G06Q20/354

Method and device for configuring NFC smart card

A method for configuring a Near Field Communication (NFC) smart card, includes: receiving a card selected by a user, the card being included in a card set corresponding to the user; determining at least one card which has no conflict with the selected card in the card set; adding the at least one card and the selected card in the NFC smart card, wherein each card in the NFC smart card is in an activated state.

Computer-based systems and methods involving biometric authentication aspects for handling exceptions, enabling deactivation and/or performing other functionality
11347990 · 2022-05-31 · ·

Systems and methods involving biometric authentication of transaction cards including aspects of exception handling, deactivation and other features are disclosed. In one embodiment, an exemplary computer-implemented method may comprise generating a first user interface having one or more interactive UI elements that enable a card owner to manage a plurality of features associated with a transaction card, and determining, if a biometric-activated control is enabled and the vendor is not excluded from the biometric-activated control, whether the transaction card is biometrically-active. Further, the interactive UI elements may include elements such as a first UI element that is configured to allow the card owner to enable a biometric-activated control of the transaction card, and/or a second UI element that is configured to allow the card owner to exclude one or more vendors from the biometric-activated control.

Transaction cards and computer-based systems that provide fraud detection at POS devices based on analysis of feature sets and methods of use thereof

Transaction cards, systems and methods for performing fraud detection at POS devices based on analysis of feature sets are disclosed. In one embodiment, an exemplary transaction card may comprise one or more sensors configured to collect pre-card-use sensor data regarding a user of the card, circuitry that assembles such data into feature sets and performs fraud detection, and data storage. According to some aspects, the fraud detection may include comparing user specific sensor data, collected for a current transaction, to a user-specific risk profile validation model to determine a risk score for the current transaction, and transmitting the risk score to a card transacting device when a card is presented during a transaction. In some implementations, the risk score may enable the card transacting device to evaluate a risk associated with accepting the transaction card to complete the attempted transaction.

TRANSACTION TOKEN THAT STORES AND PRESENTS LOCATION-SPECIFIC TOKEN IDENTIFIERS

In certain embodiments, location-based activation of card identifiers may be facilitated. In some embodiments, an electrophoretic display card may store a set of location-specific card identifiers, where each card identifier of the set is associated with (i) an account of a user and (ii) creation location information indicating a device location of the user at a creation time of the card identifier. In response to being powered by a user device, the card may initiate wireless communication with the user device. The card may determine a device location of the user device, select a card identifier from the set of card identifiers that matches the device location, and switch a state of the card identifier to an active state to enable transaction processing for the card identifier. In some embodiments, the card may cause the active card identifier to be presented on an electrophoretic display of the card.

Systems and methods for phone-based card activation

Example embodiments of systems and methods for data transmission between a contactless card, a client device, and one or more servers are provided. The contactless card may include one or more processors and memory. The memory may include one or more applets. The client device may include one or more processors and memory. The client device may be in data communication with the contactless card. One or more servers may be in data communication with the client device. A first set of information may be transmitted from the contactless card to the client device. The first set of information may include one or more links to activate the contactless card. The client device may be configured to receive the first set of information from the contactless card. Upon validation of the first set of information, the contactless card may be activated.

METHOD AND DEVICE FOR DESCRIMINATING ONE OF A GROUP OF NFC TRANSMITTERS
20230269568 · 2023-08-24 ·

A method is provided for differentiating one of a plurality of unpowered NEC transmitting devices for NFC communication with a receiving device. Each NFC transmitting device has a transmitter NFC interface and an NFC communication range. A range extending device has a power source, a transmitter communication interface, a range extender antenna, and an amplifier. One of the transmitting devices is selected and the range extending device is connected to it so that the transmitter communication interface engages the transmitter NFC interface of the selected transmitting device. This action serves to establish an extended communication range for the selected NFC transmitting device. The NFC transmitting devices are then positioned at a distance from the receiving device that is within the extended communication range, but outside the communication ranges of the other NFC transmitting devices. NEC communication is then established between the selected NFC transmitting device and the receiving device.

SYSTEMS AND METHODS FOR CONTACTLESS CARD ACTIVATION

A mobile device includes a wireless chip, a display, a processor, and a memory storing instructions that, when executed by the processor, cause the processor to perform operations. The operations include: based on a first short-range wireless communication, receiving a customer-specific uniform resource locator (URL) from the contactless card via a wireless chip; automatically navigating to a website associated with the customer-specific URL; receiving authentication information and automatically populating one or more fields on a graphical user interface (GUI); displaying, by the display, an indication of activation of the contactless card; receiving and accepting a prompt to register the mobile device with the activated contactless card; and based on at least a second short range wireless communication between the registered mobile device and the contactless card, providing a second GUI including an online login portal for accessing an account that is associated with the contactless card.

LOCAL HARDWARE DEACTIVATION OF A TRANSACTION CARD

Methods and systems are described herein for locally deactivating transaction cards to prevent offline transactions. A processor associated with the transaction card may be used in the process to locally deactivate transaction cards. The processor on the transaction card may receive a signal from a transaction terminal requesting a connection with the transaction card and may establish a connection with the transaction terminal. The processor may an indication to deactivate the transaction card and in response to receiving the indication apply an electric current to a stripe deactivating element that deactivates at least a portion of one or more tracks of a stripe on the transaction card and cause, via a built-in circuit, a predetermined increase in the electric current to the processor that causes a pathway that enables power distribution to the processor to be destroyed.

Authorization control network and method of validating an authorization request

An authorization control network includes at least one computer server. The server(s) receives a cardholder credential and a profile modification request from a communications device, and determines an account attribute by querying a profile database with an account identifier. The server(s) rejects the modification request if the server determines from the account attribute that a limit profile associated with the account identifier is linked to a cardholder credential other than the received cardholder credential. The server(s) then receives from a POS device an authorization request that includes the account identifier and an authorization value. If the server(s) determines that the authorization value does not exceed a limit value saved in the limit profile and does not exceed a credit amount associated with the account identifier in a transactions database, the server(s) generates an authorization response confirming authorization of the authorization value, and transmits the authorization response to the POS device.

SECURE ACCOUNT CREATION

In one embodiment, a payment service system-implemented method of assigning payment card numbers for individual user accounts associated with the payment service system includes receiving payment card numbers activated by a third-party server that are unassigned to accounts registered. The method includes receiving a first transaction authorization request for one of the payment card numbers and denying the request, without notifying the third-party server, based on the number being unregistered with the payment service system. The method includes receiving, via an executable application, a request to register a user account for a payment service system user, and in response, generating a record assigning the payment card number to the user account. The method includes receiving a second transaction authorization request for the payment card number, authorizing the request based on the number being assigned to the user account, and notifying the third-party server, causing user account's balance to be modified.