G06Q20/354

COMPUTER TRANSACTION SECURITY WITH DELEGATED DECISIONS

A method for authenticating e-commerce transactions involves receiving, from a payment network computer, a first authentication request message to authenticate a transaction associated with a payment account, the first authentication request message being initiated by an issuer domain computer not implementing a 3-D Secure authorization protocol, determining that the issuer domain computer has configured, at the access control server computer, a decision function of a second portion of the 3-D Secure authorization protocol and in response thereto, transmitting, to the issuer domain computer, a decision request message and information associated with the transaction, the decision request message requesting the issuer domain computer to determine an action for authenticating the transaction based on the information associated with the transaction and one or more programmatic rules of the issuer domain computer, the transmitting occurring in lieu of the access control server computer executing the decision function at the access control server computer.

Antifraud resilient transaction identifier datastructure apparatuses, methods and systems

The Antifraud Resilient Transaction Identifier Datastructure Apparatuses, Methods and Systems (“ARTID”) transforms PIN, unique user identifying device datastructure inputs via ARTID components into secure payment authorization outputs. The ARTID includes a virtual secure element datastructure transaction apparatus, comprising, a memory, a component collection in the memory, and a processor disposed in communication with the memory, and configured to issue a plurality of processing instructions from the component collection stored in the memory. ARTID includes instructions to: obtain request to generate a tamper resistant asset account from a requestor, and instantiate a new tamper resistant asset account, wherein the account is populated with the requestor identifier, unique requestor device identifier, a secure cryptographic element for the tamper resistant account. ARTID also includes instructions to provide a message to generate a new physical account card and an associated virtual account card associated with the tamper resistant asset account, and obtain a request to engage the virtual account card in a transaction, wherein the request includes the user access credential. ARTID also includes instructions to generate a card access event message from the request to engage the virtual account card, provide the card access event message to a payment network, and obtain a card access event authorization response.

Entity-based controls for value transfer cards
11367076 · 2022-06-21 · ·

In an aspect, a computing system is configured to: send, to a transfer rail server, a request for stored card data associated with a value transfer card; receive stored card data identifying an entity having a stored representation of the value transfer card; provide user interface data to a client device, the user interface data causing the client device to display a user interface that includes an entity listing that is based on the stored card data, the user interface including a selectable option to add an entity-based control to the identified entity; receive, from the client device, an instruction to apply an entity-based control to an identified one of the entities in the stored card data; and in response to receiving the instruction to apply the entity-based control, implement the entity-based control to affect use of the value transfer card by the identified entity and not affect use of the value transfer card by other entities.

IDENTITY-LINKED DEVICE INFORMATION FOR USER IDENTIFICATION AND TRANSACTION PERSONALIZATION VIA MOBILE TAGGING
20220191194 · 2022-06-16 ·

Embodiments of the present disclosure provide methods, systems, apparatuses, and computer program products for using identity-linked device information for user identification and transaction personalization via mobile tagging, for example validating user identity and providing a user identifier and user information for transaction personalization. A user identification and personalization system may be provided to receive an electronic data transmission, from a user device over a carrier network, indicative of prior execution of an access link having been detected and decoded from a decodable visual representation. The transmission may include identity-linked device information injected by a carrier device via a header enrichment process. The system may further determine a user identifier based on the identity-linked device information, and transmit, to the user device for forwarding to a service provider device, an authentication indication including the user identifier. The user identifier may be used for various identification/personalization applications.

SYSTEMS AND METHODS FOR PERFORMING A REISSUE OF A CONTACTLESS CARD

Example embodiments relate to reissuing or otherwise altering a contactless card. These embodiments are particularly well-suited to an emergency reissue in which many cards have been compromised as the result of a data breach of a major credit card provider or department store. An exemplary contactless card includes a chip that stores encrypted authentication information, including a primary account number (PAN) that identifies the card. The chip may include a first applet responsible making payments with the card; the first applet may manage the PAN. A second applet may be capable of interacting with an outside application, and may serve as a bridge to the first applet. A rewrite of the PAN may be triggered by issuing a write command to the second applet, or by interacting with the chip in a predetermined manner (e.g., tapping the card on an interactable element a predetermined number of times).

SYSTEMS AND METHODS FOR PROVIDING CARD INTERACTIONS
20220180356 · 2022-06-09 ·

A method including receiving a first application user credential associated with a user profile; comparing, for a first match, the first application user credential with a stored second application user credential, wherein the stored second application user credential is associated with a user identity; and responsive to finding a first match, verifying the user identity by performing the following: communicating with a card using near field communication; receiving a public key of a key pair of the card and cardholder identification information of an account holder of the card; instructing the card to generate a digital signature; receiving the digital signature from the card; verifying the digital signature using the public key; and comparing, for a second match, at least a portion of the user identity with at least a portion of the cardholder identification information.

SYSTEMS AND METHODS FOR CONTENT MANAGEMENT USING CONTACTLESS CARDS

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

Methods, mediums, and systems for applying a display to a transaction card

Exemplary embodiments relate to updatable displays for transaction cards, such as credit cards or event passes. The displays may be, for instance, an electrophoretic or memory liquid crystal diode display. The transaction card may include a contact pad capable of engaging in wireless communication. Information may be exchanged between the transaction card and a mobile device or terminal, where a processor on the mobile device processes the received information to generate displayable information. The processor updates the display with the displayable information. The contact pad may be electrically connected to the display, and the display may derive electrical power to perform the updating from the wireless communication. For example, where the wireless communication is a near field communication (NFC), a radio frequency field may be generated that supplies enough power to run the processor and at least partially update the display.

SYSTEMS AND METHODS FOR DATA SECURITY

A method comprises: monitoring a data stream comprising a plurality of data events; identifying a data pattern comprising one or more of the plurality of data events; determining that at least one of the data events comprising the data pattern supports virtual card generation; determining that the at least one of the data events comprising the data pattern is performed using a physical card number at a geolocation; determining that at least one virtual number has been associated with profile data associated with a user; transmitting a notification comprising a request to generate a virtual number; and upon receipt of an approval of the request, executing a script to generate the virtual number and associate the virtual number with the geolocation.

Product based gift card

A method for allowing a purchaser to purchase an electronic gift includes providing code to a merchant that, when selected opens an overlay on the merchant's website, with the code being selected in association with at least one item available for sale on the website. The purchaser provides recipient and billing information using a device accessing he overlay. A service provider receives payment, in an amount at least equal to a purchase price of the item, and obtains an electronic gift card having at least a unique gift card number and a balance at least equal to the purchase price of the item. After the electronic gift card has been obtained, the service provider electronically notifies the recipient that the electronic gift has been purchased by the purchaser. The notification is viewable by the recipient and includes at least an identification of the item.