Patent classifications
G06Q20/352
Mobile wallet systems and methods using trace identifier using card networks
A mobile wallet computer server receives a fund access request from a user device. The fund access request is made in connection with a payment transaction. The mobile wallet server generates a tokenized card number, transmits the tokenized card number to the user device, and receives receive the tokenized card number from a card network computer system after having been routed from the user device via a merchant computer system and via an acquirer processor computer system. The mobile wallet computer server converts the tokenized card number to the actual credit card account number of the user and transmits the actual credit card account number to the card network computer system to process the payment transaction.
Electronic system
In accordance with an embodiment, an electronic device includes a secure element configured to implement a plurality of operating systems; and a near field communication module coupled to the secure element by a single bus and by a routing circuit configured to route routing data between the plurality of operating systems and a receive circuit of the near field communication module.
DEVICE FOR COMMUNICATING PREFERENCES TO A COMPUTER SYSTEM
The described device allows a user to set preference and receive the preferences by simply allowing a payment device to communicate with a preference reader.
SYSTEM AND METHOD FOR USING A BIOMETRIC PAYMENT DEVICE
Systems and methods are described related to using flexible circuity in a payment device. In one embodiment, a payment device comprises a computing device and a memory. The computing device is configured to store a biometric identifier associated with a transaction account. The computing device is configured to at least receive, by the antenna, an interrogation signal from a point of sale (POS) device in order to activate the payment device for a payment transaction. The computing device is configured to determine a scanned fingerprint identifier of a user based at least in part on the interrogation signal activating the payment device and authenticate the scanned fingerprint identifier by matching the scanned fingerprint identifier to the biometric identifier. The transaction account is transmitted to the POS device for processing the payment transaction based at least in part on the authentication of the scanned fingerprint identifier.
DETERMINING SPECIFIC TERMS FOR CONTACTLESS CARD ACTIVATION
Systems, methods, articles of manufacture, and computer-readable media for determining specific terms to activate a contactless card. An application executing on a server may receive a request from a device specifying a uniform resource locator comprising encrypted data, the encrypted data based at least in part on a private key assigned to a contactless card. The application may decrypt the encrypted data and determine a type of the contactless card. The application may determine a plurality of terms associated with the type of the contactless card and transmit the terms to a web browser on the device. The application may receive, from the web browser, an indication specifying acceptance of the plurality of terms. The application may store, based on the decryption of the encrypted data and the received indication specifying acceptance of the terms, an indication in a database specifying the contactless card is activated for use.
SYSTEMS AND METHODS TO PERFORM CONTACTLESS CARD ACTIVATION
Example embodiments relate to performing activation techniques for contactless cards. For example, embodiments may include performing a near-field communication (NFC) exchange with a contactless card, processing a message comprising data to activate the contactless card, communicating the data to a server to activate the contactless card; and receiving a response from the server, the response to indicate whether the contactless card is successfully activated or not successfully activated.
Cloud-based virtual wallet NFC apparatuses, methods and systems
The CLOUD-BASED VIRTUAL WALLET NFC APPARATUSES, METHODS AND SYSTEMS (“EAE”) transform user enhanced security transaction initiation requests using EAE components into time-limited, session-specific transaction bounding tokens. In some implementations, the disclosure provides a processor-implemented method of transforming a transaction bounding token request into transaction bounded tokens and purchase authorizations.
Dynamic payment device assignments using a cloud-based transaction system
The present disclosure involves solutions for dynamically connecting a customer-owned mobile device, a cloud-based service, and one or more particular physical payment devices located at an entity. In one example, as executed at a cloud-based payment service, a unique identifier associated with a location of a mobile device of a customer is received. An entity and a first location within the entity is determined based on the unique identifier, and a particular payment device at the entity is determined. The cloud service transmits, to the particular payment device, information to be used by the particular payment device to perform the payment transaction. A second signal is transmitted to the mobile device of the customer, and includes an indication of the particular payment device at which the payment transaction is to be completed. The payment transaction can then be completed at the particular payment device.
Systems and methods for preventing fraudulent credit card and debit card transactions
A system and method for preventing fraudulent credit card or debit card transactions by coupling a smart phone to the credit card or the debit card, and transmitting identification information from the smart phone to the card. The card is normally disabled such that no transaction may take place unless the card is enabled. The card receives the transmitted identification information and compares that information to corresponding information stored on the card. If the received information matches the stored information, the card is enabled thus allowing the transaction to take place.
System and methods to prevent unauthorized usage of card readers
A contactless card reader comprises a contactless card reader front-end coupled to a processor. A communications module is coupled to the processor and a set of sensors is coupled to the processor. The set of sensors determines parameters related to the location, orientation and motion of the card reader. The processor receives the parameters from the set of sensors and utilizes the parameters and scenario configuration data to evaluate a rule. The result of the evaluation of the rule results in a limitation on the operation of the card reader. The communications module is configured to intermittently receive the scenario configuration data from external sources.