, which are shown on the map. The user finds an elevator, by using the map. The user touches the elevator's displayed menu, to receive the elevator's menu's control panel. The received control panel, is displayed on the phone. The user requests the elevator move to the 4 floor, by touch activating a floor 4 icon, on the phone elevator panel. The phone, and elevator computer communicate, over the internet wirelessly, or wirelessly. The user avoids bacteria, that may be on a store's self serve check out machine's physical touch screen, by operating it with the phone.
Interface-Specific Account Identifiers
An access management system comprises one or more databases and one or more computers. The one or more databases may store access data, accessor data, restriction data, and/or biometric data. The one or more computers may comprise an account identifier management computer, an authorization server computer, and/or an account management server computer. The account identifier management computer may generate account identifiers for physical or virtual cards. The cards may have interface-specific account identifiers. The authorization server computer may be communicatively coupled to an account access system that is used to obtain account identifiers as input. The authorization server computer may apply one or more restrictions to an account identifier. The account identifier management server computer may enable monitoring account activity and/or generate ephemeral phone numbers that can be used to authenticate callers to call recipients.
SYSTEM AND METHOD FOR IMAGE ANALYSIS FOR PHYSICAL DEFECT DETECTION OF A STORAGE MEDIUM
A system for image analysis for physical defect detection of a storage medium of a first card that comprises an apparatus configured to receive the storage medium of the first card and a first server configured to verify issuance of a second card. The apparatus comprises an optical sensor comprising a light transmitter, a receiver, and a first processor. The optical sensor is configured to produce a light to be directed to the storage medium and to determine that the storage medium comprises a physical defect with the first processor based at least in part upon processed electronic signals. The apparatus further comprises a second processor configured to display outputs requesting authorization to issue the second card. The first server is configured to verify issuance of the second card, wherein the first server is communicatively coupled to the apparatus.
Push payment decision routing
In an example embodiment, a method for push payment decision routing in relation to a transaction is provided. An example method comprises issuing a virtual payment identifier to a mobile device and receiving payment rules from a mobile device. The user-defined rules include parameters for invoking at least one push payment to be made via the virtual payment identifier for the transaction. Instructions to implement or pay for the transaction as a pull payment are received and, based on the rules, the transaction is completed or paid for a push payment.
Mobile device verification for an electronic application before providing a digital pass to an approved customer
A system and method for mobile device verification for an electronic application before providing a digital pass to an approved customer is disclosed. The method and system receives, at a store's customer credit application computer, an application for a new account, the application including a contact information for a customer's mobile device providing, from the store's customer credit application computer, the contact information for the customer's mobile device to a verification system to authenticate the customer's mobile device providing, from a credit account provider, a text to the customer's mobile device, the text causing the customer's mobile device to be subjected to a second authentication; receiving, at the customer's mobile device, a message that includes a link to the digital pass; and utilizing the link to receive the digital pass at a mobile wallet of the customer's mobile device.
Systems and methods for real-time virtual gift card purchasing
A computer-implemented method for allowing purchase of virtual gift cards includes receiving a communication indicating a gift card type and specifying a value amount. Responsive to the communication, a purchase of a virtual gift card of that type and storing that value amount is processed. This processing includes processing a payment for the specified value amount. Further, a gift card merchant application programming interface (API) capable of processing a purchase of a virtual gift card of the indicated gift card type is identified from amongst a set of such APIs. That API is used to initiate purchase of the virtual gift card. After the purchase is processed, an indication of the purchased virtual gift card is sent to a mobile computing device. The mobile computing device uses the indication to configure itself to allow transactions using the purchased virtual gift card to be initiated. Fraud detection may also be performed.